professional

Results 976 - 1000 of 1300Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 05, 2013
We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have set a high bar in the way they engage customers throughout the entire sales processnot just during the commercial transaction, but before, during and after the transaction. Your operations must be seamless, because individuals enjoy an interconnected and ubiquitous experience. And your operations must be insightful, because every personal and professional interaction is targeted and relevant. A Smarter Process approach helps you to reinvent business operations in the era of the customer.
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan
    
IBM
Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
    
Qualys
Published By: IBM     Published Date: Oct 31, 2013
Empower marketing professionals to analyze and act on marketing performance data.
Tags : 
marketing, performance analytics, business analytics, metrics, data, driver-based campaign, campaign optimization, marketing campaign
    
IBM
Published By: Conductor     Published Date: Oct 21, 2013
Conductor's research of more than 380 enterprise search marketers and interviews with numerous SEO professionals finally reveals what separates the 'best-in-class' from the 'laggards.' Best-in-class cite early SEO involvement in content, greater maturity in reporting with the use of advanced techniques such as keyword segmentations, data mash-ups and the use of advanced technology in their reporting workflow, and a stronger commitment to organizational evangelism than their laggard colleagues.
Tags : 
seo, search engine optimization, natural search, successful seo, seo initiatives, seo strategies
    
Conductor
Published By: Plantronics     Published Date: Oct 18, 2013
Voice is at the heart of enterprise collaboration. Plantronics provides a comprehensive portfolio of audio devices for the mobile professional delivering superb call clarity working anywhere. Advanced Smart Sensor Technology and Software deliver a superior user experience. InstantMeeting software allows for easy, one-touch joining of audio conference calls
Tags : 
plantronics, effectively collaborating, virtual collaboration, mobile working, accurate presence status, simply smarter mobile, wireless calls, enterprise collaboration
    
Plantronics
Published By: Plantronics     Published Date: Oct 18, 2013
As communication options and needs increase, clear preferences have emerged regarding the best ways to exchange specific types of information.
Tags : 
plantronics, global workforces, anywhere-anytime attitude, brainstorming, collaborating, communications tool belt, phone conferences, audio conferences
    
Plantronics
Published By: Brainshark     Published Date: Oct 16, 2013
With the proliferation of the iPad and other tablets and mobile devices among sales and account managers, a new generation of enabling technologies and best practices has offered the opportunity to get more out of the out-of-office experience. This research brief examines the use of video tools by sales professionals within best-in-class companies, specially within a mobile environment.
Tags : 
sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing
    
Brainshark
Published By: Brainshark     Published Date: Oct 16, 2013
"Getting employees to understand and take advantage of benefits during open enrollment periods is big challenge for many HR managers. This paper looks for new ideas on communicating benefit plans from professional marketers, knowledge management experts, and social media gurus."
Tags : 
human resources, training, compliance, onboarding, new hire, orientation, open enrollment, employee benefits
    
Brainshark
Published By: GoToWebinar     Published Date: Oct 08, 2013
Webinars are powerful tools for reaching and engaging audiences anywhere. But first you need to know how to present your information simply and successfully. This template by Gihan Perera, author of Webinar Smarts, will help you craft a compelling marketing webinar that will engage your audience from start to finish.
Tags : 
how to, webinar template, marketing, template, gotowebinar, citrix, content delivery, employee performance
    
GoToWebinar
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, were witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the worlds largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the companys website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Cisco Systems     Published Date: Oct 01, 2013
34% of IT professionals say theyve seen an actual SDN deployment as often as theyve seen the Loch Ness Monster. Discover more eye-opening results in this Cisco survey of 1,300 IT professionals from 13 countries. Download now.
Tags : 
technology, cisco, survey, best practices, telecommunications, global, it challenges, wireless
    
Cisco Systems
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how the CIO of the United Arab Emirates University community addressed the major challenges faced by the University's network security professionals.
Tags : 
united arab emirates, united arab emirates university, network security, security, network, internet security, network security appliance, security management
    
HP - Enterprise
Published By: Ifbyphone, Inc.     Published Date: Sep 24, 2013
Voice broadcasting is more than a simple recorded phone message; Download this white paper to learn how marketing and sales professionals are using intelligence voice broadcasting to cut costs, save time and generate leads and revenue.
Tags : 
intelligent voice broadcasting, voice broadcasting, voice-based marketing automation
    
