post

Results 351 - 375 of 459Sort Results By: Published Date | Title | Company Name
Published By: Kapost     Published Date: Jan 16, 2014
Over the past 10 years, the Internet has provided unprecedented access to information. Consequently, B2B buyers are constantly online learning about industry trends and innovative solutions to their pain points. Given their busy schedules, buyers have grown accustomed to the convenience of researching and comparing multiple options online, narrowing their choices independently of the vendor and, only then, engaging with sales. While buyers have always made the final purchase decision, in todays world, the vendor is not given an opportunity to engage until the buyer is close to a choice. Today, the buyer is in control of their own journey.
Tags : 
content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform, content marketing software, editorial strategy, marketing campaign planning, content marketing best practices, content marketing companies, editorial content, content marketing workflow
    
Kapost
Published By: Kapost     Published Date: Feb 20, 2014
Just about everyone claims to be doing content marketing, but far fewer organizations have a thought-out plan. According to Content Marketing Institute, only 44% of B2B marketers and 39% of B2C marketers have a documented content strategy. But as organizations scale content operations, workflows, distribution, and promotion, many are seeking tools to centralize, manage, and improve the process. Thats where content marketing software comes in. This software can help organize, automate, and visualize your efforts to create original content, as well as curate the content of others.
Tags : 
    
Kapost
Published By: Cisco     Published Date: Nov 30, 2016
Nearly two-thirds of B2B marketers say online events are by far one of the most effective content marketing tactics.1 But carrying out a successful event requires some simple, yet important steps to ensure both marketers and attendees gain all of the benefits of online events, including real-time experience, engagement, and convenience. If youre ready to produce your first online event, this 12-step checklist takes you through the entire process from planning to post-event follow-up to provide you with the information you need to get started. 1
Tags : 
    
Cisco
Published By: Xero     Published Date: Feb 18, 2014
From tweets to posts and even likes, this webinar covers the basics of social media marketing. Learn how your peers are leveraging social media in their practices and hear what works - and what doesn't.
Tags : 
tweets, xero, xero marketing, social media, facebook, linkedin, email marketing, mobile marketing, marketing automation
    
Xero
Published By: Panduit     Published Date: Oct 28, 2015
The Vatican Apostolic Library implemented the Panduit Integrated Data Center Solution to create a robust and highly available network infrastructure to support the conservation of its literary treasures.
Tags : 
panduit, integrated data center, data center, network infrastructure, storage, infrastructure, ip storage, storage management, data warehousing, data deduplication, data center design and management
    
Panduit
Published By: DocuSign     Published Date: Aug 09, 2016
Emails would go unanswered, social posts unseen, movie times and tickets unpurchased, our favorite sports teams ignored, pictures untaken you get the idea. Now add tablets and the growing interest in wearable. All have become vital and pervasive appendages to helping us live our lives to the fullest.
Tags : 
docusign, secure cloud storage, mobile device management, smartphones, internet
    
DocuSign
Published By: IBM     Published Date: May 12, 2015
The security threat landscape is rapidly evolving: from risks with the proliferation of mobile devices to the increased sophistication of organized cyber criminals and geopolitical threats. Healthcare has a significant burden with the dubious distinction of having the highest per record data breach cost among all regulated industries.
Tags : 
ibm, healthcare, security, data, cybercrime, encryption, firewalls, hacker detection, mobile computing, database security
    
IBM
Published By: Dice     Published Date: Oct 07, 2013
Put up a job listing and youll get a number of resumes. Is that success? Quantity is never the goal. Quality is. So, what does it take to attract the best talent? If it were as simple as free meals, this article would be very short.
Tags : 
dice, top tech talent, job posting, talent
    
Dice
Published By: Dice     Published Date: Feb 10, 2016
With todays white-hot state of the tech market, its hard to source skill tech talent. Dices Guide to Creating Great Job Postings provides tips and ideas to increase applies and make your postings stand out.
Tags : 
reachmail dice, job postings, tech market job postings, best practices
    
Dice
Published By: Dice     Published Date: Feb 10, 2016
Improve the quality and quantity of tech candidates applying to your jobs with Dices 6 Dos and Donts of Creating Great Job Postings. Youll also get 10 sample postings you can use as inspiration for your own tech jobs.
Tags : 
reachmail dice, tech job postings, best practices, sample job postings, tech jobs
    
Dice
Published By: Eyeblaster, Inc.     Published Date: Apr 02, 2009
One of the big challenges faced by online marketers and agencies that handle large online budgets is maximizing conversions and optimizing online budgets at zero or minimum cost. This issue of the Eyeblaster Analytics Bulletin presents findings on conversions and a multitude of methods that can be deployed to ensure a better yield of successful digital campaigns.
Tags : 
eyeblaster, click-thru rate, conversion rate, format type, conversion rate, rich media, data capture, ctr, automatic optimization, conversion metric, behavioral sequencing, optimization, roi, post-click, post-impression, see-click-convert, see-delay-convert, recall, in-banner, e-commerce
    
