topic

Results 276 - 300 of 311Sort Results By: Published Date | Title | Company Name
Published By: Marketo     Published Date: Nov 04, 2011
Did you learn everything you needed to during your marketing automation demo? Use this checklist to feel confident about the six critical areas of marketing automation. This checklist covers topics including functionality, branding and design control, and marketing campaign creation.
Tags : 
marketo, marketing automation, demo, whitepaper, checklist, branding, design control
    
Marketo
Published By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : 
email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention, messaging, mailbox, find emails, e-mail, data protection, archiving, archive, outlook
    
MessageLabs
Published By: Cornerstone OnDemand     Published Date: Feb 12, 2009
Talent management has become one of the most pressing topics within HR organizations today - and it is no wonder, given the current economic environment and business imperatives. In this research bulletin, we will outline the approach HR organizations must take to identify, cost-justify, develop and implement the highest impact talent management strategy.
Tags : 
cornerstone, talent management, business continuity, business performance, globalization, recession, planning, economic, staffing
    
Cornerstone OnDemand
Published By: GGR Communications     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
ggr communication, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
    
GGR Communications
Published By: People for Business     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
people for business, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
    
People for Business
Published By: Project Perfect     Published Date: Jan 28, 2010
This paper highlights and consolidates interesting risk management topics for enterprise information systems from enterprise architect and system integration perspectives.
Tags : 
dynamics, role dyanmics, project dymanics, eric tse, project management
    
Project Perfect
Published By: Project Perfect     Published Date: Jan 28, 2010
This paper provides a consolidated review of near future trends in research topics on project management from different authoritative sources.
Tags : 
project management trends, eight dimensions, pmi journal review, review, eric tse, project management
    
Project Perfect
Published By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : 
byod, okta, mobility, safety, dad, mobility management
    
Okta
Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: QFilter.com     Published Date: Nov 23, 2010
The dangers posed by industrial Dust Explosions can affect a wide range of different industries. This article examines the topic, and gives recommendations on how to prevents such incidents from occurring.
Tags : 
dust explosions, dust control, dust safety, dust hazards, dust collection
    
QFilter.com
Published By: Red Hat     Published Date: Jan 21, 2011
Daniel Walsh - Principal Software Engineer, Red Hat In this session, Daniel Walsh will show attendees new SELinux features and explain how to use them in Red Hat Enterprise Linux 6. He will cover several SELinux topics, including: * Confining users * Securing your virtual environment * Securing the desktop * Controlling grid jobs * Sandboxing: putting the power into the hands of the administrator * Building and shipping your own SELinux policy
Tags : 
red hat virtual tradeshow, live event, enterprise linux 6, security, desktop, selinux, virtual environment
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Douglas O'Flaherty - Senior Manager, Product Marketing, Red Hat Red Hat Enterprise Linux is the proven leading enterprise open source operating system. Now, with cloud computing progressing into the enterprise and public clouds emerging as a viable alternative, Red Hat Enterprise Linux is well positioned to be leveraged as the cloud guest operating system of choice. In this session, Douglas O'Flaherty will cover the technical and business elements of Red Hat Enterprise Linux that are relevant when used in cloud computing infrastructures, emphasizing the unique challenge of public cloud deployments. Session topics will include: * Cloud-relevant technologies included within Red Hat Enterprise Linux * Release models for Red Hat Enterprise Linux on public clouds * ISV certifications * Security * Deployment flexibility & planning
Tags : 
red hat virtual tradeshow, live event, enterprise linux, operating system, cloud computing, isv certification, security, deployment flexibility
    
Red Hat
Published By: Achievers     Published Date: Oct 01, 2012
Did you know most companies have an employee recognition program, but their employees don't know it? Read Bersin's report and learn why this topic is not only important, but the key lever to business success.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials, retention, engage, business results, corporate culture, company values, employee behaviors
    
Achievers
Published By: KeyedIn Solutions     Published Date: Jul 09, 2012
Topics Included in This Paper: - Making your own luck - Risk aversion explained - Deciding factors in decision making - Improving decision-making skills - Keeping things simple
Tags : 
risk, keyedin, decision-making
    
KeyedIn Solutions
Published By: Janrain, Inc.     Published Date: Jan 07, 2013
This paper covers establishing best practices in implementing user registration, and strategies for collecting more and better user data without sacrificing conversion rates. Topics include social login, progressive profiling, CAPTCHA, SSL, and more.
Tags : 
online registration, data management, unified data, data validation, ssl, progressive profiling
    
