events

Results 201 - 225 of 258Sort Results By: Published Date | Title | Company Name
Published By: GoToWebinar     Published Date: Nov 20, 2009
Do you know your numbers? If getting more high-quality leads from your marketing events spend is a top priority, then it pays to know the return on investment of your marketing events tactics. This new white paper explores which marketing events offer the greatest return on investment for your budget and staff. Read survey results of marketers using different types of events, and then calculate your own event costs with the marketing events ROI calculator.
Tags : 
citrix gotowebinar, online content strategy, lead generation, marketing, buyers, integration, b2b, content management
    
GoToWebinar
Published By: SAS     Published Date: Oct 03, 2018
Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining what’s possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to: • Protect from reputational, regulatory and financial risks. • Reduce the cost of fraud and financial crimes prevention. • Gain a holistic view of risk across functions. • Include cyber events in regulatory report filings. In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.
Tags : 
    
SAS
Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations
    
BlackBerry
Published By: Cisco     Published Date: Nov 30, 2016
Nearly two-thirds of B2B marketers say online events are by far one of the most effective content marketing tactics.1 But carrying out a successful event requires some simple, yet important steps to ensure both marketers and attendees gain all of the benefits of online events, including real-time experience, engagement, and convenience. If you’re ready to produce your first online event, this 12-step checklist takes you through the entire process — from planning to post-event follow-up — to provide you with the information you need to get started. 1
Tags : 
    
Cisco
Published By: Phunware     Published Date: Jul 30, 2014
Retailers and Marketers have not yet begun to take total advantage of the newest technologies to leverage bid data and mobile. Download this whitepaper for the key best practices that will allow mobile marketers to utilize these technologies and capture a larger market share.
Tags : 
phunware, apps for sports, apps for event marketing, apps for live events
    
Phunware
Published By: Auth0     Published Date: May 12, 2016
An online game such as Marks and Spencer’s holiday Pass The Parcel campaign is in many ways, the worst case authentication scalability demand. The viral nature of the game generates massive numbers of registration and login events through both social providers and through username/password as eager players open presents and engage their friends to play. The game builds a huge audience of active players that remain active for the entire promotion while recruiting even more players, each of whom must register and then login to play, often multiple times per day.
Tags : 
auth0, authentication, scalability, marks and spencers, authentication demand
    
Auth0
Published By: Limelight Platform     Published Date: Sep 06, 2016
This guide will allow you to prove and improve ROI/ROO, assist in defining KPIs and showcase how to best leverage digital in today’s changing experiential marketing landscape.
Tags : 
live marketing software, live lead generation, event marketing analytics, experiential marketing analytics, limelight marketing, experiential marketing software, experiential marketing, promotional events, live marketing, event marketing software, roi, roo, kpi, return on investment, analytics, data, consumer insight, events, experiences, onsite
    
Limelight Platform
Published By: IBM     Published Date: Mar 31, 2016
"Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action. "
Tags : 
ibm, ibm operational decision manager, ibm odm advanced, process improvement, business analytics, business insights
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : 
ibm, odm, middleware, ibm operational decision manager, application services
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
More and more companies are moving to the cloud for B2B services, and for good reason. There’s a huge potential for increased visibility and analytics-driven insights to be gained from B2B transactions that can give businesses unprecedented levels of information. But many organizations continue to struggle when it comes to going beyond basic transactional data and historical performance metrics. What does it take to not only report on past activity, but to get real-time alerts, predict future events, manage exceptions, and proactively leverage this wealth of data in order to put it to work? Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : 
b2b services, ibm, b2b analytics, b2b reporting, transactional data, trading partner relationships
    
IBM
Published By: APTX     Published Date: Nov 05, 2009
This paper examines the key performance aspects of low bit rate audio codecs for the next generation of bandwidth-efficient digital wireless microphone systems that meet the future needs of live events.
Tags : 
aptx, bit-rate, wireless microphone, audio codec, spectrum, compression ratio
    
APTX
Published By: Brainshark     Published Date: Oct 16, 2013
Do you have a strategy specifically for video marketing? If not, you're missing out! Video has proven to be an effective means of boosting demand generation, enabling sales teams, improving PR practices, promoting upcoming events, and more. Read this E-book to get started now.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, demand generation, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video
    
