Share us:
 

effectiveness

Results 226 - 250 of 445Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 23, 2012
Analytics is the key to understanding your Generation C customers-the "C" for connected-and marketing to their interests. Read on to understand customer behavior fuel interactive marketing.
Tags : 
ibm, interactive marketing, customer behavior, consumer behavior, analyze, marketing effectiveness, enterprise applications
    
IBM
Published By: IBM     Published Date: Nov 07, 2012
Ever been accused of having your heads in the clouds? This no long applies to IT executives because computing clouds are the way forward. Read on to learn more about the new era of responsiveness, effectiveness and efficiency in IT service delivery.
Tags : 
cloud computing, ibm, it infrastructure, cloud, virtualization, web 2.0, data management
    
IBM
Published By: IBM     Published Date: Jan 09, 2013
Deepen your customer relationships. Drive operational effectiveness. Optimize your workforce. Read this solution brief to see how using IBM SmartCloud for Social Business services to become a social business can help your organization simplify.
Tags : 
ibm, social business cloud, cloud business, cloud software, cloud computing, simplify, enhance, it management, data management, data center
    
IBM
Published By: Destination Analytics     Published Date: Apr 06, 2012
This analytical platform ultimately enables their organization's most important measures - including revenue growth, return on invested capital and profit growth as measured by EBITDA - to outpace the financial outcomes of the competition. The goal is to support speed and effectiveness in decision-making.
Tags : 
ibm, technology, netezza, analytics, enterprise analytics, business analytics, customer relationship management, customer satisfaction, customer service, application integration, analytical applications
    
Destination Analytics
Published By: SAP     Published Date: May 11, 2012
Explore the benefits of BI, the components of a successful BI strategy, and the steps all companies should take to determine their current level of BI need and effectiveness.
Tags : 
business intelligence, business intelligence solution, bi strategy, idc, data management
    
SAP
Published By: Jive Software     Published Date: Feb 04, 2013
Dive into the world of social business; explore the key to customer success, support effectiveness, and cost savings by unleashing the power of social technology with Jive’s Customer Service Solution.
Tags : 
customer service, social business, social technology, social customer service, customer service solution
    
Jive Software
Published By: Quantcast     Published Date: Apr 07, 2014
Listen to Quantcast and WebMetro discuss the challenges in understanding the effectiveness of online display advertising and how to focus on the metrics that matter.
Tags : 
display advertising, attribution, quantcast, prospecting, clicks, conversion, last touch, real-time bidding, rtb, webmetro
    
Quantcast
Published By: CDW     Published Date: Apr 04, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, data management, network management, network performance, storage virtualization, application security, contact management, content delivery, content integration, virtualization, infrastructure
    
CDW
Published By: Sage     Published Date: Jan 30, 2015
Human resources departments continue to struggle to build the best workforce. There are plenty of applicants but not enough candidates with the right combination of skills, experience, work ethic, and attitude to be top performers. The success of any organization depends on its people. Employees are a company’s greatest asset—and that asset must be managed to yield positive results. At Sage, we call this the Return on Employee Investment, or ROEI. This guide provides tactics and tips to help you improve the effectiveness of your company’s recruiting, hiring, and onboarding processes.
Tags : 
sage, recruiting, hiring, onboarding, roei, work ethic, skills, human resources
    
Sage
Published By: McAfee     Published Date: Apr 25, 2014
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis, simplifies remediation, security, it management
    
McAfee
Published By: KnowledgeTree     Published Date: Jul 01, 2013
Learn best practices for using your marketing collateral to sell more effectively in Salesforce.com. This 39-page eBook will help you learn how to match content to your selling process, select content that advances your sales process, measure which content is most effective for your sales situation and multiply your sales, like one company that added $7 million in new business.
Tags : 
content marketing, content automation, content selling, content marketing solutions, sales enablement, sales enablement tools
    
KnowledgeTree
Published By: NAVEX Global     Published Date: Mar 04, 2014
NAVEX Global commissioned an independent third party study of over 300 Ethics and Compliance senior level decision makers in compliance, HR, legal and risk roles across multiple industries, to understand how they are allocating their budgets and which activities are contributing to their program success. Download this spending research report to benchmark your program and use these key lessons from your peers to boost your ethics and compliance programs' effectiveness.
Tags : 
navex global, ethics and compliance, compliance function, organizational imperative, corporate management, compliance implementation, effective compliance, budget driver, protection, reputation, human resources, best practices, business integration
    
NAVEX Global
Published By: CompareBusinessProducts.com     Published Date: Jul 11, 2013
Data drives everything in today's business world, and it would be hard to name a more important concern for today’s corporate arena than data preservation. The growing urgency of this matter, until last year a novelty to most attorneys, touched off a flurry of rulings in the area of legal holds in 2010, with several major court decisions redrawing the map in what had been virtual terra incognita.
Tags : 
legal, litigation, preservation, strategy, technology, e-discovery, cost effectiveness, legal hold, ediscovery, knowledge management, legal process outsourcing, legal technology solutions, legal department management
    
CompareBusinessProducts.com
Published By: Plantronics     Published Date: Oct 18, 2013
Maximize the effectiveness of collaboration. As teams become ever more dispersed, organisations need to think about more than technology to ensure collaboration is successful. With employees now separated much more by time and distance, a range of communication tools are being used by enterprises to keep everyone connected.
Tags : 
plantronics, communications experience, smarter working, working off-site, productive virtual collaboration, f2f encounters, reduce attrition, optimal working environment, collaboration tools, unified communication, savi wireless range, wireless, new office technologies, high-definition voice, dispersed workforces, communicate through technology, effective collaboration, networking, it management, business intelligence
    
Plantronics
Published By: Adobe     Published Date: Dec 08, 2014
Mobile is more than likely a part of your marketing mix, but chances are, you haven’t defined the metrics you need to measure its success. The Forrester paper, Make the most of analytics to meet your mobile objectives, shares insights from mobile executives and lays out the steps marketers need to take to improve mobile effectiveness.
Tags : 
mobile objectives, mobile measurements, mobile analytics, mobile effectiveness
    
Adobe
Published By: ThreatTrack Security     Published Date: May 21, 2015
Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.
Tags : 
advanced protection, cyberthreat, security, incident response team, threatsecure, it management, knowledge management, data management
    
ThreatTrack Security
Published By: NetApp     Published Date: Mar 11, 2015
Improving data backup and recovery continues to be a top priority among senior IT decision makers, as highlighted in a 2015 IT Spending Intentions survey conducted by ESG. Organizations plan to invest in modernizing data protection, including the cloud. Learn the key considerations when evaluating a cloud-extended data protection solution that provides security, efficiency, effectiveness, and risk mitigation.
Tags : 
    
NetApp
Published By: QuickPivot     Published Date: Oct 20, 2015
Email effectiveness remains strong but the connected marketing organization fuels growth
Tags : 
customer interaction, channel attribution, email effectiveness, marketing
    
QuickPivot
Published By: CDW - EMC     Published Date: Apr 07, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, it management, enterprise applications, infrastructure, network management, network performance
    
CDW - EMC
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? This white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn: • How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware • Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML • How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-gene
Tags : 
    
CrowdStrike
Published By: Fitbit     Published Date: Mar 21, 2017
If you’re like most wellness professionals, marketing communication is your most important “side job.” From figuring out when to send emails, identifying the right methods, to designing your communications calendar – it can be a challenge. View this webinar to hear from a leading consumer marketer and learn how to harness best practices that you can use in your day-to-day role. Fitbit’s Head of Lifecycle Marketing, Steven Marjon, will show you: - Tested best practices for communications - How to set up different communications tracks for onboarding new employees - Tools and resources to gauge the effectiveness of your communications
Tags : 
    
Fitbit
Published By: TD.Org     Published Date: Nov 06, 2017
Virtual classrooms are an effective and widely used learning delivery mechanism—one that today’s economically and geographically challenged talent development functions have embraced enthusiastically. ATD’s Virtual Classrooms Now: Using Technology to Reach Today’s Workforces whitepaper identifies practices that are gaining positive returns for companies achieving strong market performance and high levels of learning effectiveness. Download this whitepaper to learn what’s working in virtual classrooms today.
Tags : 
    
TD.Org
Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Tags : 
thousandeyes, ddos, migration, network migration, network security, wireless security, data protection, secure content management
    
ThousandEyes
Published By: Headspace     Published Date: Aug 30, 2018
How Mindfulness Training Helps Caring for employee health and caring for your business goals doesn't have to be mutually exclusive. Companies that invest in their employees' health have a real competitive advantage. An internal study conducted by Aetna found that mindfulness actually increased job effectiveness. Employees gained an average of 62 minutes of productivity per week, which Aetna estimates to be worth $3,000 per employee, per year.* Download this white paper to see how mindfulness training can help your team get the most out of their day. Learn about: * The science behind mindfulness and productivity * How mindfulness increases focus, reduces stress and boosts engagement * The connection between meditation and sleep * How meditation can positively impact physical health and disease *Studies did not use Headspace as an intervention
Tags : 
    
Headspace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2018  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service