RSS feed Get our RSS feed

News by Topic

web sites

Results 151 - 175 of 258Sort Results By: Published Date | Title | Company Name
By: Ektron     Published Date: Apr 08, 2008
As the Internet evolves, users become more and more savvy about what they want from the experience. Web sites are updated daily when they used to change monthly, and social networking sites such as Facebook and Myspace are checked more often than e-mail. Users know what they want and where to get it.
Tags : intranets, ektron, facebook, myspace, user experience, twitter, social networking, support
     Ektron
By: Ektron     Published Date: Feb 04, 2009
As Web sites move toward a richer user experience, rich internet applications (RIAs) are becoming the method of choice to dynamically engage site visitors. But even as sites are designed around RIAs built on Microsoft Silverlight and Adobe Flex, businesses and organizations are looking for the best possible ways to manage the data that these Web applications rely on.
Tags : ria, html, rich internet applications, multimedia, data management, silverlight, adobe flex
     Ektron
By: Tealium     Published Date: Dec 15, 2011
Tags slow down web sites. Tag management systems provide a solution using a number of methodologies ranging from asynchronous tagging, conditional loading and tag killing to improve site performance.
Tags : tag management, tag management system, universal tag, container tag, pixel management, site performance, web analytics, web analytics implementation
     Tealium
By: SAS     Published Date: Apr 25, 2017
Whether you call them customers, clients, patrons, guests or patients, customers are your organization’s most important asset. And that means customer loyalty should be among your top priorities. No matter when or where the customer journey begins – from websites and online chat to physical locations and call centers – customers expect you to provide a unique and personal experience. How can you use data and analytics to recognize your best customers across channels and know exactly where they are in their customer journey? Keep reading to find out.
Tags : 
     SAS
By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : phishing, web threat, web security, malware, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: PEER 1 Hosting     Published Date: Dec 16, 2013
A Peer1 Guide to Ramping up eCommerce Websites for the Holidays : 18 Critical Steps to Prepare Your Site for Seasonal Traffic.
Tags : peer 1 hosting, seasonal traffic, peer1 guide, ecommerce, website traffic, holiday revenues, e-commerce
     PEER 1 Hosting
By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
     Dyn
By: IBM     Published Date: Jun 13, 2016
Attracting today’s savvy candidate requires much more than a creative job description and a flattering email message. The transparency provided by web sites such as Glassdoor combined with a millennial desire for meaningful work and corporate responsibility have the upped the ante when it comes to employer brand and candidate experience. While many firms have good intentions when it comes to employer brand, these intentions aren’t always translated to action, leaving many candidates feeling frustrated as they move through the process. New hires need confirmation that everything they were told in the interview processes is not only accurate, but even better than expected. When the onboarding process falls short of those expectations, candidates immediately question their decision to accept the offer and retention efforts in jeopardy. Join this webcast to learn how to avoid costly new-hire attrition in your organization.
Tags : ibm, recruiting, onboarding, talent acquisition, new-hire attrition
     IBM
By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : snowflake, data, technology, enterprise, application, best practices, social media, storage
     SnowFlake
By: Sysomos     Published Date: Aug 01, 2011
This paper is designed to help individuals responsible for portions of their company's websites - PR and IR, professionals, marketing, product and HR managers, to name a few - be more effective.
Tags : marketwire, b2b marketers, content marketing, roi, social media, inbound marketing, conversation, rich web content
     Sysomos
By: VeriSign, Inc.     Published Date: Aug 03, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : verisign, security solution, ssl, trust, malicious activity, online businesses, sensitive information, e-commerce security
     VeriSign, Inc.
By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
     SPSS Inc.
By: Webmarketing123     Published Date: Oct 06, 2010
There are many ways to increase revenue for your business. One of them is to evaluate and improve the success of your company's website in search results. SEO (Search Engine Optimization) is the practice of optimizing a website so that it achieves higher organic rankings on search engine sites like Google, Yahoo and Bing. In fact, according to the 2009 Forbes Ad Effectiveness survey, SEO is the most effective marketing channel today.
Tags : webmarketing123, seo, search engine optimization, google, yahoo, bing, search, keywords
     Webmarketing123
By: Akamai     Published Date: Jul 01, 2011
Learn Why Protecting Your Online Channels and Applications is Critical.
Tags : akamai, security capabilities, online channel protection, web applications, ddos, distributed denial of service, threat landscape, firewall
     Akamai
By: Limelight     Published Date: Feb 15, 2013
Learn some simple ways to start assessing your digital presence.
Tags : digital presence, digital marketing, content strategy, engagement, web presence, social media, interactive marketing, webinars & web conferencing
     Limelight
By: Sitecore     Published Date: Aug 21, 2013
The first habit of highly effective websites is to embrace the fact that you need to think like your prospects and customers. Start by putting yourself in your customers’ shoes — how would they organize your website?
Tags : sitecore, sitecore ebook, effective websites, global software, management platform, traditional marketing
     Sitecore
By: Adobe     Published Date: Nov 05, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014.
Tags : adobe, adobe digital index, benchmarking, marketing, smartphone, tablet, stick rate, conversion rate
     Adobe
By: Incapsula     Published Date: Jul 11, 2014
Given today's threat landscape and the availability of inexpensive "Do it yourself DDoS attack kits,” commercial websites of all sizes have become targets of DDoS attacks. This guide offers online businesses practical guidelines and evaluation criteria for choosing their DDoS mitigation solution.
Tags : ddos, mitigation service, cloud-based, delivery, security, speed, availability, websites
     Incapsula
By: TRUSTe     Published Date: Dec 08, 2010
This paper outlines for businesses the mobile landscape and introduces best design and privacy practices for mobile websites and apps, location-aware technologies, and mobile advertising.
Tags : truste, mobile platform strategy, design, privacy and security, mobile advertising, website, apps, content management systems
     TRUSTe
By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets
     IBM
By: IBM     Published Date: Aug 14, 2014
IBM® Mobile Web Push allows marketers to influence and inform their mobile audience in innovative ways. Web push notifications are dynamically triggered for display on mobile websites based on the actions of your visitors. This personalization is possible without the complications of existing content management, advertisement servers or IT involvement.
Tags : ibm, mobile, web push, free notifications, marketing, emerging marketing
     IBM
By: IBM     Published Date: Oct 13, 2015
How open source web platforms can open your organization to attack. This paper reviews security concerns with content management systems (CMS), CMS attack metrics, and how organizations can protect websites built on a CMS platform
Tags : ibm, content management system, cms, platform
     IBM
By: IBM     Published Date: Oct 13, 2015
Understanding the Deep Web and how it can endanger your organization. This paper offers a high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P.
Tags : ibm, security, mainstream media, deep web, dark web, i2p
     IBM
By: Gomez IT     Published Date: May 23, 2011
Load testing is not a new concept and many of you have probably used various load testing tools prior to major releases with varying degrees of success. Yet, we still see new web applications or newly launched web sites for which performance is not meeting the demands of the customer base.
Tags : web performance management, compuware, gomez, andrea mulligan, load testing, saas, web applications, emarketing program
     Gomez IT
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics