RSS feed Get our RSS feed

News by Topic

scribe

Results 251 - 275 of 857Sort Results By: Published Date | Title | Company Name
By: SubscriberMail     Published Date: Dec 12, 2008
Your email subscribers are likely feeling the economic crunch as much as—if not more than—your business. With that in mind, now is definitely the right time to keep your audience informed of any savings or promotional offers that are available. Even if business has been strong enough in the past that you were able to avoid offering special incentives, marketing in a time of economic uncertainty needs to be performed with an eye toward the future. Fostering customer loyalty now via special offers can pay dividends down the road when the economy rights itself.
Tags : subscribermail, email marketing, online marketing, e-marketing, email marketing services/software
     SubscriberMail
By: Infacta     Published Date: Jan 22, 2007
The lines of permission marketing are not as grey as many would suggest. It’s pretty clear cut. You either have someone’s permission to send them commerical email or you don’t. Listen to this podcast to learn more.
Tags : permission based email, list management, subscriber management, email marketing, email marketing services/software
     Infacta
By: Infacta     Published Date: Jan 22, 2007
Just because somebody subscribes to your email newsletter doesn’t mean that they read it. Here are 3 tips to turn your passive subscribers into active readers.
Tags : subscribers, email subscribers, audience engagement, email marketing services/software
     Infacta
By: TRUSTe     Published Date: Oct 28, 2008
See how Cheapflights improved lead quality while gathering over one million opt-in newsletter registrations and increasing monthly site registrations by 26%.
Tags : truste, cheapflights, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste
     TRUSTe
By: EMC Backup & Recovery Solutions     Published Date: Oct 16, 2009
This data sheet describes how EMC Avamar backup and recovery software provides fast, efficient data protection for VMware environments. It explains Avamar support for deduplicated guest- and image-level daily full backups; and flexible Avamar server deployment options.
Tags : emc, data domain, efficiency, api, vmware, server consolidation, servers, data integrity
     EMC Backup & Recovery Solutions
By: EMC Backup & Recovery Solutions     Published Date: Apr 29, 2010
This white paper describes components of the VMware vSphere and VMware View solutions and discusses options for protecting these environments using EMC Avamar with global source-based data deduplication.
Tags : emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup
     EMC Backup & Recovery Solutions
By: EMC     Published Date: Apr 15, 2011
This white paper introduces the EMC Fast VP technology and describes its features, functions, and management.
Tags : emc fast vp, unified storage system, fast cache, lun management, storage tier
     EMC
By: EMC     Published Date: Apr 15, 2011
This white paper discusses Unisphere for VNXe. It describes the Unisphere for VNXe interface, and explains how an IT generalist can easily complete storage-related tasks using this intuitive, easy-to-use interface.
Tags : emc unisphere, vnxe, storage management, connection utility, configuration wizard, cifs, iscsi, nfs
     EMC
By: Citrix Systems     Published Date: Jan 29, 2013
This white paper describes options for a mobile services-focused computing architecture that empowers productivity through work-shifting, consumerization and collaboration.
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: Winshuttle     Published Date: Dec 04, 2006
This white paper describes how many companies are realizing significant productivity gains by empowering the business users with tools to transfer their own data between spreadsheets and SAP.
Tags : sap, spreadsheet, spreadsheets, excel, productivity, finance, accounting, erp
     Winshuttle
By: Affirm     Published Date: Jan 05, 2016
You thought EMV was supposed to help eliminate fraud, right? While it will reduce card-present fraud, there is a high likelihood that card-not-present (i.e. e-commerce) fraud will increase now that EMV has been implemented in the U.S.. In fact, experts have predicted an increase in online fraud similar to what was seen after the European rollout of EMV. As a merchant, are you prepared for such an increase? This article describes the EMV implementation and gives actionable tips for how online retailers should prepare in order to avoid a potential onslaught of fraud.
Tags : affirm, ecommerce, fraud, risk, emv, online retail, e-commerce
     Affirm
By: Affirm     Published Date: Jan 22, 2016
You thought EMV was supposed to help eliminate fraud, right? While it will reduce card-present fraud, there is a high likelihood that card-not-present (i.e. e-commerce) fraud will increase now that EMV has been implemented in the U.S.. In fact, experts have predicted an increase in online fraud similar to what was seen after the European rollout of EMV. As a merchant, are you prepared for such an increase? This article describes the EMV implementation and gives actionable tips for how online retailers should prepare in order to avoid a potential onslaught of fraud.
Tags : affirm, ecommerce, fraud, risk, emv, online retail
     Affirm
By: SAP     Published Date: Apr 07, 2011
As organizations seek to grow beyond their current markets and activities, executives look beyond the existing business model to expand their business. This paper looks at most common areas of business model innovation, describes how organizations are leveraging innovation in different parts of their business, and shows how to implement a solid and adaptive foundation that is flexible enough to support rapid innovation.
Tags : sap, business model, adaptive enterprise, innovation
     SAP
By: SAS     Published Date: Mar 01, 2012
How does an organization make the best use of data, and what is the proper role of IT? This paper describes how organizations can foster a culture of data analytics that promotes cooperation and collaboration between IT and business.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
     SAS
By: IBM     Published Date: Aug 21, 2008
Reliability Centered Maintenance (RCM) is an advanced maintenance strategy for increasing asset availability by minimizing downtime caused by failures, reducing an asset’s total cost of ownership and increasing overall equipment effectiveness (OEE).This white paper describes the Reliability Centered Maintenance (RCM) process, breaking it down into seven steps including supporting information on how IBM Maximo® Asset Management supports each step of the process.
Tags : rcm, reliability centered maintenance, asset-intensive, maximo asset management, it management, infrastructure, network management, ibm mi
     IBM
By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
     CrowdStrike
By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
     Akamai Technologies
By: Bronto     Published Date: May 18, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their business and keep shoppers coming back for more. Are you ready to add a few to your tool box? To build or revamp your e-commerce program, you'll need tools to build subscriber lists in healthy ways, manage coupons, maximize transnational messages, and ping shoppers to remind them about whats waiting in their shopping cart. To stay ahead of the competition, you must also capture browse behavior and create triggered messages to nudge shoppers along in their buying journey, predict what a customer wants and recommend the right product. And, depending on your target audience, you may need to explore SMS.
Tags : 
     Bronto
By: Korenix Technology     Published Date: Aug 03, 2010
This white paper describes the surveillance video multicasting technology, highlights the benefits of IGMP as well as its integration in Korenix devices for assuring high quality video communication in surveillance applications.
Tags : igmp, igmp snooping, igmp query, ip surveillance, video surveillance, video multicast, video multicasting, video transmission
     Korenix Technology
By: IBM     Published Date: Jul 31, 2015
In its "Restoring Connections" paper based on research of telecommunications firms, IBM ‘s top ranked Institute for Business Value identified actions CSPs can take to reset customer experience and build brand loyalty through innovative, compelling, personalized services based on deep customer insight. Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : ibm, telco, customer analytics, csps, consumer behavior, brand loyalty, personalized engagement, big data
     IBM
By: IBM     Published Date: Dec 04, 2015
Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : ibm, engagement, marketing, customer profiles, customer insight, telecommunication, crm & customer care
     IBM
By: AppDynamics     Published Date: Dec 08, 2017
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.
Tags : 
     AppDynamics
By: AppDynamics     Published Date: Dec 08, 2017
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges
Tags : 
     AppDynamics
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics