RSS feed Get our RSS feed

News by Topic

act

Results 13251 - 13275 of 14547Sort Results By: Published Date | Title | Company Name
By: Mcorp Consulting     Published Date: Feb 17, 2010
See how the landscape of customer experience is being altered forever, as touchpoints continue to drive shifts in distribution, feedback and marketing channel control. In this whitepaper, you'll learn how making your touchpoints stronger, faster and smarter today will mean increased profits and stronger market positions tomorrow. (Plus 7 specific steps any company can take to improve customer experience today.)
Tags : mcorp, customer experience, relationship lifecycle, loyalty, retention, bottom line, touchpoint marketing, touchpoint mapping
     Mcorp Consulting
By: ESET     Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
Tags : eset, cyberwarfare, threat, enterprise information security, botnet, cyberattack, malware
     ESET
By: Microsoft Windows Phone     Published Date: Feb 05, 2010
This paper compares the Research In Motion BlackBerry solution (BlackBerry mobile devices and BlackBerry Enterprise Server) with the Microsoft® mobile solution (Microsoft Windows Mobile® and Microsoft Exchange Server 2007 SP1 with Microsoft ActiveSync® technology) by analyzing features of the user experience and the administrator experience.
Tags : microsoft windows mobile, mobile work, blackberry, smartphone, exchange server 2007 sp1, activesync, secure mobile messaging, security
     Microsoft Windows Phone
By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
     Absolute Software
By: WhatCounts     Published Date: Feb 04, 2010
Video email is the best of three worlds, bringing together the immediacy of the internet, the precise control and metrics of direct mail, along with the visual appeal of television and YouTube. At its best it has the potential to double or triple the overall efficiency of your marketing program, but employed in the wrong way and it can turn off existing customers.
Tags : whatcounts, video email, video, rich media, youtube, emarketing, email marketing, ctr
     WhatCounts
By: IBM     Published Date: Feb 03, 2010
This white paper is intended to provide service providers with IBM's point of view on the power of collaboration in a Web 2.0 environment and to introduce a new IBM solution that can help telecoms to use collaboration as a tool for enabling innovation.
Tags : ibm ep, empowering people, service provider, collaboration, web 2.0 environment, innovation factory, telecommunication
     IBM
By: IBM     Published Date: Feb 03, 2010
Join industry leaders and experts on this panel as they discuss the business value of enterprise social software and share their best practices in implementation within their organizations .
Tags : ibm ep, empowering people, collaboration, enterprise social software, forrester research
     IBM
By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity
     Symantec.cloud
By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking
     Symantec.cloud
By: Hosting.com     Published Date: Feb 03, 2010
This briefing addresses the confusion about the security of cloud hosting implementations and then outline the practices and technologies available to keep clouds safe in the areas where they do have unique vulnerabilities.
Tags : hosting.com, cloud, computing, enterprise application, uptime
     Hosting.com
By: Flimp Media     Published Date: Feb 02, 2010
This report, which describes the emerging web video direct marketing category, discusses how online video marketing isn't just for advertisers anymore; explains the applications and benefits of interactive web video and in particular video landing pages for direct marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective email video marketing campaigns without programming or advanced technical skills.
Tags : flimp, b2b, idc, intelligent digital collateral, digital sales, direct marketing, analytics, rich media
     Flimp Media
By: Athena Security     Published Date: Jan 28, 2010
SIEM solutions detect real attacks from the thousands of events that are happening in the network. When an unexpected and potentially dangerous event is recognized, engineers take a quick (temporary) action to block the security leak, diagnose what really went wrong, determine what else is at risk, and decide on a fix.
Tags : firewalls, security, sim, siem, network security, risk, firewall analytics, security incident
     Athena Security
By: Project Perfect     Published Date: Jan 28, 2010
This white paper suggests project management methods and practices can move from a static, unidirectional framework, to a dynamics, multidirectional framework.
Tags : risk management, development risks, operational risks, enterprise architecture, eric tse, project management
