bing

Results 76 - 100 of 136Sort Results By: Published Date | Title | Company Name
By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : security challenges, mid-market security, cyber-extortion, cyberthreat, security, it management, data management
     ThreatTrack Security
By: Adobe     Published Date: Jun 08, 2015
Get it now and see how the usage of social streaming apps is spiking. Explore metrics to help you decide whether to go paid or organic on Facebook. Discover which regions are heating up in search engine marketing. And so much more.
Tags : adobe, social, facebook, search engine marketing, sem, roi, streaming apps, meerkat
     Adobe
By: Intercom     Published Date: Oct 08, 2015
An effective messaging strategy means targeting the right users with the right message at the right time and place. Failing to do so leads to customers mentally, or literally, unsubscribing from you. From the makers of Intercom, a customer communications platform, this book teaches you how to increase customer engagement in three ways: 1. Define the audience for your message by segmenting users according to behavior and action. 2. Craft a message for maximum impact; what voice, tone, format, and language to use. 3. Discern the right way and the right time for a message and know what you can do to ensure it is received in the most appropriate setting and in the most appropriate context.
Tags : customer onboarding software, user engagement, in-product communication, in-product messaging, onboarding software, customer engagement software
     Intercom
By: ExpertVoice     Published Date: Jun 14, 2019
Grab your harness as we take a deeper look into how Black Diamond partnered with ExpertVoice to assist with a product launch. When Black Diamond decided to manufacture their own climbing shoe, they knew how critical a successful launch would be to long- term success: the climbing shoe market is dominated by one manufacturer, and climbers are an extremely loyal group. Breaking into the market would be tough. Although ExpertVoice had a daunting task ahead of them, they knew honing in on Experts spreading wordof- mouth recommendations was key to a successful product launch.
Tags : 
     ExpertVoice
By: G/O Digital     Published Date: Nov 13, 2014
In the past 100 years, advertising and marketing has rapidly changed. With the increasing influence of digital marketing, home improvement companies, such as HVAC, roofing, plumbing, and remodeling companies, can no longer rely on catchy radio jingles or a space in the Yellow Pages to get their services in front of new clients. Download this guide for quick and easy steps to improve digital advertising for your local business.
Tags : digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
     G/O Digital
By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
     Centrify Corporation
By: Kronos     Published Date: Apr 16, 2015
To learn more about "lean labor" and how it can benefit your organization, watch "The 7 Wastes of Lean Labor." This video provides an introduction to lean labor by describing the wastes all manufacturers face and how these same challenges apply to your workforce.
Tags : workforce management system, fully automated, cloud based, manufacturers, timekeeping, payroll, streamlining, manual processes
     Kronos
By: Mimecast     Published Date: Dec 23, 2008
Email archiving can be implemented by subscribing to a hosted service-commonly called "software as a service" (SaaS)-or by licensing software and installing it in-house (on-premise).
Tags : mimecast, saas, software as a service, email archive, saas, ibm, quest, mimosa
     Mimecast
By: SearchIgnite     Published Date: Oct 26, 2010
This report tracked more than 55 billion impressions and more than 1 billion clicks on Google, Yahoo! and MSN/Bing from January 1, 2006 through September 30, 2010.
Tags : searchignite, google, bing-yahoo, search alliance, ppc, click-through rates, ctr
     SearchIgnite
By: SAP     Published Date: Mar 25, 2011
Check out this case study describing how Colmobile, Israel's largest auto importer, is using SAP CRM to deliver a differentiated customer experience. (Bloomberg Businessweek Research Services, 2011)
Tags : sap crm, customer experience, customer-centric infrastructure, integration application
     SAP
By: Kenshoo     Published Date: Oct 30, 2012
Kenshoo Global Search Advertising Trends is the first in a new series of reports reflecting aggregate campaign data across search engines like Google, Yahoo!, Bing, and Baidu. Read on to learn about paid search trends by search engines and more.
Tags : kenshoo, global search trends, search engines, search, enterprise search
     Kenshoo
By: Lumension     Published Date: Mar 12, 2011
Studies show that even though most organizations use AV, more and more are succumbing to attacks.
Tags : virus, antivirus, whitelisting, endpoint security
     Lumension
By: IBM     Published Date: May 12, 2015
whitepaper describing how Universal document and image viewers can reduce costs, time and headaches.
Tags : ibm, big data, information lifecycle, email, document sharing
     IBM
By: Iovation     Published Date: Sep 25, 2009
One of the leading and fastest growing suppliers of systems for online betting, casino, poker and bingo uses iovation to combat online fraud and abuse.
Tags : online betting, casino, poker and bingo, combat online fraud and abuse, fraud solution, false positives, iovation reputationmanager, device reputation
     Iovation
By: APC     Published Date: Apr 08, 2010
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : apc, power, cooling, it wiring, heat removal, green computing, ieee, equipment failure
     APC
By: Webmarketing123     Published Date: Oct 06, 2010
There are many ways to increase revenue for your business. One of them is to evaluate and improve the success of your company's website in search results. SEO (Search Engine Optimization) is the practice of optimizing a website so that it achieves higher organic rankings on search engine sites like Google, Yahoo and Bing. In fact, according to the 2009 Forbes Ad Effectiveness survey, SEO is the most effective marketing channel today.
Tags : webmarketing123, seo, search engine optimization, google, yahoo, bing, search, keywords
     Webmarketing123
By: Adobe     Published Date: Jan 12, 2015
As advertising continues to evolve, we continue to provide the latest insights and trends. The Adobe Advertising Benchmark 2014 report gives you the information you need to identify better opportunities to make the most of your advertising efforts.
Tags : adobe, benchmark, search, spend, cpc, pla, advertising, google
     Adobe
By: IBM     Published Date: Oct 06, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : ibm, cloud, analytics, mobile, social, security, infrastructure, data center
     IBM
By: IBM     Published Date: Feb 26, 2016
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : data center, cloud computing, analytcs, mobile, social, cyber security, ibm
     IBM
By: IBM     Published Date: Jan 09, 2017
Download this interactive white paper describing the global threat intelligence provided by the IBM X-Force research team, including a look at its reputation scoring, vulnerability tracking and malware research - as well as details on its collaborative threat-intelligence site, IBM X-Force Exchange.
Tags : ibm, security, ibm x-force, threat intelligence, enterprise applications
     IBM
By: IBM     Published Date: Aug 01, 2018
Your customers aren't the only ones who can benefit from advancing artificial intelligence (AI) support — your employees can, too. Chatbots help employees who service customers, and you can build them with mature AI components. But success requires a focus on tasks rather than job replacement as well as a cyborg-like division between human and machine tasks. This report helps infrastructure and operations (I&O) pros determine which tasks are best executed by people and which are best left to machines, with use cases describing how that looks.
Tags : 
     IBM
By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: IBM     Published Date: Jul 26, 2017
Security incidents have been on the rise for the past few years, and most experts in cybersecurity believe the trend will only continue to intensify. Here, though, our subject is not the high-profile, headline-grabbing attacks we all know about but the everyday struggle of organizations everywhere, in every industry, to protect their data in a world of thieves.
Tags : security, cyber crime, trends, cyber security, data protection
     IBM
By: Esker     Published Date: Dec 19, 2016
In today’s highly competitive business environment, many organizations are expanding through mergers and acquisitions (M&As). Unfortunately, success comes at a cost. Growth via M&A activity often involves absorbing disparate ERP applications, which, over time, can create significant inefficiencies — particularly in the accounts payable (AP) department. The good news is, AP automation is emerging as an end-to-end solution that forward-thinking organizations can use to eliminate AP-related silos and maximize their market potential. Businesses with a complex ERP environment have several choices when it comes to AP automation solutions. This white paper is intended to assist AP and finance leaders, along with ERP system administrators, in evaluating their options, simplifying the decision-making process, and getting the absolute most out of their AP automation investment.
Tags : 
     Esker
By: CPC Strategy     Published Date: May 21, 2012
CPC Strategy looked at 4,274,820 clicks, 82,845 orders, $1,158,604.41 in spend $7,867,575.91 in revenue to find the best converting shopping site for online retailers. Fill out the form below to download the free report.
Tags : comparison shopping, shopping site, marketing channel, data feed, product feed, shopping feed, cse, online marketing
     CPC Strategy
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com