RecruitingBlogscom

Follow Us:

 

all media

Results 301 - 325 of 366Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Jan 07, 2014
Most enterprises understand the importance of listening to customer comments and conversations through social channels, and engaging and developing relationships with influencers and customer communities. But as the variety, volume, and velocity of social data continues to grow, many organizations are looking for cost-effective ways to use this data to get a better understanding and more holistic view of their customer. Social provides a unique channel to learn about your customer, and offers real-time insights like interests, actions, likes and dislikes that can provide invaluable behavioral and predictive data patterns. This social data (when aggregated with enterprise CRM data) reveals a more complete picture and understanding of customers.
Tags : 
social crm social roi, social media analytics, cmo and cio collaboration, socially enabled enterprise, social business, social data, social marketing, social media management
    
Oracle
Published By: Oracle     Published Date: Jan 07, 2014
A description and analysis of Facebook Social Graph, monetization opportunities and its value to businesses.
Tags : 
socially enabled enterprise, social business, social media management, social relationship management, social marketing platform, social marketing tools, social media tools, customer experience
    
Oracle
Published By: Oracle     Published Date: Jan 13, 2014
Oracle, Leader Networks, and Social Media Today recently conducted an online survey of over 900 marketing and technology leaders at more than 500 organizations from around the world to explore what it means to be a socially enabled enterprise. Technology and Marketing executives from Chubb & Son, Shell and Whole Foods Market participated in in-depth interviews as part of the study and share lessons learned and provide practical insights from their perspective. Paul Gillin, veteran technology journalist and co-author of the bookAttack of the Customers, adds perspective based on his experience with applying social media to marketing, customer service and internal communications Download this exclusive White Paper, The Socially Enabled Enterprise to learn more about the opportunities and challenges global organizations are facing in the transition to becoming socially enabled enterprises.
Tags : 
socially enabled enterprise, social business, social media monitoring, social marketing, social media management, social relationship management, social marketing platform, social marketing tools
    
Oracle
Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
Published By: Silk Road Technology     Published Date: Jul 30, 2014
Five years ago, many HR representatives put their hands over their ears and pretended they’d never heard the words “social media.” However, social media – which encompasses any internal or external online outlet that allows for two-way dialogue and includes websites such as blogs, Facebook, Instagram, LinkedIn, Pinterest, Twitter, Yelp, and YouTube – has only become more pervasive. In fact, according to Laura Friedel, a partner in Levenfeld Pearlstein’s Labor and Employment Practice Group, 75 percent of employees currently access social media on their mobile devices while at work and 67 percent do so more than twice a day.
Tags : 
silkroad, social media, legal risks, facebook, instagram, linkedin, pinterest, twitter
    
Silk Road Technology
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
Published By: HP     Published Date: Aug 26, 2014
HP Just Right IT solutions address the networking needs of the SMB customer, no matter size or maturity level. HP OfficeConnect small business solutions provide plug-and-play wired and wireless switches with advanced features that support the needs of your growing business. HP Networking mid-market solutions, based on the HP FlexNetwork architecture, support wired and wireless networking, cloud computing, and rich-media traffic. HP also offers comprehensive network Support Services to help manage your network, mitigate risks and downtime, and increase the business value of your technology. Find out more.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution
    
HP
Published By: eDataSource     Published Date: Jan 05, 2015
Download this white paper today and learn about the key features of Inbox Tracker 2.0 and how it uses real time data from your customers to tell you if they received your communication. This solution is not only more accurate than traditional seed based monitoring when it comes to inbox delivery, but a solution that allows you to react immediately to any fluctuation in your inbox delivery as it happens.
Tags : 
real-time inbox monitoring, email monitoring, real time data, delivery rates, email marketing, emerging marketing, marketing research
    
eDataSource
Published By: Marketo     Published Date: Oct 04, 2017
Whether you are a seasoned digital marketer or a novice, you’ll likely make mistakes—or already have—as you undertake your programs and campaigns. This ebook will cover the eight most common digital marketing pitfalls, including those related to channel optimization, social media, metrics, and more, to help you understand how to avoid or fix them.
Tags : 
digital marketing, channel optimization, social media, metrics, pitfalls
    
Marketo
Published By: Oracle     Published Date: Apr 05, 2013
Today’s consumers expect better service, better products, and better communication with retailers. Without a single view of the customer across all channels – including social media – retailers risk alienating customers and driving them to other brands. To meet these challenges, many retailers are deploying software-as-a-service (SaaS) contact center systems that address these problems and create new opportunities. This eBook follows one shopper’s journey and how the concept of the contact center of the future provides the better overall experience.
Tags : 
expect better service, better products, better communication, smarter service, contact center, oracle
    
Oracle
Published By: Trapit     Published Date: Apr 06, 2015
In the past, simply having a presence on social media was enough for many companies. But social networking sites are changing, and so are buyers. Potential customers want to hear messages tailored specifically for them, and they want to hear those messages from someone they can trust. To maximize the potential of social media, today's marketers have to change their strategies. That's where employee advocacy comes in.
Tags : 
trapit, employee advocacy, employee marketer, social networking, brand advocation, emerging marketing
    
Trapit
Published By: Semcasting     Published Date: Feb 19, 2014
Despite the fact that digital advertising is experiencing explosive growth, the industry still faces two significant challenges that can impede campaign performance: reach to unique users and data verification. In order to attract brand advertisers that are still spending a large portion of their budget on traditional media, the industry must find a better targeting solution. In this white paper from Semcasting, you will learn more about the limitations of cookie-based behavioral targeting and how a new solution called IP Zones can dramatically increase both the scale and accuracy of online display campaigns.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies
    