Eyeblaster, Inc.
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
When youre tasked with filling numerous open requisitions, youll typically source and engage candidates using the same traditional methods youve always used: youll post a job requisition online, wait for the flood of resumes to come in, then over-rely on tracking candidates via spreadsheets and emails. This isn't a winning strategy and it actually makes the recruiting process longer, more expensive, and less effective for building a powerhouse workforce.
Tags : 
talent, acquisition, strategy, workforce
    
Cornerstone OnDemand
Published By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : 
attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis, business analytics, enterprise software, analytical applications, information management
    
Attivio
Published By: Radian6     Published Date: Jan 18, 2012
The team at Radian6 compiled our most-shared posts from 2011 into this eBook.
Tags : 
radian6, marketing, social media, social media marketing, emerging marketing
    
Radian6
Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, discover best practices for a successful post-migration operation. See why you MUST have the same level of post-migration planning that you had for pre-migration, and learn four key aspects of post-migration management.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, security, enterprise applications
    
Quest Software
Published By: Quest Software     Published Date: Apr 19, 2012
In this four-part eBook, get a better understanding of the real-world issues associated with IT compliance, how they affect the business, and how you can simplify your compliance challenges. Get your copy today.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, security, enterprise applications
    
Quest Software
Published By: Quest Software     Published Date: Apr 27, 2012
Is your business reactively implementing compliance? You're wasting time and money - get proactive! In this Quest white paper, see how centralized monitoring and reporting is more secure, saves money and helps you adapt and manage compliance needs.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, enterprise applications, data management, data center
    
Quest Software
Published By: Bridgeline Digital     Published Date: Oct 28, 2013
Blogging. For one contingent of marketers, pumping out posts on the company blog is their favorite part of the day; an opportunity to muse about industry news, highlight their product, and release creative fuel that is otherwise bottled up. For other marketers, blogging is the chore in the way of getting more important work accomplished. In other words, writing daily posts is an endless nuisance, like listening to The Song That Never Ends.
Tags : 
blogging, corporate blogging, blogging basics, blog speak, blog posts, company blog, blog writing, types of blogs
    
Bridgeline Digital
Published By: Citrix     Published Date: Apr 16, 2014
This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.
Tags : 
dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection, network security, ddos, wireless security
    
Citrix
Published By: IBM     Published Date: Aug 21, 2013
In many enterprises, marketing is a multichannel effort that includes a wide range of touch points. The touch points range from websites and email promotions to traditional print advertising, postal mail, and broadcast, and direct sales by phone and in-person sales teams. But too often, each channel works independently, accountable to its own objectives, unaware of the efforts and results made within other marketing channels. As a result, call centers speak to customers without knowing the offers the customers previously accepted or rejected. In addition, emails launch without reference to online promotions and websites present messages that disregard their visitors previous contact history.
Tags : 
cross channel marketing, customer communications, interactive marketing, multi-channel marketing, sales, multichannel, communications, email marketing, customer relationship management, crm, infrastructure
    
IBM
Published By: iNetU Managed Hosting     Published Date: Mar 06, 2014
Putting together an effective post-breach response plan can greatly reduce the costs and damage to the business inflicted by a breach. The following guide can help organizations get started.
Tags : 
managed hosting, cloud hosting, inetu, inet manahed hosting, data centers, blades, racks, rack, storage, data storage, cloud hosting, cloud, hybrid cloud, backup and recovery, storage virtualization, data center design and management
    
iNetU Managed Hosting
Published By: AlienVault     Published Date: Aug 13, 2015
Demonstrating compliance with PCI DSS is far from a trivial exercise. Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
Tags : 
compliance, pci, dss, technical, security, challenges, it management, knowledge management
    
AlienVault
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: Symantec     Published Date: Apr 02, 2015
Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need to proceed with transactions.
Tags : 
online customer trust, sensitive data, data interception, malicious intent, security
    
Symantec
Published By: Bronto     Published Date: May 18, 2017
The buyers journey is constantly evolving, and it can be difficult to keep up with the ever-changing expectations of the consumer. With so many potential touch points between new website user and returning customer, its essential that your business be prepared every step of the way. The tools are there to help you set them up now to start recovering that lost revenue with relevant personalized marketing. From browsing to carting to checkout to post-purchase, optimizing your business at every stage of the journey is critical to increasing your conversion rates, and ultimately, your profitability. If the path is too difficult to navigate or not relevant to consumers, youll quickly lose shoppers and find it nearly impossible to develop loyal fans of your brand. Get to know your customers, help them feel comfortable and confident about buying from you and do your best to earn a coveted spot as one of their favorite go-to shopping destinations.
Tags : 
bronto, checkout optimization, sales management, security optimization, customer service, loyalty programs, promotions
    
Bronto
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.