connection

Results 351 - 375 of 430Sort Results By: Published Date | Title | Company Name
By: Introhive     Published Date: Sep 24, 2013
Connections exist throughout your entire organization. These connections can be leveraged with warm introductions to eliminate the need for cold calling into those key prospects and accounts. Download this white paper to discover how your relationship capital can increase ROI.
Tags : relationship capital, increasing roi, closing deals, sales
     Introhive
By: IBM     Published Date: Aug 21, 2013
Have you ever found yourself in this untenable position? Your web team and email program owners are targeting the same customers, with different offers, or worse, competing offers. Siloed systems and teams limit marketers’ ability to make sound assessments about performance and spending. Marketers around the world spend over one trillion USD each year. Yet, most of them still manage their marketing programs with a hodgepodge of spreadsheets and disconnected applications. Unnecessary costs, delays and poor collaboration plague marketers. Under increasing pressure to connect with customers while doing more with less, marketers who strive to optimize marketing performance through a single integrated software platform can make the best use of people, programs and resources. Today, you need a return on every dollar spent and a platform that aligns technology, people and processes to help create effective, efficient marketing programs that support customers for life.
Tags : enterprise marketing management, marketing management, marketing roi, marketing connections, marketing performance, return on investment, marketing optimization
     IBM
By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, enterprise applications
     Bitium
By: Riverbed     Published Date: Aug 22, 2014
The world’s largest organizations are adopting cloudbased infrastructure and services at a dizzying pace. Software as a service (SaaS) offerings such as Salesforce.com and Microsoft Office 365 are among the more popular cloud-based services. When moving services to the cloud, data centers are no longer local, so the end user experience can suffer. A poor or congested Internet connection between the user and the cloud service will mean sluggish application delivery that puts a damper on user productivity and ultimately threatens application usage.
Tags : acceleration, delivery, cloudbased infrastructure, productivity
     Riverbed
By: Riverbed     Published Date: Aug 22, 2014
An IDC® study documented the business impact of WAN optimization solutions on enterprise organizations. Current trends and issues that were explored include evolving and shifting communication patterns, connection types, applications and bandwidth.
Tags : optimize, network, profit, business impact, solutions, organization, trends, issues, evolving, communication, patterns, connection types, applications, bandwidth
     Riverbed
By: Polycom     Published Date: Mar 12, 2018
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business.
Tags : skype, business, polycom, infrastructure, meeting, enterprise
     Polycom
By: Riverbed     Published Date: Aug 19, 2014
An IDC® study documented the business impact of WAN optimization solutions on enterprise organizations. Current trends and issues that were explored include evolving and shifting communication patterns, connection types, applications and bandwidth.
Tags : optimization, wan, communication, patterns, enterprise, networking
     Riverbed
By: Microsoft Office 365     Published Date: Jun 03, 2016
Did you know that just like email, video conferencing is susceptible to security risks? Our “Online Meetings: Secure Your Video Conferences” eBook shows you how small and medium businesses can use Skype for Business to provide effective collaboration tools—like HD video conferencing*—that are more secure and simple to use. In this ebook, you’ll discover how to: Save on security, risk, and compliance costs Reduce risk with a comprehensive solution Simplify your IT environment and increase security *For HD video, compatible HD hardware and broadband connection with at least 4 Mbps required.
Tags : 
     Microsoft Office 365
By: Microsoft     Published Date: Jan 05, 2017
Customer engagement requires an organization-wide commitment to creating meaningful connections, building relationships, and nurturing those relationships to establish trust and keep your brand top-of-mind.
Tags : microsoft, customer service, customer engagement, digital sales, lead nurturing
     Microsoft
By: MessageLabs     Published Date: Jul 16, 2009
What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of computers and the interconnections of the network against innocent businesses to make money. Learn more today!
Tags : messagelabs, email security, web security, virus, spam, spyware, phishing
     MessageLabs
By: Bronto     Published Date: Jan 02, 2014
Attention digital marketers, we are no longer in control. Whether they realize the true strength of their powers or not, consumers now have the upper hand of the digital marketing experience. Download this e-book to explore each phase of the customer lifecycle and detail programs to reach your customers across channels, devices and levels of engagement.By downloading now, you'll gain instant access to Chapter 1, Acquiring and Welcoming New Subscribers. Then, keep an eye on your inbox for the remaining 5 chapters over the next few weeks.
Tags : lifecycle marketing, customer engagement, e-commerce marketing, acquiring subscribers
     Bronto
By: Act-On     Published Date: Jan 07, 2016
People buy from people, not companies. Next to events and other face-to-face methods, social media is the best channel for building meaningful connections with your prospects. This eBook explains the five key steps to use social selling to build relationships that last, provide value, demonstrate consistency, and are mutually beneficial.
Tags : social media, relationship building, social selling
     Act-On
By: Act-On     Published Date: Apr 29, 2016
Landing pages are the foundation that supports successful inbound marketing campaigns. Once you’ve done all the work of attracting visitors to your site, they’re the key to making the connection – and getting the conversion.
Tags : marketing, content marketing, best practices, business optimization, conversion, campaigns
     Act-On
By: Oracle     Published Date: Sep 30, 2014
Read this report by Forrester Research, Inc. for a better understanding of customer life-cycle marketing systems, a look at the landscape of CLCMS technology providers, and key recommendations for CMOs to prepare for and adopt these new but necessary tools. Fragmentation of the customer journey, due to the growth of digital channels, platforms and content, has forced marketing to be more relevant and responsive. In this paper, Forrester calls on CMOs to adopt the customer life-cycle as a guiding framework and deploy “customer life-cycle marketing systems” (CLCMS). Learn more by downloading the report.
Tags : oracle, marketing, cloud, connected, customer, modern, optimize, marketing, connection, touchpoints
     Oracle
By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
     GeoTrust
By: Symantec Corporation     Published Date: Oct 03, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to websites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Symantec     Published Date: Dec 04, 2014
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections.
Tags : ssl, http, firesheep, side-jacking, wi-fi attacks, tls, user protection, security
     Symantec
By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
     Symantec
By: LiveHive     Published Date: May 26, 2016
Using a multi-touchpoint strategy with automated email and call scheduling, sales organizations can quickly reach more prospects to maximize outreach efforts and improve connection rates. Download LiveHive's latest eBook to learn the five essential elements needed to implement and manage an effective multi-touchpoint sales strategy.
Tags : sales strategy, b2b sales, sales tools, multi-touch strategy, multi-touchpoint strategy, sales acceleration, email personalization, automated emails, qualification, conversion rate, connection rate, sales email templates, email analytics, sales intelligence, quality connects, engagement analytics
     LiveHive
By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security, data management
     Thawte
By: Adobe     Published Date: May 16, 2017
Download our new guide, Up Close and Personal, to learn how you can make the most of marketing’s hottest real estate — the mobile device. You’ll discover the tools and strategies you need to adopt a mobile-first mindset, so you can connect personally with customers. Right where they live. Get the guide now to explore the three Cs of mobile engagement: • Context — maximize mobile capabilities to make it relevant • Connection — discover strategies to make it personal • Cadence — learn to orchestrate content and time it right
Tags : 
     Adobe
By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi, ssl, vpn, secure access, aventail, networking
     Aventail
By: IBM     Published Date: Apr 23, 2008
Imagine using your personal desktop on any computer. You can, with the IBM Virtual Client Solution. This demo explains the backend process of server-hosted services, shows how a user’s desktop is delivered through a remote connection, and demonstrates how an administrator can shift servers for IT simplification without interrupting users.  Watch the demo now.
Tags : ibm, ibm opt it, opt it, remote desktop, vnc, virtual client, virtual machine, virtual desktop, remote access
     IBM
By: IBM     Published Date: May 30, 2008
The productivity and bottom line of most businesses have benefited greatly from the increasing pace and pervasiveness of technological support. In the process, the community that characterizes and supports businesses of all sizes has been given short shrift. In this Clipper Group paper, read about IBM Lotus connections, the tool that will help your team to collaborate as efficiently as possible.
Tags : ibm, ep campaign, ibm ep, productivity, lotus, lotus connections, desktop management, collaboration
     IBM
By: iDirect     Published Date: Aug 21, 2009
With developments in IP networking in general and the Internet in particular, the ability to transmit voice calls which have been traditionally handled by the public switched telephone network (PSTN) over a lower cost IP infrastructure has become a reality. More and more users are researching VoIP capability when purchasing a connection to the Internet or simply expanding their private intranet.
Tags : voice over ip, ip telephony, voip, ip networking, ip networks, pstn, telephone, phone, telecom, telecommunications, ip infrastructure, infrastucture, idirect
     iDirect
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com