tactics

Results 126 - 150 of 272Sort Results By: Published Date | Title | Company Name
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
"Successful talent acquisition today puts candidates front and center. To accomplish the goals of recruiting and retaining top talent, providing excellent patient care, and consolidating healthcare with partners, payers need to think cost effectively. Updating talent acquisition tactics and technologies doesn't have to be expensive, though. Take note of how Best-in-Class companies recruit, hire, onboard, and retain employees. Learn more."
Tags : 
    
Oracle HCM Cloud
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy and tactics to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves.
Tags : 
sdl tridion, a/b, crm, ecm, web 2.0, social networks, dam, wcm, web content management, wcm, customer experience
    
SDL Web Content Management Solutions
Published By: Cisco     Published Date: Jun 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
security, technology, security tactics, data
    
Cisco
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
    
McAfee EMEA
Published By: EMC Converged Platforms     Published Date: May 26, 2016
Land Rover BAR has sharpened its competitive edge with VCE VxRail™ Hyper-converged Infrastructure Appliance incorporating VMware virtualization and EMC VNX storage and Isilon, to accelerate collaboration on boat development and honing sailing tactics.
Tags : 
infrastructure management, business management, best practices, application performance, application management
    
EMC Converged Platforms
Published By: Marketo     Published Date: Mar 22, 2018
The Engagement Economy—the reality that we consume and market in today—is a new era where everyone and everything is connected. And in this reality, consumer expectations have shifted to require more from the brands they buy from—they seek a personal relationship that offers them value wherever they are and whenever they are ready to engage. As the Engagement Economy matures, marketers must rapidly transform their strategies, methods, and tactics in order to stay relevant. The State of Engagement offers insights on engagement from over 2,000 global consumers and marketers. Download The State of Engagement to explore how: Consumers feel marketers are faring in making them feel wanted, understood, and connected to their brands Marketers and their organizations are engaging their consumers, employees, and partners Marketers can address the gaps between their activities and consumer perception
Tags : 
    
Marketo
Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection
    
Webroot UK
Published By: Windstream     Published Date: Feb 09, 2015
The Path to Value in the Cloud, by Oxford Economics and Windstream, brings together the latest insights, tactics and strategies C-suite respondents are using to make the cloud work for them.
Tags : 
windstream, solutions, smart, personalized, service, enterprise technology, cloud, computing, data center, innovation, strategy, expansion, customer service, agility, migration, performance, complexity, system, value, roi
    
Windstream
Published By: Uberflip     Published Date: Jun 30, 2017
This eBook aims to provide you with an advanced understanding of content distribution in the B2B space, as well as provide an inside look at the tactics and channels (including social, organic search, email, and paid programs) you need to be leveraging to effectively distribute your content to your audience.
Tags : 
content distribution, ebook, delivery, channels, goals
    
Uberflip
Published By: Niara     Published Date: Jan 27, 2016
Download this white paper to learn the must-have tactics organizations can use to quickly detect attacks on the inside and severely limit the damage they can do.
Tags : 
advanced attacks, attack detection, cybercriminals, perimiter defenses, security breach, learning-based security analytics, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics
    
Niara
Published By: Bizible     Published Date: Jun 19, 2017
Learn how B2B marketers are moving away from vanity metrics and starting to optimize and plan for revenue with pipeline marketing. Get the comprehensive guide to get started!
Tags : 
pipeline marketing, full-funnel marketing, revenue marketing, b2b marketing, conversion tactics, growth marketing, growth hacking, demand generation, demand gen, lead gen, lead generation, marketing data
    
Bizible
Published By: Magento     Published Date: Feb 15, 2018
This is a great opportunity to discuss the critical aspects of what makes B2B eCommerce successful. Join Magento Commerce, Magento Solution Partner, Monsoon Consulting, and leading UK supplier and industry leader in B2B online sales, Brymec, for The Anatomy of B2B Success webinar. In this webinar, Peter Sheldon shares how digital transformation is driving B2B online sales growth and provide tips on current eCommerce executive thinking. Guy Hewison and Russell Schlaudraff from Brymec share how they are delivering the ‘future of online ordering.’ If you are serious about growing your B2B eCommerce, discover: What's driving the move to online ordering and self service in B2B The importance of understanding who your customers’ buyer really is The common challenges and pitfalls B2B companies face with implementations Advice from Brymec for sourcing a B2B eCommerce platform Tactics for growing online sales and providing a better customer experience
Tags : 
    