Brainshark
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Compass Datacenters     Published Date: Feb 01, 2016
The world of data centers and IT has been historically been one of gradual evolution, but events and capabilities that have emerged over the past 3-5 years present both a challenge, and opportunity to the IT organization. Click here to read about the IT Metamorphosis.
Tags : 
compass data centers, data center, cloud computing, facilities management
    
Compass Datacenters
Published By: APC by Schneider Electric     Published Date: Feb 15, 2011
This paper analyzes several of these incidents and makes recommendations for how a basic monitoring system can help reduce the occurrence of these unanticipated events.
Tags : 
apc by schneider electric, monitoring systems, human error, distributed server rooms, remote wiring closet, downtime
    
APC by Schneider Electric
Published By: Symantec     Published Date: Nov 30, 2015
Symantec has the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second.
Tags : 
    
Symantec
Published By: Act-On     Published Date: Jan 07, 2016
People buy from people, not companies. Next to events and other face-to-face methods, social media is the best channel for building meaningful connections with your prospects. This eBook explains the five key steps to use social selling to build relationships that last, provide value, demonstrate consistency, and are mutually beneficial.
Tags : 
social media, relationship building, social selling
    
Act-On
Published By: AlienVault     Published Date: Oct 20, 2017
When you're starting service with a customer, setting the tone early on is very important. That's why we've created a checklist to help you stay organized from the start and implement smart process around your Managed Security Service Provider (MSSP) service. Feel free to use it but most importantly modify it. Use this checklist to help you document: • Network information • Logging devices • Contact information • Priority escalation contacts • Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault
Published By: CrowdCompass     Published Date: Jul 20, 2017
You know you need a mobile event app, but choosing the right one can sometimes be a tricky, painstaking process. Ranging from freemium/low-cost solutions to full capability, multi-event apps, determining what you need for your conferences, tradeshows, incentive events, meetings, and more is no easy task. Let us help. Download our free eBook: “Simple Questions for Success – The Definitive Guide to Selecting a Mobile App” and find the awesome event app of your, and your attendees, dreams.
Tags : 
mobile app, event app, easy planning, social media integration, social media, networking capabilities, mobile event app, return on investment, mobile personalization, mobile networking, mobile interaction, mobile security, data privacy
    
CrowdCompass
Published By: Act-On     Published Date: Apr 18, 2014
Webinars have much in common with real-world events and can deliver a similar quality of leads, at a lower cost per lead. Producing a webinar provides its own set of unique challenges, but with strategic planning, a project approach, and attentive execution, you’ll find yourself creating thoroughly professional webinars.
Tags : 
marketing automation, marketing, roi, benefits, grow your business, lead generation, social media, lead management strategy, content marketing, marketing strategy
    
Act-On
Published By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the world’s largest business law firms.Michael and his team oversee the firm’s meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLA’s 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each person’s role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, “right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. It’s a win-win.”
Tags : 
    
Seamless
Published By: TowerData     Published Date: Jan 20, 2007
Visitors to your website are valuable leads and capturing their contact information is essential to converting them to customers. However, when prospects enter email addresses and phone numbers into a web form they often make mistakes, such as misspellings and typos, or they falsify data, which prevents you from being able to contact them.
Tags : 
email list, email append, email address, cass, customer database, tower data, database, data quality, clean data, list management, towerdata
    
TowerData
Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn, ssl vpn, security management, disaster planning, aventail
    
Aventail
Published By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : 
compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management, vulnerability assessment, vulnerability, preventsys
    
Preventsys
Published By: Preventsys     Published Date: Aug 21, 2009
Much has been written and discussed about Enterprise Risk Management (ERM) as it relates to compliance, corporate governance, financial controls and the Sarbanes-Oxley Act of 2002 (SOX). Until now, there was very little available to the risk manager on how to apply ERM to day-to-day operations.
Tags : 
sarbox, sox, sarbanes oxley, sarbanes-oxley, risk management, finance, compliance, regulatory compliance, security management, preventsys
    
Preventsys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library