media

Results 2251 - 2275 of 2327Sort Results By: Published Date | Title | Company Name
Published By: GENBAND     Published Date: Apr 01, 2014
See how GENBAND offers CIOs of large multi-site enterprises effective ways to reduce telecom spend by leveraging their IP data networks for inter-site, intra-enterprise multimedia communication and consolidation of connectivity to service providers.
Tags : 
genband, enterprise, telecom, ip data networks, service provider networks
    
GENBAND
Published By: Vocus     Published Date: Mar 19, 2014
Discover which metrics matter!
Tags : 
marketing software, social media marketing, digital marketing, media list, marketing automation, internet marketing, journalists, facebook marketing
    
Vocus
Published By: EMC     Published Date: Dec 16, 2014
In this White Paper, IDC examines the evolution of storage controllers, from traditional HDD controllers to "hybrid array" (i.e., traditional storage arrays that can accommodate flash drives) controllers capable of optimizing flash media and multi- core CPUs.
Tags : 
flash, mcx, idc, emc
    
EMC
Published By: Adobe     Published Date: May 15, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014.
Tags : 
adobe, adobe digital index, benchmarking, marketing, smartphone, tablet, stick rate, conversion rate
    
Adobe
Published By: Adobe     Published Date: Aug 14, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014. Get the report now to learn and discover: - New mobile usage trends - The power of continual site improvement - Why time spent on websites is higher than ever
Tags : 
online marketing, marketing practices, mobile usage trends
    
Adobe
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: AdRoll     Published Date: Oct 05, 2016
Reach your customers on one of the world’s most popular social platforms. Download this white paper to learn more.
Tags : 
social media, instagram, advertising, mobile
    
AdRoll
Published By: AdRoll     Published Date: Dec 20, 2017
Reach your customers on one of the world’s most popular social platforms. Due to hundreds of millions of active daily users, Instagram is becoming a key component in every cross-device marketing strategy. To help you reach and engage a wider audience, we put together The Performance Advertiser’s Guide to Instagram. Highlights from the guide: Guidelines for Instagram ad formats Essential tips for Instagram advertising success How to track the performance of your campaigns How other companies have used Instagram to grow their business And more!
Tags : 
instagram, social media, cross-device marketing, performance advertising
    
AdRoll
Published By: Trapit     Published Date: Nov 17, 2014
Download this webinar to learn how marketers can successfully build brands by giving employees an easy and fun way to share content to their social networks.
Tags : 
employee advocacy, brand advocacy, social media marketing strategy, plan social media, social marketing, company advocacy, motivating employee, software social media
    
Trapit
Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning
    
Meltwater
Published By: CA Technologies     Published Date: Aug 10, 2015
As organizações ágeis de hoje delegam às equipes de operações um tremendo desafio: implementar novas versões em produção imediatamente depois de completar o desenvolvimento e a prova. Para garantir a implementação exitosa dos aplicativos, se requer um processo automático e transparente. Este proceso é conhecido como Zero Touch Deployment™. Este white paper revisa os dois enfoques de Zero Touch Deployment: uma solução baseada em scripts e uma plataforma de automatização da implementação. O artigo explica como cada um pode resolver os principais desafios tecnológicos e organizacionais que enfrentam as organizações ágeis quando elas se dispõem a por em prática um sistema de implementação automática.
Tags : 
    
CA Technologies
Published By: Intel Security     Published Date: Oct 20, 2015
Success of an effective threat defense strategy.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
    
Intel Security
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: Lumesse     Published Date: Feb 13, 2015
This White Paper illustrates the trends that increase the complexity of recruitment, causing talent acquisition managers and HR leaders significant concern: the emergence of new technology, changing demographics and recruiting across borders and increasing globalisation.
Tags : 
use of technology in recruitment, new recruitment methods, mobile jobseekers
    
Lumesse
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: Gigya     Published Date: Jun 08, 2015
As TV Everywhere (TVE) adoption rises alongside multi-device content consumption, media companies should look to revamp their engagement strategies. To engage with viewers across different devices, it’s important to have an in-depth understanding of how this process is spearheaded with user authentication, particularly via TVE.
Tags : 
tv everywhere, multi-device content consumption, engagement strategies, authentication process, tve benefits
    
Gigya
Published By: Cherwell Software     Published Date: Jan 28, 2019
Domino’s was heavily reliant on a legacy service desk tool. When Karen Copley was hired to oversee all aspects of service delivery for the organisation, she immediately recognised that this tool needed to be replaced. According to Karen, it offered no way to obtain management information. There was also limited automation capabilities. In addition, at this time, Domino’s wanted to mature its service desk operation by adhering to ITIL® framework best practices. “We decided we needed a more robust, ITIL® framework compliant service desk tool. I knew Cherwell® Service Management software was in the Gartner Magic Quadrant, and I had read good things about the company. I therefore decided to invite Cherwell Software and a couple of other vendors to bid for the business.”
Tags : 
    
Cherwell Software
Published By: IBM     Published Date: Jul 08, 2015
For years, organizations have recognized that a better understanding of customers can translate to more sales, increased customer satisfaction and reduced customer churn. Initiatives focused on a 360-degree view of the customer have gone a long way toward providing those benefits by synthesizing customer profiles, sales history and other structured data from multiple sources across the enterprise. But today, customer-centric organizations are discovering that there is more opportunity for growth when they enhance that 360-degree view with information from more sources, both within and beyond the enterprise (see Figure 1). Information in email messages, unstructured documents and social media sentiments—previously beyond reach—is now extending the 360-degree view.
Tags : 
ibm, e360, customer satisfaction, customer retention, sales history, big data
    
IBM
Published By: FICO     Published Date: Dec 04, 2017
As consumers, we’re all having more experiences that seem almost magical: You’re in a mall when suddenly your smartphone beeps. It’s an offer for 20% off a pair of shoes you’ve been looking at online — from the store you just walked past! As business people, we know it’s not magic, but rather analytics powering these outstanding customer experiences. Analytics have evolved to the point where they answer an expanding range of useful questions. But understanding the different types of analytics – descriptive, diagnostic, predictive and prescriptive - and how to use them in your business can be challenging. Download the eBook to learn about the least understood – yet most powerful – tool in the analytic arsenal. Prescriptive analytics enable you to estimate and compare the likely outcomes of any number of actions, and choose the very best action to advance business objectives. Getting there isn’t as difficult as you think. Start your journey. Download the eBook today.
Tags : 
profits, analytics, credit, social, media, services, customer, consumers
    
FICO
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Take a look at our cloud-first, modern Windows management and security solution that fundamentally changes how IT approaches PC lifecycle management. Join us to learn how unified endpoint management helps organizations lower the cost of managing Windows deployments; streamlines securing endpoints, apps and data on any network; and delivers peak user experience across any Windows device. • Consolidate your Windows management across devices on or off the domain • Deliver and install Win32 software more reliably and quickly • Deploy security patches instantly and remediate vulnerabilities faster • Unify your endpoint management functions across desktops and mobile • First look at how organizations are using UEM for Windows 10
Tags : 
    
VMware AirWatch
Published By: Pega     Published Date: Jun 21, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems.
Tags : 
    
Pega
Published By: Mitel     Published Date: Dec 15, 2016
You know the way we communicate with each other has evolved, but what about the way your business communicates with your customers? A third of the US population is made up of millennials that use multiple channels when reaching out or making a purchase, so how does this shift affect your bottom line? More importantly, how closely aligned is your customer experience strategy with how customers are buying? Looking for some clarity? Check out this infographic for a clear understanding of how customers are shopping, why they abandon your transactions, and what steps you can take to keep them happy.
Tags : 
digital media, web presence, customer care, digital communications, mobile
    
Mitel
Published By: IBM     Published Date: Nov 20, 2015
A survey based digital tool that gives a score on level of maturity
Tags : 
ibm, media, entertainment, analytics, digital
    
IBM
Start   Previous    80 81 82 83 84 85 86 87 88 89 90 91 92 93 94    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.