     Project Perfect
By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
     Absolute Software
By: Qwest Business.     Published Date: Jan 27, 2010
Today's organizations must embrace innovation, achieve a high level of responsiveness and transform customer information and feedback into actionable results.
Tags : qwest business, customer service, feedback, voice and data network infrastructure, telecommunication, crm) and sales force automation, converged ip network infrastructure
     Qwest Business.
By: Qwest Business.     Published Date: Jan 27, 2010
A difficult economy is impacting IT investments, but advanced communications infrastructures bring opportunities for innovation and cost savings.
Tags : qwest business, infrastructure innovation, advanced communications infrastructure, roi, tco, total cost ownership, converged voice, data networks
     Qwest Business.
By: Emotive Brand     Published Date: Jan 27, 2010
The concepts of "brand" and "reputation" are often seen as one and the same. However, when viewed separately, significant opportunities arise to improve both. The road to successful branding has never been more complex or challenging. What started, as a one-way lane going directly from the manufacturer's door to the buyer's door is now an everexpanding, two-way, multi-lane superhighway with intersections, tollbooths, and rest stops.
Tags : emotive brands, reputation, branding, brand, reputation monitoring
     Emotive Brand
By: Tripwire     Published Date: Jan 26, 2010
Learn why that's so, why traditional log and event management solutions don't provide the answer, and how a modern integrated product does.
Tags : tripwire log center, event management, security event analysis, database, graphical tool, centralized dashboard, activity monitoring, security alert
     Tripwire
By: Flimp Media     Published Date: Jan 26, 2010
This report, discusses the uses, applications and benefits of video landing pages for email marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective online video email marketing campaigns using video landing pages without programming or advanced technical skills.
Tags : flimp, b2b, idc, intelligent digital collateral, landing pages, email marketing, emarketing, measurability
     Flimp Media
By: En Pointe Global Services     Published Date: Jan 25, 2010
So how do you make sure you will gain the benefits of outsourcing and avoid the pitfalls? We have done the research and drawn from our own experience to bring you.
Tags : en pointe global services, outsourcing, help desk, it service delivery, single point of contact, spoc, roi
     En Pointe Global Services
By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy and tactics to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves.
Tags : sdl tridion, a/b, crm, ecm, web 2.0, social networks, dam, wcm
     SDL Web Content Management Solutions
By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
Online marketing needs to be coordinated and consistent with marketing communication and business objectives. To compete in today's marketplace, marketing professionals need a solution that allows them to react to changing market conditions cost effectively: coordinated marketing communication at a lower cost.
Tags : sdl tridion, a/b, multi-channel marketing, branding, crm, ecm, rss, xml
     SDL Web Content Management Solutions
By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy and tactics to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves.
Tags : sdl tridion, a/b, crm, ecm, web 2.0, social networks, dam, wcm
     SDL Web Content Management Solutions
By: SAP     Published Date: Jan 21, 2010
The goal of this article will be to contribute to the emerging dialog on the subject of business value by extrapolating from BI lessons learned and from DecisionPath Consultings experience working with Fortune 1000 customers and Government agencies.
Tags : sap, business intelligence, data warehousing, enterprise application, erp, scm, crm, manufacturing
     SAP
By: Tripwire     Published Date: Jan 20, 2010
Gene Kim, CTO of Tripwire, describes seven practical steps owners and operators of the bulk power system can take to meet the mandatory IT configuration requirements set forth in the NERC-CIP standards. These steps help owners and operators avoid costly penalties for non-compliance while also protecting the Critical Cyber Assets that control or affect the reliability of North America's bulk electric power system.
Tags : tripwire, gene kim, nerc compliance, critical infrastructure protection, cip, cyber security standards, nerc-cip standard, information security
     Tripwire
Start   Previous    524 525 526 527 528 529 530 531 532 533 534 535 536 537 538    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics