web sites

Results 151 - 175 of 274Sort Results By: Published Date | Title | Company Name
Published By: Hubspot     Published Date: Apr 23, 2013
What appears to be the fastest-growing social media site ever has become a huge traffic referral for all businesses. An increasing number of companies are leveraging the platform to reach a new audience, increase visits to their websites, and generate leads or retail sales. And guess what? It's working.
Tags : 
pinterest, social media, hubspot, driving traffic, inbound marketing, social media marketing
    
Hubspot
Published By: Magento     Published Date: Feb 13, 2018
TURN MORE SITE VISITS INTO SALES As acquisition costs rise, online merchants must maximize conversion rates of the customers who come to their websites. Optimizing for conversion is certainly an ongoing process. Fill out the form to receive your copy of the free increasing conversion eBook.
Tags : 
    
Magento
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Achieving a 360-degree view of customers has become increasingly challenging as companies embrace omni-channel strategies, engaging customers across websites, mobile, call centers, social media, physical sites, and beyond. Learn how software solutions in AWS Marketplace can automate data lake analysis, enabling self-service platforms for analysis that expand and enhance personalization while deepening customer understanding so you can spend more time acting on insights.
Tags : 
    
AWS - ROI DNA
Published By: Acquia     Published Date: Sep 14, 2011
With Drupal, it is easy to produce engaging, content rich websites, incorporate both structured and unstructured data sources, and blend published information with user-generated content.
Tags : 
acquia, technology, drupal, assmebled web, content rich websites, user-generated content, data sources
    
Acquia
Published By: IBM     Published Date: Mar 28, 2008
Managing different international hotel brands is far from simple. Each brand needs to develop and preserve its own identity in order to drive differentiation and minimize inter-brand competition. In the modern hospitality sector, Web sites provide an important first point of contact for potential customers, so it is particularly important for each brand to have its own individual look and feel on the Web.
Tags : 
    
IBM
Published By: IBM     Published Date: Mar 04, 2009
Many of your customers prefer doing business with you online. They go to your Web sites to learn about your products and services, to find products and/or services that address their needs, to configure and price the products and/or service s that they’d like to buy, and to purchase those products and/or services. They also set up and manage accounts with you. When those customers are consumers, we call these activities B2C (business to consumer) ecommerce.
Tags : 
ibm, ibm websphere commerce, customer service, b2c, business to consumer, ecommerce, b2b, web-sphere commerce saas, ibm omnifind discov-ery edition, value units, ibm websphere commerce, ecommerce, e-commerce, b2c, cross-channel, customer experience, ewebsphere
    
IBM
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
How can a company decide what the right decision is when it comes to outsourcing? A growing percentage of companies are reaping the benefits of leveraging technology to streamline business operations and automate their business processes to create greater efficiencies by turning to outsourced web hosting. In today's economy, more and more small to medium sized businesses with no IT staff, or an already over-burdened IT staff, are finding there is no other choice. However, even with companies that have the resources necessary to host their own websites are looking to outsource their hosting needs. For these companies not resources, but the issue of ensuring that the hosting environment is secure, reliable, and scalable is why they look towards outsourcing. Learn the pros and cons of outsourcing and how NeoSpire can help.
Tags : 
web hosting, neospire, microsoft sql server, oracle, mysql, hosting options, security, costs, minimal operating costs, freeing assets, aberdeen group
    
NeoSpire Managed Hosting
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
Tags : 
globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
    
Globalsign Inc.
Published By: IBM Unica     Published Date: Feb 09, 2012
Conventionally, marketers use web analytics at an aggregate level. They seek to report on the performance of their web sites and online advertising, so they can adjust their efforts to improve the results. This is an extremely worthwhile application that can deliver excellent return on investment.
Tags : 
ibm, web analytics, data analytics, customer engagement, data management, marketing, marketing research
    
IBM Unica
Published By: Polycom     Published Date: Apr 30, 2013
In December 2012, Wainhouse Research (WR) and Polycom jointly created and fielded a WR-branded survey focused on the benefits that organizations realize via the use of video conferencing. Invitations to participate in the survey were released in numerous ways including: - Via email invites to a list of Polycom end-user contacts - Via email invites to a list of WR end-user contacts - Via clickable banners on numerous websites This document provides a top-level view of the survey data, along with some additional findings and observations.
Tags : 
video conferencing, telepresence, end-user, video conferencing, video collaboration
    