Magento
Published By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi
    
GFI
Published By: Inovis     Published Date: Aug 06, 2007
When companies adopted Just-In-Time (JIT) tactics, they did so primarily to reduce inventory costs. For the most part, this strategy worked. Reducing stocks of raw materials, parts, assemblies and finished goods reduces carrying costs, allowing companies to invest the freed-up funds in more productive assets and projects.
Tags : 
supply chain, scm, supply chain management, inovis, spend management, cost control, inventory, inventories, supplier, application integraion, eai, plm, product lifecycle management, van, value add, value added, inventory management
    
Inovis
Published By: Sage     Published Date: Jan 30, 2015
Human resources departments continue to struggle to build the best workforce. There are plenty of applicants but not enough candidates with the right combination of skills, experience, work ethic, and attitude to be top performers. The success of any organization depends on its people. Employees are a company’s greatest asset—and that asset must be managed to yield positive results. At Sage, we call this the Return on Employee Investment, or ROEI. This guide provides tactics and tips to help you improve the effectiveness of your company’s recruiting, hiring, and onboarding processes.
Tags : 
sage, recruiting, hiring, onboarding, roei, work ethic, skills, human resources
    
Sage
Published By: VMTurbo     Published Date: Mar 25, 2015
This whitepaper examines the latency-inducing pitfalls of common VM placement tactics, as well as a network flow approach that minimizes network, compute, and storage latency all at once.
Tags : 
vmturbo, network flow, application performance, vm placement tactics, network flow approach, storage latency
    
VMTurbo
Published By: ThreatTrack Security     Published Date: May 21, 2015
This presentation will look at the various motivations of attackers, explore why they don’t matter at the time of attack and focus on mitigation tactics as a way to best defend your organization.
Tags : 
threattrack, cyber security, attacks, protection
    
ThreatTrack Security
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: Microsoft Azure     Published Date: Apr 11, 2018
While it’s clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. You’ll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
    
Microsoft Azure
Published By: Insight     Published Date: Dec 05, 2017
Will you evolve with the digital workforce? New-era workers are breaking the confines of their cubicles. That means businesses need to offer more digital work experiences — but the path isn’t always clear. We’re rallying three workplace technology experts to discuss how to orchestrate a modern device and cloud application rollout to empower your anywhere, anytime workforce. Today’s solution landscape is ripe with effective ways to help organizations empower modern workers. In this exclusive Livestream, you’ll learn the true value of modern devices and cloud applications — and how to orchestrate every moving part of a connected workforce without compromising security.riving workplace disruption? This Livestream recording will reveal: -What’s driving workplace disruption? -What real-world tactics can we implement to conquer disruption? -How can we leverage the cloud? -What are the biggest challenges IT faces when modernizing?
Tags : 
technology, forum, workforce, workers, business, security
    
Insight
Published By: Symantec.cloud     Published Date: Oct 11, 2012
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years .
Tags : 
symantec, phishing, malware, security, internet security
    
Symantec.cloud
Published By: Unica     Published Date: Sep 08, 2010
Good marketers are going where their customers are - that means social media. According to a recent Unica global survey of marketers, 47% of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58%. Yet, for all the rush, many marketers are wondering, "where's the gold?" Download the white paper, "From Social Media Hype to Social Media Marketing" and learn how to build a stronger customer relationship."
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, customer relationships, social media, crm
    
Unica
Published By: Eloqua     Published Date: Sep 28, 2011
Use this guide as a checklist to compare your current email marketing technology against four core areas where marketing automation extends the power of email - audience targeting, automating marketing tactics, enabling sales and measuring results.
Tags : 
email marketing, marketing white paper, marketing automation, behavioral targeting, marketing data, email marketing technology, marketing automation, marketing tactics automation, audience targeting
    
Eloqua
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
    
Centrify Corporation
Published By: Cymfony     Published Date: Feb 22, 2007
This white paper summarizes the status of current trends in public relations and provides PR professionals with recommendations for actions to take in 2007 to begin to evolve their communications strategies and tactics.
Tags : 
sales & marketing software, marketing automation, ebusiness, customer interation service, public relations, blog, blogs, blog marketing, cymfony
    
Cymfony
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.