Semcasting
Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault
Published By: LogMyCalls     Published Date: Oct 20, 2014
The best lead for a medical marketer is the lead that calls the office. Call tracking is a critical tool for medial marketers, and here's the skinny of what you need to know.
Tags : 
medical marketing, phone call tracking, conversation analytics, marketing analytics, call conversion rate, marketing conversion rate, prove roi, data driven marketing
    
LogMyCalls
Published By: Rocket Fuel     Published Date: Mar 04, 2015
Remember back in the day when digital advertising was simple to understand? Like popping open the hood of a 1972 Ford, all the parts were simple and visible, and how they fit together was intuitive. It made sense. Now? Piecing together the modern digital advertising ecosystem is like trying to assemble a spaceship in your living room. But as Rocket Fuel Director of Artificial Intelligence Michael Benisch explains in our latest whitepaper, using advanced systems to buy media programmatically doesn't have to be overwhelming. Michael will take you "under the hood" of programmatic buying and walk you through the process of how and why a consumer sees the ads they see. Download the whitepaper and pop open the hood before choosing a programmatic partner.
Tags : 
programmatic, programmatic partner, digital advertising, programmatic advertising, online advertising, ad platform, digital marketing, ad network
    
Rocket Fuel
Published By: AdRoll     Published Date: Aug 22, 2017
For most retailers, the holidays are a frenzied rush of juggling multiple campaigns, meeting revenue goals, and hitting lofty numbers before the year is up. It’s far from a relaxing time of year. The holiday season has become critically important to online retailers. With the rise of Black Friday, Small Business Saturday, Cyber Monday, Green Monday, Super Saturday, and Boxing Day, the definition of “the holidays” has expanded substantially. While these retail days have helped distribute the holiday rush across a wider range, they’ve also made holiday campaign planning far more complex. Expanding digital channels, such as mobile and social media, have added to the immense opportunities that the holidays provide. Just last year, mobile accounted for 50.3% of all e-commerce traffic, surpassed desktop traffic for the first time ever. Knowing this, it shouldn’t be a surprise that 38% of shoppers now say they will not return to a retailer’s website if it’s not mobile optimized.
Tags : 
holiday planning, retail, black friday, social media, mobile
    
AdRoll
Published By: Online Marketing Summit     Published Date: Apr 21, 2010
Register for this free virtual event on Thursday, May 27th with the best and latest online marketing educational content including best practices, case studies, research and more. You can expect: *Seven tracks covering all major domain of online marketing, including Social Media, Search Engine Marketing and Optimization, Web Analytics, Mobile, Email and Demand Generation; * Content for all skill levels from the online novice to the eMarketing expert, there are sessions that will benefit all corporate, brand and online marketers; *Online marketing education kiosks and learning centers provide you additional access to 1-on-1 consultations, whitepapers and webcasts; *Live Q&A at the end of each session. Speakers and expert practitioners further explain the tactics learned in the session, answering questions and providing live support. Virtual Peer Networking gives you the opportunity to network, collaborate and share ideas with strategic marketers from leading companies around the world, so register now!
Tags : 
oms, online marketing summit, online marketing, emarketing, strategic marketing
    
Online Marketing Summit
Published By: Informatica     Published Date: Jul 07, 2011
Explore how retailers can generate a single view of customers who engage across multiple channels-online, in stores, and via call centers, on social media, and mobile devices.
Tags : 
informatica, competitive edge, customer information management mdm, master data management, multichannel retail environment, social media, single view, customer activity
    
Informatica
Published By: netVigilance     Published Date: Aug 21, 2009
Managing network vulnerabilities will be the biggest challenge for C-Level executives in the coming years. Intrusions are more frequent and more malicious, so the security of corporate networks, and therefore the security of the entire corporation are dependent on the ability to quickly identify, prioritize and remediate vulnerabilities in the network.
Tags : 
cost control, it spending, network security, budget, ids, intrusion prevention, vulnerability management, net vigilance
    
netVigilance
Published By: Sanbolic     Published Date: Aug 21, 2009
Today, most video post production for standard-definition content has moved onto disk-based, non-linear editing (NLE) systems. These systems offer improved flexibility over linear, tape-based systems by allowing a workstation fast access to any part of the digital media file.
Tags : 
hi def, hi-def, san, storage area network, storage area networks, cisco, storage, hi-def video
    
Sanbolic
Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance, security
    
Cenzic
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
An introductory view of AutoPlay Media Studio 6.0 from the ground up. Learn all about AutoPlay Media Studio 6.0 and see everything it can do. Create everything from attractive front-end menu systems for CD/DVD-ROMs to full multimedia applications!
Tags : 
enterprise applications, sales & marketing software, multimedia software, multimedia, indigo rose
    
Indigo Rose Corporation
Published By: Interactive Intelligence     Published Date: May 07, 2012
IT strategies in insurance have traditionally been driven by business objectives and business strategy. But with technology advancements for mobile solutions, social media, analytics, content management (ECM), and process automation, insurers can now take a conjoinment view to evaluate opportunities and drive differentiation. Read more in this paper from Mark Breading of Strategy Meets Action.
Tags : 
interactive, technology, ecm, process automation, social and mobile technology, business technology
    
Interactive Intelligence
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top