RSS feed Get our RSS feed

News by Topic

strategies

Results 51 - 75 of 1741Sort Results By: Published Date | Title | Company Name
By: Viavi Solutions     Published Date: Apr 01, 2015
Ready to effectively monitor in the cloud? It’s time to go beyond vendor provided data and establish performance metrics and baselines that matter. The 3 Key Cloud Monitoring Metrics IT Brief helps you identify cloud monitoring challenges while providing the strategies to succeed.
Tags : cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics
     Viavi Solutions
By: Bridgeline Digital     Published Date: Oct 28, 2013
This eBook is for designers that are tired of creating the same bland emails, the content marketers who find themselves at a loss while coming up with the right words in their subject line, and, most of all, for the frustrated marketing teams that are sick of wondering why their campaigns fail to produce desired results.
Tags : email marketing, email marketing campaign, email marketing strategies, content marketing, maximizing customer engagement, email design, autoresponders, automated emails
     Bridgeline Digital
By: Entelo     Published Date: Sep 06, 2017
Engaging with candidates is a long game. To be remembered, it's crucial to take the necessary steps to develop effective relationships, grow your network, and cleverly capture candidates' attention. Join TripAdvisor's Jeff McCarthy and Lori Busch as they share how to leverage recruitment marketing and outreach platforms to improve response rates, influence long-term relationships, and stay top of mind with candidates. In this webinar, you'll learn: TripAdvisor's messaging strategies for increasing open rates by 15% How to structure a multi-touch nurturing workflow to sustain a relationship with candidates A breakdown of TripAdvisor's Attract, Engage, and Convert model Why they emphasize employee-generated content as vital to branding and candidate engagement
Tags : 
     Entelo
By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft
     Lumension
By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : cyber security, application security, risk management, third party applications, endpoint security, cyber crime
     Lumension
By: The Starr Conspiracy     Published Date: Sep 19, 2017
It doesn’t matter if your goals involve brand awareness, functional association, or demand generation. Brands that fail to integrate an earned media strategy with paid and owned media strategies are missing key opportunities to influence the buyer’s journey. If you ignore earned media channels, you do so at the risk of missing that ideal customer. In this white paper, we’ll outline the top three reasons you need an integrated approach — that includes PR — to achieve great brand awareness
Tags : 
     The Starr Conspiracy
By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
     Lumension
By: InfusionSoft     Published Date: Apr 07, 2011
Infusionsoft, the Leader in Marketing Automation Software has created a simple Guidebook to help business owners navigate online growth.
Tags : internet marketing, infusionsoft, small business success, website effectiveness, traffic generation, list building, contact management, e-mail marketing
     InfusionSoft
By: Oracle     Published Date: Feb 24, 2015
30 seconds or less. The average length of time that consumers spend reading or listening to online marketing communications . Marketers today are now equipped with the strategies and technologies to better capture consumer attention. To do this, they need to orchestrate individualized customer experiences across the digital channels. Read on for a statistical profile of today’s distracted consumer, followed by actionable tips for effectively communicating and converting this new type of consumer.
Tags : oracle, marketing, consumers, attention, message, distractions, communications, conversions
     Oracle
By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction
     IBM
By: Reputation.com     Published Date: Oct 02, 2017
The new year is underway, but your organization’s online reputation precedes you. It’s time to take a look at what’s influencing public perception to prepare for the year ahead. In this report, we examine four key trends guiding the direction of Online Reputation Management strategies in 2017, and provide recommendations for capitalizing on those trends moving forward.
Tags : 
     Reputation.com
By: IBM     Published Date: Oct 15, 2013
Discover the four key dimensions to personalized web marketing, and learn from the real life successes of enterprises that have made the personalized web a core part of their growth strategies.As you can see, web marketing can achieve comparable success when you make the four personalization steps your own.
Tags : ibm unica, click-throughs, personalizing web experience, customer needs, data sources, specific site analyses, across channels, sales and marketing opportunities
     IBM
By: Workfront     Published Date: Sep 18, 2014