Ifbyphone, Inc.
Published By: Introhive     Published Date: Sep 24, 2013
Whether you are new to sales or have been in the profession for years, download this paper to learn and discover how to become a better sales leader.
Tags : 
crm, sales, social crm, sales process, social selling, crm strategy
    
Introhive
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector phishing 2.0. While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information often gathered from social media sites they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: Uncovering phishing emails and phishing websites in real time Limiting the amount of personal information employees expose on social media sites Leveraging the worlds largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security
    
Webroot
Published By: Arkadin     Published Date: Sep 11, 2013
In line with economic recovery, marketing professionals are hard-pressed to achieve lofty marketing and sales goals, with increased pressure on driving higher ROI. Webcasts are scalable events enabling marketers to educate prospects, nurture leads, and retain customers without strain on time and budget.
Tags : 
webcast, web conferencing, webinar, web collaboration, webinars, web events, web collaboration, online meeting
    
Arkadin
Published By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet ITs demands and simple for non-IT professionals to manage.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Published By: Allscripts     Published Date: Aug 29, 2013
This single physician practice started with the need to increase efficiency and practice better care. After implementing Allscripts technology, the practice exponentially improved population health management, achieved Meaningful Use, cut two months out of their billing processall while saving $65,000 annually.
Tags : 
allscripts, allscripts professional ehr, ehr, population health management, meaningful use, meaningful use payments, preventive health
    
Allscripts
Published By: Ring Central     Published Date: Aug 28, 2013
Nothing is more important to business success than communicating professionally and promptly with customers and colleagues. The way businesses communicate and handle incoming calls, and everything from faxes to conference calls, affects public perception of the company. Evolving businesses can better serve customers and enhance the way employees work by adopting the most readily available and affordable technology. In todays world, leading edge communication begins and ends with a high-speed Internet-enabled, cloud-based, IP-connected phone service from RingCentral.
Tags : 
cloud based system, business phone system. cloud based, telecom, business process, business communications, corporate communications, enterprise applications
    
Ring Central
Published By: Adobe     Published Date: Aug 22, 2013
This report gives customer experience professionals the tools and processes they need to act on digital customer experience improvement across touchpoints like websites, mobile phones, and tablets. Forrester recommends 10 tactics for evaluating digital touchpoints and determining customers' needs, proven and emerging methodologies for redesigning digital interactions, and best practices for ensuring that your digital experiences support your business objectives.
Tags : 
customer experience management, digital experiences, customer experience
    
Adobe
Published By: Riverbed     Published Date: Aug 15, 2013
In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Download now to find the results!
Tags : 
apm, riverbed, network performance, application performance, infrastrucure, forrester report, business performance, it survey
    
Riverbed
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven stepssequentiallythat have been tested and refined through NaviSites experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security
    
Navisite- A Time Warner Cable Company
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
However, risk-averse enterprise IT professionals are understandably cautious about simply moving their entire IT portfolio of resources and services into a 100-percent cloud architecture. As with most technology-adoption curves, enterprises have not embraced an all-or-nothing paradigm, instead preferring a pragmatic, evolution, not revolution approach of cautious incrementalism. This helps them account for their existing investments, custom work, business requirements, and risk posture. Not everything will move to the cloud at least not in the foreseeable future. Thats why so many IT professionals advocate a so-called hybrid approach. But what do we mean by hybrid and how do we optimally balance the various components of a hybrid cloud architecture?
Tags : 
hybrid cloud, pragmatic view, architectures, it professionals, it portfolio, cloud computing
    
Navisite- A Time Warner Cable Company
Published By: Kaseya     Published Date: Jul 24, 2013
BYOD, cloud computing, MAC adoption and social networking security will dominate IT organizations this year.
Tags : 
kaseya, byod, cloud computing, mac adoption, social networking, data, it solutions, it concepts
    
Kaseya
Published By: Communispond     Published Date: Jul 08, 2013
85% of us would rather give up water than mobile apps! We all know itdigital screens have officially invaded our lives. They have grown in popularity, enhancing our personal and professional lives, which includes the learning space. Do they really enhance the learning experience or are they just a distraction?
Tags : 
communispond, digital learning, byod, multi-screen, communication skills, public speaking, communication training, presentation skills
    
Communispond
Start   Previous    33 34 35 36 37 38 39 40 41 42 43 44 45 46 47    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.