Polycom
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : 
mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices
    
CDW-Trend Micro
Published By: craftersoftware     Published Date: Sep 19, 2013
Attention Java Developers: Learn how to build content rich enterprise websites with the most modern Java development tools and Web CMS
Tags : 
    
craftersoftware
Published By: Sitecore     Published Date: Oct 18, 2016
In a digital era where 74% of online consumers get frustrated with websites when content appears that has nothing to do with their interests, it’s time for marketers to think differently about how they personalize the shopping experience, and we’ll show you how. Download now!
Tags : 
    
Sitecore
Published By: Ektron     Published Date: Apr 08, 2008
As the Internet evolves, users become more and more savvy about what they want from the experience. Web sites are updated daily when they used to change monthly, and social networking sites such as Facebook and Myspace are checked more often than e-mail. Users know what they want and where to get it.
Tags : 
intranets, ektron, facebook, myspace, user experience, twitter, social networking, support, infrastructure
    
Ektron
Published By: Ektron     Published Date: Feb 04, 2009
As Web sites move toward a richer user experience, rich internet applications (RIAs) are becoming the method of choice to dynamically engage site visitors. But even as sites are designed around RIAs built on Microsoft Silverlight and Adobe Flex, businesses and organizations are looking for the best possible ways to manage the data that these Web applications rely on.
Tags : 
ria, html, rich internet applications, multimedia, data management, silverlight, adobe flex
    
Ektron
Published By: Tealium     Published Date: Dec 15, 2011
Tags slow down web sites. Tag management systems provide a solution using a number of methodologies ranging from asynchronous tagging, conditional loading and tag killing to improve site performance.
Tags : 
tag management, tag management system, universal tag, container tag, pixel management, site performance, web analytics, web analytics implementation, marketing attribution, integrated marketing, digital marketing, page tag, site tag, site speed, tagging, page code, tracking code, omniture, google analytics, webtrends
    
Tealium
Published By: SAS     Published Date: Apr 25, 2017
Whether you call them customers, clients, patrons, guests or patients, customers are your organization’s most important asset. And that means customer loyalty should be among your top priorities. No matter when or where the customer journey begins – from websites and online chat to physical locations and call centers – customers expect you to provide a unique and personal experience. How can you use data and analytics to recognize your best customers across channels and know exactly where they are in their customer journey? Keep reading to find out.
Tags : 
    
SAS
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: PEER 1 Hosting     Published Date: Dec 16, 2013
A Peer1 Guide to Ramping up eCommerce Websites for the Holidays : 18 Critical Steps to Prepare Your Site for Seasonal Traffic.
Tags : 
peer 1 hosting, seasonal traffic, peer1 guide, ecommerce, website traffic, holiday revenues
    
PEER 1 Hosting
Published By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : 
apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
    
Dyn
Published By: IBM     Published Date: Jun 13, 2016
Attracting today’s savvy candidate requires much more than a creative job description and a flattering email message. The transparency provided by web sites such as Glassdoor combined with a millennial desire for meaningful work and corporate responsibility have the upped the ante when it comes to employer brand and candidate experience. While many firms have good intentions when it comes to employer brand, these intentions aren’t always translated to action, leaving many candidates feeling frustrated as they move through the process. New hires need confirmation that everything they were told in the interview processes is not only accurate, but even better than expected. When the onboarding process falls short of those expectations, candidates immediately question their decision to accept the offer and retention efforts in jeopardy. Join this webcast to learn how to avoid costly new-hire attrition in your organization.
Tags : 
ibm, recruiting, onboarding, talent acquisition, new-hire attrition
    
IBM
Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media
    
SnowFlake
Published By: Sysomos     Published Date: Aug 01, 2011
This paper is designed to help individuals responsible for portions of their company's websites - PR and IR, professionals, marketing, product and HR managers, to name a few - be more effective.
Tags : 
marketwire, b2b marketers, content marketing, roi, social media, inbound marketing, conversation, rich web content, search engine visibility, content strategy
    
Sysomos
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.