RSS feed Get our RSS feed

News by Topic

social business

Results 201 - 225 of 485Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
     CA Technologies
By: IBM     Published Date: Sep 04, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : ibm, collaboration, email communication, real time communication, business communication, social software
     IBM
By: IBM     Published Date: Nov 13, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : email capabilities, integration, social software, business operations
     IBM
By: Sysomos     Published Date: Oct 24, 2012
The fast food business is worth more than $200 billion. This report digs into social media conversations to discover who's winning the burger wars. Includes social media ratings for Burger King, McDonald's, KFC, and Taco Bell.
Tags : sysomos, heartbeat, map, social media monitoring tools, business intelligence, analysis, analytics, dashboard
     Sysomos
By: Brandwatch     Published Date: Feb 25, 2015
This guide features tips, tricks and case studies to help you learn how to identify and utilize influencers, including: • How influencer marketing works • Working examples from a variety of brands • How to evaluate and measure the success of your influencer campaigns
Tags : social media, social analytics, social media monitoring, influencer marketing, influencer campaigns, social listening, social business intelligence, social media management
     Brandwatch
By: Jive     Published Date: Feb 07, 2013
Download this infographic to see the results of a study by a top 3 global consulting firm on the impact of social business in the enterprise.
Tags : social media, enterprise, infographic, business, collaboration
     Jive
By: IBM     Published Date: Jan 09, 2013
Hear Alistair Rennie, General Manager of IBM Collaboration Solutions, talk about the application of social networking tools and culture to business roles, processes, and outcomes, and the positive correlation between improved operating margins.
Tags : social business, ibm, insights, alistair rennie, collaboration, solutions
     IBM
By: Oracle     Published Date: Jan 07, 2014
Who are the top brands on Instagram, and what are their secrets to success with visuals - image and video - in this white-hot platform?
Tags : socially enabled enterprise, social business, social marketing, social media management, social relationship management, social marketing platform, social marketing tools, social media marketing
     Oracle
By: GoToMeeting     Published Date: Oct 08, 2013
The use of too many communication channels can actually hinder collaboration. That's why many organizations are now moving toward a single interface for all business communications. Enterprises realize they must improve the communication and collaboration experience but are still figuring out how social media integrates within corporate culture and business process. This Yankee Group white paper explores how built-for-business social workspaces enable employees to more effectively work together and move projects to completion faster.
Tags : social, marketing, citrix podio, social media, pim bilderbeek, brian partridge, yankee group, connectivity
     GoToMeeting
By: Oracle     Published Date: Apr 10, 2014
The very best CFOs are becoming “technology evangelists”, investing in the latest mobile, social, analytical and cloud technologies to modernize their finance organizations and become more strategic partners to the business. Find out more – download the report, “Empowering Modern Finance: The CFO as Technology Evangelist.”
Tags : cloud, finance, saas, big data, social, mobile, analytics, modernization
     Oracle
By: Brandwatch     Published Date: Feb 25, 2015
This guide is an introductory overview of best practices for crisis and issues communications in the social media age, focusing on: • What reputation monitoring actually means • How to identify a crisis & assess the damage • Real-world examples from Marriott, United Airlines and Walmart/Asda
Tags : social media, social analytics, social media monitoring, crisis management, reputation management, social listening, social business intelligence, brand monitoring
     Brandwatch
By: Janrain, Inc.     Published Date: Jan 02, 2014
The rise of the social consumer creates tremendous opportunities for organizations to develop deeper relationships with their customers in support of their business objectives. Whether your goals are to acquire new users, increase on-site engagement, or collect and leverage customer insights (or all of the above), a comprehensive user management platform solution will play a critical role.
Tags : user management, on-site engagement, customer insights, user acquisition, user engagement, customer experience/engagement
     Janrain, Inc.
By: IBM     Published Date: Jan 10, 2014
IBM conducted more than 1,700 in-depth, face-to-face interviews with CEOs, general managers and senior public sector leaders from around the globe. Our newest CEO Study, the largest of its type ever undertaken, is the latest in the IBM C-suite Study Series. It explores how CEOs are responding to the complexity of increasingly interconnected organizations, markets, societies and governments – what we call the connected economy. Three themes emerged. Today's CEOs must: - Empower employees through values - Engage customers as individuals - Amplify innovation with partnerships Register now to access the insights that can help you lead more effectively through impactful connections with your employees, customers and partners.
Tags : social media, b2b, global economy, smarter workforce, talent, talent analytics, human capital, learning organization
     IBM
By: Hubspot     Published Date: Apr 23, 2013
What appears to be the fastest-growing social media site ever has become a huge traffic referral for all businesses. An increasing number of companies are leveraging the platform to reach a new audience, increase visits to their websites, and generate leads or retail sales. And guess what? It's working.
Tags : pinterest, social media, hubspot, driving traffic, inbound marketing, social media marketing
     Hubspot
By: IBM     Published Date: Apr 10, 2012
Join us to hear how Social Business practices can help address these challenges by: delivering value to empowered customers; fostering lasting connections; capturing value and measuring results.
Tags : ibm, marketing, social business, cmo, customer satisfaction, customer connection, interactive marketing, crm solutions/software
     IBM
By: Clarabridge     Published Date: Dec 03, 2013
Transforming the customer contact center from cost center to a strategic asset by leveraging the voice of the customer
Tags : clarabridge, customer behaviors, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty
     Clarabridge
By: Meltwater     Published Date: Jan 16, 2015
Your customers and competition are talking. Are you listening? Social listening is the most significant technology to hit marketing since social media itself. But marketing isn’t the only department that can utilize social listening: your entire business organization can use social listening to inform its programs, products and business decisions.
Tags : meltwater, social media monitoring, media monitoring, social media analytics, media analytics, pr software, social marketing software, social marketing listening
     Meltwater
By: IBM     Published Date: Aug 10, 2009
This webinar discusses IBM Lotus’ venture in the Software-as-a-Service (Saas) market through LotusLive. LotusLive is an integrated collaborative and social networking services connected to relevant business services and applications.
Tags : webinar, lotus, lotuslive, ibm, saas, software-as-a-service, social networking, integrated collaborative
     IBM
By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
     AWS
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics