RecruitingBlogscom

Follow Us:

 

all media

Results 326 - 350 of 366Sort Results By: Published Date | Title | Company Name
Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary
    
Integration New Media
Published By: Concentra     Published Date: Mar 31, 2008
There is a lot of interest at the moment in Web 2.0, a catch-all term for ways of making websites much more dynamic and socially interactive. What is a pity is that all the jargon about mash-ups and social media might suggest opening up your online presence this way will require lots of investment in arcane or unproven technology.
Tags : 
concentra, sharepoint, intranet, 2.0, collaboration, knowledge management
    
Concentra
Published By: SchemaLogic     Published Date: Jun 11, 2008
The Associated Press, like all publishing and digital media companies, must work rapidly to meet the demands of a shifting media landscape. An exploding wave of free content on the web meant that AP not only had to deliver more content online, but needed to create more relevance and niche content in order to update traditional ad revenue models with targeted web-based products and more potential for advertising dollars.
Tags : 
schemalogic, associated press, content delivery, content management, cms, content management system, knowledge management
    
SchemaLogic
Published By: Marketo     Published Date: Oct 17, 2016
The impact of social media transcends almost every aspect of our daily lives—work, politics, breaking news, and more. Today, it’s almost universally used—by consumers and brands—and is one of the most effective channels to connect with your audience. Download this definitive guide to learn how to effectively use social media marketing.
Tags : 
    
Marketo
Published By: Webroot UK     Published Date: Aug 07, 2013
Mobility is one of the driving factors for all business and IT initiatives. IDC has characterized it as one of the four pillars of computing’s next dominant platform, along with social media, Big Data and cloud services. Mobility has the potential to dramatically enhance business agility, improve employee productivity and enable major shifts in the way individuals and businesses approach work.
Tags : 
mobile, security, small business, midsize business, improve employee productivity, business agility
    
Webroot UK
Published By: MoreVisibility     Published Date: May 07, 2012
Social media, social media, social media! It's all that anyone online is talking about these days. What people aren't talking about are ways to successfully measure their social media efforts. Read to learn more.
Tags : 
morevisibility, social media, marketing, emerging marketing, internet marketing, web analytics
    
MoreVisibility
Published By: Century Interactive     Published Date: Sep 28, 2010
Call tracking overview presentation to understand the basics, FAQs and how you can take action immediately!
Tags : 
call tracking, call analytics, lead optimization, trackable phone numbers, measurement
    
Century Interactive
Published By: TalentWise     Published Date: Feb 28, 2011
Gain insight into the future of employment background screening and how the industry will be changing. This whitepaper details the pitfalls of using Social Media, upcoming legislation and how to conduct a comprehensive background check.
Tags : 
talentwise, employee screening, hiring, background check, staffing, employment, human resources management
    
TalentWise
Published By: Pitney Bowes     Published Date: May 17, 2011
Inefficient invoice management processes are costing European businesses billions of Euros each year. This white paper examines how hybrid solutions are allowing businesses to grasp immediate gains.
Tags : 
invoicing, efficiency, digitisation, e-invoicing
    
Pitney Bowes
Published By: EDGE Technology Services     Published Date: Jun 22, 2011
Aligning IT to your business is critical, especially media. Learn how to leverage digital without sacrificing margins or a competitive advantage.
Tags : 
broadcasting, strategy, media
    
EDGE Technology Services
Published By: Spredfast, Inc.     Published Date: Oct 03, 2013
All You Need to Know to Win with Social Media Marketing
Tags : 
spredfast, blog, marketing, branding, social media marketing, corporate blogger, social media
    
Spredfast, Inc.
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: IBM     Published Date: Aug 08, 2012
This white paper examines the role social media can play in presenting a more strategic view of customer data and how the right combination of technologies can deliver insight to help companies more effectively meet perpetually shifting consumer demands expressed through, and influenced by, these dynamic communication channels. Discover the implications of social media for marketing and sales, as well as IT. And learn the how and why social media tools and applications can be integrated with existing technology investments.
Tags : 
social media analytics, consumer insight, marketing digitization, ibm, facebook, strategic considerations, lower cost, influence
    
IBM
Published By: Adobe     Published Date: Aug 22, 2013
Some people want more "likes" because their goal is increased awareness. Others may struggle with losing customers and want improved customer service to reduce churn rates. Whichever challenge your strategy is trying to solve, you will find only a short-term solution if you deal with each challenge in isolation. What you need is an integrated approach that puts social media at the heart of your business as a solid foundation for long-term growth.
Tags : 
customer experience management, social media data, web trends and analytics, social media
    
Adobe
Published By: BlackBerry     Published Date: Oct 03, 2012
Seeing an opportunity to help its customers and local distributors, TFC worked with BlackBerry® Alliance Elite Member FloatPoint Media Inc. to develop the custom iGasketT app. The result? Improved user safety and a wider worldwide market.
Tags : 
blackberry, mobile applications, application development, case study, business technology
    
BlackBerry
Published By: uberVU via HootSuite     Published Date: Apr 23, 2013
Today’s B2B buyers are socially sophisticated and informed. Do you have the tactics, tools and training to leverage social media for sales success? Find out how to use social media to relate to customers, identify opportunities for engagement, establish credibility, and stay visible and valuable at every stage of the purchase process.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, sales
    
uberVU via HootSuite
Published By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : 
it governance, risk, compliance, servicenow, webinar, software development, it management, knowledge management
    
ServiceNow
Published By: Sitecore     Published Date: Feb 25, 2015
The forces of digital disruption have empowered consumers and inverted the power relationship between buyers and sellers. Competitive advantages based on manufacturing, distribution, and IT are no longer sustainable. Customer loyalty has all but disappeared; buyers can and will shift their allegiance immediately if disappointed. In the era of the empowered consumer, business success depends upon offering consistently outstanding customer experiences across multiple touchpoints and over the entire customer lifecycle.
Tags : 
content management, vendors, digital experience, optimization, web page, hosting, business, agenda
    
Sitecore
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : 
ibm, insurance, data, big data, analytics, solutions, business technology, insurance ros
    
IBM
Published By: Oracle     Published Date: Jan 07, 2014
38 minute webcast discussing the rise of the empowered consumer and how consumers have changed the B2C relationship forever.
Tags : 
customer experience, customer insight, cmo and cio relationship, marketing and technology collaboration, cmo and cio collaboration, socially enabled enterprise, social business, social listening
    
Oracle
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning
    
Meltwater
Published By: Cherwell Software     Published Date: Jan 28, 2019
Domino’s was heavily reliant on a legacy service desk tool. When Karen Copley was hired to oversee all aspects of service delivery for the organisation, she immediately recognised that this tool needed to be replaced. According to Karen, it offered no way to obtain management information. There was also limited automation capabilities. In addition, at this time, Domino’s wanted to mature its service desk operation by adhering to ITIL® framework best practices. “We decided we needed a more robust, ITIL® framework compliant service desk tool. I knew Cherwell® Service Management software was in the Gartner Magic Quadrant, and I had read good things about the company. I therefore decided to invite Cherwell Software and a couple of other vendors to bid for the business.”
Tags : 
    
Cherwell Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top