social

Results 2076 - 2088 of 2088Sort Results By: Published Date | Title | Company Name
Published By: Infosys     Published Date: May 22, 2018
The company's CEO had a vision of a 'Team of Teams', based on social business collaboration. His target was to improve productivity by 30%, driven by an ability to quickly identify people with the right skills, build small teams and collaboratively solve problems, and 'fail fast' instead of wasting time on unproductive activities. Research showed this was possible: Companies reported better collaboration and a greater focus on results when using social business models. Even McKinsey Global Institute stated that social collaboration methods could improve productivity by 20-25 percent. But the company had spent 3 years trying to realize the CEO's vision. As a last throw of the dice, Infosys was asked to provide a proof of concept to show they could deliver these benefits where others had failed.
Tags : 
ceo, social, business
    
Infosys
Published By: Marketo     Published Date: Jul 11, 2013
Use this worksheet to determine if your company is ready to use marketing automation.
Tags : 
marketing automation, lead generation, marketo, email marketing, new marketing, social marketing, mobile marketing, marketing automation worksheet, roi
    
Marketo
Published By: IBM Unica     Published Date: Feb 09, 2012
With the explosion of social networks, mobile devices, and micro sites, marketing executives are challenged to gain a truly integrated view of customer behavior across the range of established and emerging channels.
Tags : 
forbes, marketing, customer satisfaction, roi, cmo, marketing solutions, marketing budgets, online marketing, internet marketing
    
IBM Unica
Published By: Adobe     Published Date: Aug 22, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
social marketing, social network ad, ad spending trends
    
Adobe
Published By: Rapid7     Published Date: Mar 19, 2014
This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.
Tags : 
rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection
    
Rapid7
Published By: Moreover Technologies     Published Date: Mar 09, 2011
Looking for the proverbial business intelligence needle in a haystack? Need online media monitoring that's laser-focused on business-not consumer-interests? Want both news and social media posts unified and delivered to you through a convenient single-portal report? If so, look beyond Google for focused, customizable business information.
Tags : 
moreover, google, consumer, business information, social media, news
    
Moreover Technologies
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: Mimecast     Published Date: Aug 19, 2015
A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security
    
Mimecast
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2017
The modern recruiter has it far from easy. While the soft skills of recruiting are still relevant — good communication skills, outgoing personality, and keen intuition — the tech-driven world of work requires talent acquisition specialists to navigate a variety of tools, data analytics, and social media platforms. Recruiters can no longer just be great “people people”—they need to be great tech people, too.
Tags : 
recruitment, human resources, communication, data analytics, social media
    
Cornerstone OnDemand
Published By: Kenandy     Published Date: Jan 28, 2015
Are you considering moving some or all of your ERP to the cloud? If so, you’re aware of the many bene?ts of cloud ERP, including quick time to value, social and mobile collaboration for your users, and the ?exibility to rapidly adapt your processes as your business changes. But, you may be asking—how should I start my journey to cloud ERP? Which is the best route for my company? In this white paper, we illuminate the high-value routes customers take to cloud ERP and drivers behind their choices. You will learn about the options to consider along the way and how to stay on track. Whatever road you choose, it’s important that you get started. Cloud ERP is not just a destination, it’s a transformation that will give your company faster time to value and the ?exibility to quickly adapt to changing business needs.
Tags : 
cloud erp, quick time to value, high-value routes
    
Kenandy
Published By: Canon Solutions America     Published Date: Jul 15, 2019
It’s hard to imagine running a school without printers and multifunction devices. But you should know they can put your students’ personal data at risk. Learn how you can help your school avoid the financial, legal, and social consequences of data breach.
Tags : 
    
Canon Solutions America
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media
    
SnowFlake
Start   Previous    70 71 72 73 74 75 76 77 78 79 80 81 82 83 84     Next   End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.