As marketers, we know our best work is fueled by time to think, brainstorm and explore different directions. But in a world of endless email, status meetings and countless other distractions, finding time to do great work seems to be a lofty dream rather than reality. Check out this white paper by MarketingProfs to learn 4 best practices to find time to do your best, most satisfying work. You’ll learn how to: • Reduce interruptions • Spend less time tracking work • Reduce random work requests • Stop chasing information and requirements
Tags : strategies, creative work, brainstorm, status meetings, work requests, information and requirements
     Workfront
By: IBM     Published Date: Dec 18, 2012
Here are four smart security challenges and a smart strategy to manage risk.
Tags : 
     IBM
By: F5 Networks Inc     Published Date: Mar 30, 2018
Some organizations have carefully crafted strategies for cloud technology adoption; but for most, their journey to the cloud has been an ad hoc affair. Many have deployed applications in a number of different clouds: public clouds, private clouds, and even combinations of the two. While public and private clouds demonstrate how effective they can be in enabling companies to deploy applications quickly, hybrid cloud strategies prove the value of hosting applications in both cloud and on-premises environments. Similarly, SaaS offerings transform the way businesses interact with customers, partners, and vendors.
Tags : cloud, public, private, technology, organizations, strategies, business
     F5 Networks Inc
By: Oracle HCM Cloud     Published Date: Jun 07, 2016
At the heart of organizational transformation are people and culture. For executives charged with managing talent, big changes can translate into big challenges. How do you help employees navigate the new work environment? Here are four proven strategies that help HR leaders inspire and retain top talent.
Tags : 
     Oracle HCM Cloud
By: UPS     Published Date: May 24, 2017
One-fourth of all healthcare products today are temperature-sensitive and that number is growing. For many pharmaceutical or biologic shipments, 2 degrees Celsius is all that separates medicine from becoming spoiled inventory and a costly write-off. Here are four risk mitigation strategies for temperature-sensitive shipments.
Tags : strategies, healthcare, shipments, ups, temperature-sensitive
     UPS
By: effectual     Published Date: Dec 03, 2018
Multi-Cloud, hybrid strategies add complexity Nearly 60% of businesses say they're moving toward hybrid IT enviornments that integrate on-premises systems and public cloud resources and enable workloads to be pleaced according to performance, security and dependency requirements. Identifying the best execution venue is a key cloud hurdle.
Tags : cloud enablement, cloud optimization, digital transformation, cloud migration, cloud computing, cloud architecture
     effectual
By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
     Tenable
By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
     Great Bay Software
By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
     Great Bay Software
By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
     Great Bay Software
By: Spredfast, Inc.     Published Date: Oct 22, 2014
Here at Spredfast, we were as caught up in the World Cup as the rest of the planet. As much as we enjoyed watching the strategy on the field, we were also really excited about the social strategies implemented during the tournament by savvy brands and media properties.
Tags : spredfast, marketing, campaign tips, world cup, media properties, social content, technologies, integrations
     Spredfast, Inc.
By: Spredfast, Inc.     Published Date: Oct 22, 2014
Here at Spredfast, we were as caught up in the World Cup as the rest of the planet. As much as we enjoyed watching the strategy on the field, we were also really excited about the social strategies implemented during the tournament by savvy brands and media properties.
Tags : spredfast, marketing, campaign tips, world cup, media properties, social content, technologies, integrations
     Spredfast, Inc.
By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"Today’s workforce has become more dynamic than ever. Is your performance management strategy caught up to the times? Traditional performance management strategies often alienate employees, inhibit growth, occur too infrequently, and produce a nightmare of paperwork. Check out these five simple talent management trends that can help you streamline your performance initiatives: • Reduce or eliminate documentation • Focus more on coaching and development • Move toward guidance vs. guidelines Download 5 Easily Adoptable Trends in Performance Management and learn how to enable managers to create an honest, open, and free-flowing approach to performance management. Get higher engagement and greater productivity from your employees by following these trends. "
Tags : 
     Cornerstone OnDemand
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics