RSS feed Get our RSS feed

News by Topic

social applications

Results 1 - 25 of 55Sort Results By: Published Date | Title | Company Name
By: Context Optional     Published Date: Mar 09, 2010
If you're a brand marketer or digital agency looking to amplify your social marketing initiatives this year, this document will guide you through the growing world of Facebook apps. Today, there are more than 500,000 active applications on Facebook, but of these only 250 applications have more than one million monthly active users. You've downloaded this guide because you recognize that marketing today means creating a two-way dialogue with your customers.
Tags : context optional, social media, facebook, social networking, social applications, social marketing, email newsletters, social media marketing
     Context Optional
By: HPE     Published Date: Mar 23, 2015
With new technologies, new opportunities often emerge, especially in business. The advent of innovations, such as social media and mobile devices, is changing the ways businesses interact with customers and the ways in which customers desire to be engaged. Opportunities arising from the benefits of salesforce automation, business intelligence (BI), and customer relationship management (CRM) applications are providing new levels of insight, helping businesses acquire customers more efficiently and retain those customers longer. As a direct result, organizations that invest in better understanding potential customers are likely to see higher returns than those organizations that possess a more limited understanding of their customer base. Seeking the competitive advantage resulting from improved customer focus, IT organizations have increased investment in business intelligence and analytics and the underlying infrastructure to support those applications.
Tags : 
     HPE
By: Oracle     Published Date: Aug 08, 2013
Oracle Fusion Tap, a native iPad application, allows access to CRM data anytime and anywhere. Learn how Fusion Tap enables collaboration with colleagues and customers, usage of mapping and social networking applications, and more, all from your iPad.
Tags : oracle tap, oracle, crm, oracle fusion, ipad, crm
     Oracle
By: Oracle     Published Date: Aug 15, 2013
Oracle Fusion Tap, a native iPad application, allows access to CRM data anytime and anywhere. Learn how Fusion Tap enables collaboration with colleagues and customers, usage of mapping and social networking applications, and more, all from your iPad.
Tags : oracle tap, oracle, crm, oracle fusion, ipad, crm
     Oracle
By: Salesforce.com     Published Date: Jul 16, 2013
Sales managers have faced the same challenges since long before CRM applications were invented. However, new tools and technologies are making their jobs easier. The future of sales performance management is integrated with CRM and social collaboration. It helps managers provide real-time coaching and motivation in context to drive better sales behaviors and, ultimately, better sales results.
Tags : sales force automation, sales performance management, social performance management, crm applications, social collaboration
     Salesforce.com
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: Blue Coat Systems     Published Date: Jun 30, 2011
Social and technological changes are transforming the nature of network traffic, raising network costs and performance issues. Learn how to proactively manage the WAN as new Web protocols, consumer and corporate video and cloud-delivered applications become mainstream.
Tags : blue coat, wan optimization, secure web gateway, application performance monitoring
     Blue Coat Systems
By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : network protection, it security, firewall, hacker detection, security management
     McAfee
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: MuleSoft     Published Date: Jan 25, 2016
IT used to be so simple. Companies owned their own technology equipment and purchased enterprise licenses for many of the applications anybody in the organization might care to use. But then the cloud emerged, and mobile, and social media, and IoT; the world of IT has never been the same. Today's businesses are software-driven enterprises with technology capability distributed throughout the company, utilizing countless third-party cloud-based applications. This new organization requires an cultural shift in the IT organization. Read this whitepaper to learn: -How businesses can reorganize themselves into lightweight, agile, modular businesses able to respond to innovations in SaaS, mobile, and analytics -How to build a technological architecture that can accommodate new technology yet still extract value from on-premises systems -The advantages of an API-led connected architecture vs. old SOA approaches
Tags : technology, enterprise applications, best practices, business optimization, technology architecture
     MuleSoft
By: Epicor     Published Date: Apr 01, 2009
This white paper details how Web 2.0 technologies support business strategies by improving efficiency, productivity, and collaboration.
Tags : epicor, web 2.0 technologies, enterprise applications, epicor 9 solution, enhancing search results, rss
     Epicor
By: Epicor     Published Date: Apr 01, 2009
This white paper presents how to use technology systems to help your business promote corporate social responsibility.
Tags : corporate social responsibility, enterprise applications, enterprise resource planning, epicor, corporate responsibility, green it, csr, globalization
     Epicor
By: Red Hat, Inc.     Published Date: Jul 10, 2012
Is data changing the way you do business?Is it inventory sitting in your warehouse? The good news is data-driven applications enhance online customer experiences, leading to higher customer satisfaction and retention, and increased purchasing.
Tags : it planning, data, data-driven applications, data challenges, data solutions, big data solutions, big data challenges, in-memory databases
     Red Hat, Inc.
By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : next-generation firewall, byod, social media, applications, it trends, security
     Cisco
By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : next-generation firewall, byod, social media, applications, it trends, security
     Cisco
By: SocialChorus     Published Date: Jul 03, 2014
Leading brands across industries are launching Employee Advocate Marketing programs to increase employee engagement, job applications and company perception. But how do they drive these results? What are the steps they took to launch and maintain a successful employee Advocate Marketing program? Download this detailed guide and step-by-step checklist for everything you need to know to launch an employee Advocate Marketing program.
Tags : socialchorus, employee engagement, job applications, employee advocates, social media, social media marketing, employee advocacy, advocate marketing programs
     SocialChorus
By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : next-generation firewall, byod, social media, applications, it trends, security
     Cisco
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics