attention

Results 176 - 200 of 287Sort Results By: Published Date | Title | Company Name
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
In the same way, the WLAN seems to be demanding more of our attention these days. IT teams are spending an increasing amount of time managing, configuring and troubleshooting to accommodate a growing number of devices and apps, and to meet user demands for ever-faster speeds and better coverage.
Tags : 
it teams, wlan, intelligent architecture, unified network, security management, iot onboarding
    
Alcatel Lucent Enterprise
Published By: FunMobility     Published Date: Aug 21, 2012
Going mobile can be challenging. "Beyond Check-ins, Mobile Strategies for the Future of Retail" will give insight on how marketers can capture consumers' attention and loyalty using mobile engagement. Over 40% of shoppers carry a smartphone in retail environments, which offers brands the opportunity to interact with customers beyond their brick and mortar stores. Find out how brands, CPGs and retailers can add real value to their customers' retail shopping experience.
Tags : 
crm, customer engagement, mobile, mobile strategy, webinar
    
FunMobility
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
    
Qualys
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In a free audio/video Webcast with MarketingSherpa’s Anne Holland, learn valuable, tested B-to-B marketing tips, including how to stop spending too much on SEM while making your remaining SEM budget work harder... how to make prospects pay attention to your content... the key difference between case studies and success stories... when—and why—you should consider removing the registration page... and more.  Don’t miss these proven tips—watch the free 30-minute Webcast now.
Tags : 
promo code: wp3, marketing sherpa, marketingsherpa, b-to-b, b2b, b-to-b marketing, b2b marketing, marketing budget
    
Marketo, INC.
Published By: QuinStreet     Published Date: Feb 05, 2009
As the world continues to analyze energy availability and the long-term effects of climate change, businesses too are turning their attention to an area of opportunity—reduction of carbon emissions, energy conservation and supply chain sustainability. Many businesses are finding that these initiatives go beyond simple good-citizenship to real business opportunities and bottom line savings that can contribute financial value to the organization while meeting demanding customer requirements. Join Today!
Tags : 
quinstreet, csr, corporate social responsibility, globalization, product lifecycle management, plm, performance management, performance measurement
    
QuinStreet
Published By: Cornerstone OnDemand     Published Date: Mar 31, 2011
The challenge with being a consistent performer is, while they typically get more work done, they get less attention from their managers, and they have fewer professional opportunities available to them.
Tags : 
performance management, talent mobility, cornerstone ondemand, saas, talent management, human capital management, hcm
    
Cornerstone OnDemand
Published By: GoToWebinar     Published Date: Oct 08, 2013
We've all grown used to ordinary customer experiences, so when something extraordinary happens, we pay attention. No matter whether your business is a one-person show just getting started or a multi-national corporation, whether you are a front-line worker or a top-level executive, you can create awesome. This brief by Scott Stratten, best-selling author and president of UnMarketing, shares stories that’ll inspire you to find your own unique brand of business awesome.
Tags : 
marketing, scott stratten, good to awesome, citrix, go to meeting, the book of business awesome
    
GoToWebinar
Published By: SAS     Published Date: Apr 25, 2017
The Internet of Things (IoT) – devices and sensors connected to computing systems and networks – has received enormous attention in the last few years. The attention is due, in part, to the proliferation of connected devices, from about a million in the early 1990s to more than five billion today. In addition, the technology for connecting the devices has become more affordable and easier to integrate.
Tags : 
    
SAS
Published By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : 
java, insecurity, vulverabilities, computing, security
    
Lumension
Published By: Mass Relevance     Published Date: Jun 12, 2014
Don’t just put a sponsor’s logo in your ads (and vice versa). Instead, give interested brands a way to really grab the audience’s attention. View social sponsorship best practices for live events, on-air promotion, and website integration plus case studies from networks, agencies, and sponsors. Don't miss how the 25th annual College Slam sponsor Denny's drove 60,000 tweets during ESPN's live broadcast.
Tags : 
sponsorship offerings, sports sponsorship, on-air promotion, and website integration
    
Mass Relevance
Published By: IBM     Published Date: Jan 06, 2016
In light of such popularity, many organizations are turning their attention to mobile recruiting. So, how do job seekers use mobile devices in their job searches? Using data from the global IBM WorkTrendsTM survey, the IBM Smarter Workforce Institute (SWI) analyzed why and how potential job seekers use mobile in their job searches and what concerns and expectations they have. The results provide organizations with clear insights into how they can attract talent via mobile technologies.
Tags : 
ibm, mobile recruitment, recruitment, mobile devices, smarter workforce institute, attracting talent, human resources
    
IBM
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: IBM     Published Date: Mar 28, 2016
The rise of social media, coupled with the desire to build more engaged and productive workforces, has brought “active employee listening” to the forefront of management attention. No longer is it enough to encourage employees to speak up about topics that matter to them. Organizations today need to more actively solicit, analyze and engage in ongoing conversations with past, present and even future employees. Having access to the collective “employee voice” can help leaders achieve diverse goals, including identifying innovations, preventing discord and improving productivity, as well as building a better connection to the organization and its mission. So, how can organizations establish and manage mutually beneficial listening programs? To better understand what companies are doing in the area of employee listening and the extent to which employees are willing to participate, we analyzed data from the 2015 IBM Smarter Workforce Institute WorkTrends Survey – a broad-based survey of ov
Tags : 
ibm, ibm smarter workforce, work trends, employee engagement
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
The rise of social media, coupled with the desire to build more engaged and productive workforces, has brought “active employee listening” to the forefront of management attention. No longer is it enough to encourage employees to speak up about topics that matter to them. Organizations today need to more actively solicit, analyze and engage in ongoing conversations with past, present and even future employees. Having access to the collective “employee voice” can help leaders achieve diverse goals, including identifying innovations, preventing discord and improving productivity, as well as building a better connection to the organization and its mission. So, how can organizations establish and manage mutually beneficial listening programs?
Tags : 
ibm, ibm smarter workforce, work trends, employee engagement, human resources
    
IBM
Published By: Mintigo     Published Date: Nov 20, 2017
What is ABM and why is it so cool? Rarely do new trends catch the attention of marketers with the velocity and intensity of Account Based Marketing (ABM). So what is ABM and how should marketing and sales executives strategically evaluate an ABM program for their organization? The definition of ABM is: The systematic process to use data and intelligence to discover, identify, segment, target, engage and win business.
Tags : 
    
Mintigo
Published By: SAP     Published Date: Jan 19, 2010
Your information can be one of your greatest assets - helping you stay on top of regulatory requirements, close to customers, and ahead of the competition. Organizations that pay attention to their data will be the ones to survive and thrive. So how do you obtain a complete view of your information when it is scattered across silos? Or integrate data from structured and unstructured data sources? Or help reduce the risk of inaccurate reporting? And how do you manage your information more effectively to help keep costs from spiraling out of control?
Tags : 
sap, eim, enterprise information management, erp, crm, etl
    
SAP
Published By: Oracle     Published Date: Apr 28, 2014
Is innovation getting the right attention at your company?
Tags : 
oracle, innovation, innovation management
    
Oracle
Published By: SAS     Published Date: Mar 06, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand.
Tags : 
    
SAS
Published By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
Symantec
Published By: LTC Financial Partners     Published Date: Sep 24, 2009
The book contains seven chapters that cover tax advantages, multi-Life advantages, policy design, plan communication and implementation. The fact sheet will be an eye opener for any business owner. With stats like the annual cost to companies for workers lost productivity due to elder care responsibilities is estimated at $2,110.00 per employee, to the tune of 33.6 billion a year; a business owner cannot afford not to pay attention.
Tags : 
long term, financial, life, policy, tax, insurance, retirement, savings
    
LTC Financial Partners
Published By: Oracle Corporation     Published Date: Mar 03, 2011
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : 
customer attention, decision management, performance goals., real time management, oracle
    
Oracle Corporation
Published By: Oracle Social Cloud     Published Date: Feb 17, 2015
Last year's Super Bowl was disappointing on every level and simply could not live up to the hype. 2015 could not have provided a more opposite result. This was the year of the emotional rollercoaster. NBC is known for their heartfelt sports coverage and has mastered the art of storytelling, all on full display for Sunday's game. The network leveraged all their best tactics with outstanding results. The game was high drama at its best and kept the audience engaged to the very end. Brands had serious competition from the games itself this year, but brought their own flood of emotions with some familiar storylines that garnered significant social conversation volume to very unexpected commercials eliciting strong negative feedback. In this analysis we will examine how brands used social media to continue the conversation, leverage assets and advocates, and even create intentional mistakes to earn attention.
Tags : 
oracle, brand strategy, super bowl, social media strategy, engagement, continuing the conversation
    
Oracle Social Cloud
Published By: Adobe     Published Date: Jun 03, 2015
Download this January, 2015 report to learn how you can evolve your email marketing practices and boost your business results. You’ll learn why today’s consumers ignore traditional emails — and what you can do to recapture their attention.
Tags : 
adobe, email, marketing, playbook, brands, digital marketing, integrated, contextual messaging
    
Adobe
Published By: Micro Focus     Published Date: Aug 28, 2014
The ‘lights on’ challenge, where organizations purely focus on the day-to-day running of the organization, continues to leave little scope for innovation. Ever-increasing IT backlogs, together with support and resourcing issues, compete for attention with compliance projects and new innovation. A breakthrough is needed. Greater IT efficiency cannot be achieved by a small fix here or there – a new way of thinking is required to help deliver value and address your operational challenges. Here are ten actions your organization can take on this journey of major change.
Tags : 
it efficiency, outsourced projects, user efficiency, it backlogs
    
Micro Focus
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library