Janrain, Inc.
Published By: Esker     Published Date: Apr 12, 2012
This buyer's guide provides you with the key topics and the most important questions to ask an AP solution provider so that you can select the most appropriate AP solution to meet both your business and process needs.
Tags : 
order to cash, procure to pay, fax software, fax service, fax server, document automation, accounts payable, accounts receivable, ocr software, workflow, personal finance, investing, small business, finance
    
Esker
Published By: Adobe     Published Date: Jun 06, 2013
Video is a powerful way to reach audiences both for publishers and advertisers. You already know people are watching online video more than ever, but what are they watching? When are they watching it? What are consumers' preferred methods of watching? The Adobe Digital Index team explored these questions and other topics important to marketers and advertisers looking to make a bigger splash through the video. The research in The U.S. Digital Video Benchmark shares findings on device usage, social marketing, TV Everywhere and Ad placement
Tags : 
digital video, online video, digital video consumption, social media and video, tv content
    
Adobe
Published By: Adobe     Published Date: Aug 22, 2013
With more than 1 billion smartphones in consumers' pockets at the beginning of 2013, mobile is driving a second Internet revolution that's even more profound than the first one. Mobile creates new value for consumers and businesses, alters cost structures, and disrupts ecosystems. That's why marketers must move away from tactical mobile efforts to more transformative mobile marketing strategies in 2013. This fourth annual mobile trends report revisits our 2013 mobile trends, elaborates on how they will continue to evolve in 2013, and highlights new mobile trends that we expect to see this year. New to this year's report is a list of the over-hyped topics that we believe will fail to provide real business value in the short term.
Tags : 
mobile marketing, mobile trends, mobility
    
Adobe
Published By: Crowdtap     Published Date: Jul 03, 2012
New from Crowdtap, learn why influence is the hottest topic in marketing and social media. We'll show you how to tap your brand's peer influencers to drive advocacy and boost word-of-mouth online and off with 5 Keys to Success in Influencer Marketing.
Tags : 
influence, influencer, influence marketing, influencer marketing, influence score, social marketing, social roi, social media, word-of-mouth, wom, word-of-mouth marketing, wom marketing, advocacy, brand advocates, brand advocacy, digital marketing, buzz marketing, product sampling, marketing research, marketing insights
    
Crowdtap
Published By: Workday     Published Date: Aug 07, 2018
This e-book features 10 must-read articles on the rapidly evolving world of supply chain published by Becker’s Hospital Review. Articles cover a range of topics, from new entrants pushing into healthcare to how new business collaboratives are shaking up conventional distribution models.
Tags : 
    
Workday
Published By: NETIQ     Published Date: Sep 09, 2013
In your business environment, providing affordable protection for your physical and virtual servers is critical. This free NetIQ Disaster Recovery eBook outlines important topics you need to understand to protect today’s data centers. Download your copy of the guide and learn more.
Tags : 
netiq, disaster recovery, protection, physical server, virtual server, ebook, multi-platform data center, cloud computing, virtualization, roi
    
NETIQ
Published By: Cisco     Published Date: Aug 27, 2015
See how Cisco video collaboration tools can help your business get back to getting things done.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
The Internet of Things may be a hot topic in the industry but it’s not a new concept. In the early 2000’s, Kevin Ashton was laying the groundwork for what would become the Internet of Things (IoT) at MIT’s AutoID lab. Ashton was one of the pioneers who conceived this notion as he searched for ways that Proctor & Gamble could improve its business by linking RFID information to the Internet. The concept was simple but powerful. If all objects in daily life were equipped with identifiers and wireless connectivity, these objects could be communicate with each other and be managed by computers.
Tags : 
communication, internet, network management
    
Cisco
Published By: Polycom     Published Date: Jun 08, 2016
"What are the benefits of moving your phone services to Office 365? How does the Skype for Business phone experience online differ from a traditional on-prem PBX phone experience? What are the important features to consider when selecting phones for your Office 365 cloud deployment? Join Polycom voice experts Randy Wintle and Peter Huboi as they cover these topics and more in one of our most accessed on-demand webinars."
Tags : 
cloud management, cloud services, cloud management, best practices
    
Polycom
Published By: HPE     Published Date: Feb 11, 2015
Delivering high-quality services with greater speed and efficiency is one of the greatest pressures facing your information technology (IT) infrastructure. The rise of computing in the cloud, expansive mobility options, and increasing pressure to boost application performance have added even further complexity - leading to inefficiencies that can limit your opportunity for growth and success. Traditional, siloed IT infrastructures are often too labor intensive, inefficient, and slow to overcome these challenges. Organizations need a converged, cloud-ready, software defined infrastructure to help them meet the evolving demands of their business. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries. Sponsored by: HP and Intel® Xeon® processor HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s
Tags : 
    
HPE
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.