guide

Results 326 - 350 of 3240Sort Results By: Published Date | Title | Company Name
Published By: Bazaarvoice     Published Date: Aug 12, 2013
The FTC social disclosure rules apply to you – now. This webinar shows you how to do social right: Effectively. Ethically. Legally. These guidelines actually keep you out of trouble while building consumer trust along the way.
Tags : 
brand messaging, consumer engagement, social branding, ftc, federal trade commission
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Aug 05, 2014
The local consumer decision journey has changed. This step-by-step guide will show you how to connect with local consumers to improve visibility, gain control of your reputation, and drive more local leads and sales.
Tags : 
bazaarvoice, customer, local advocacy, sales, online discovery, local marketing
    
Bazaarvoice
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system
    
Bell Micro
Published By: Benchmark Email     Published Date: Jul 12, 2012
How do you find your audience? How do you reach them? Who's after your business and what is your ultimate goal? When you've decided to commit to email marketing, Benchmark is ready with a step by step strategy guide.
Tags : 
benchmark, marketing, email, email marketing, bloggers, business, marketing strategy
    
Benchmark Email
Published By: Betterment     Published Date: Sep 12, 2018
Most employed Americans want more financial wellness guidance from their employer-sponsored benefits plans. The right 401(k) can help employees save the right amount, diversify, and stay the course — and save organizations time and headaches.
Tags : 
    
Betterment
Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce
Published By: BirdDog     Published Date: Jul 23, 2014
Learn how your construction company can elevate applicants with the best fit to the top of your recruitment list with the aide of an applicant tracking system and see how this will ensure that the right people end up at your business.
Tags : 
birddog, construction hiring, construction talent management, construction recruitment, talent acquisition, applicant tracking, job distribution, candidate management, recruiting, ats, human resources
    
BirdDog
Published By: Birst     Published Date: Jul 16, 2013
This BI guide has 10 real-life business scenarios that will elicit your business intelligence requirements in plain English. Key stakeholders and executive sponsors will get an easy-to-digest view of business intelligence requirements without getting into the details.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
Published By: Bitium     Published Date: Jan 22, 2014
Selecting the right single sign-on solution (SSO) for your organization can be a daunting task. Competing solutions offer varying levels of application support, management overhead, and potentially confusing (and counter- productive) cost structures. But the upside in terms of improved security, manageability and user productivity enhancements provided by the right SSO solution can be dramatic. The questions contained within are intended to help you collect and organize the critical information you need to make a well-informed decision for your organization. Please use them as a guide during your due diligence and vendor selection process. Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
    
Bitium
Published By: BitSight Technologies     Published Date: May 26, 2016
With this guide, you’ll never have to wonder about that again. You’ll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Aug 02, 2016
Organizations today aren’t just single entities—they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. Because of this, vendor risk management (VRM) is a critical business practice.
Tags : 
    
BitSight Technologies
Published By: Bizible     Published Date: Jun 09, 2017
How much is marketing contributing to revenue? Learn how to report intelligently to your CEO using marketing attribution.
Tags : 
marketing attribution, revenue attribution, b2b attribution, marketing anaytics, full-funnel marketing, b2b marketing, multi-touch attribution, omni-channel attribution, omni-channel marketing, marketing data, salesforce attribution
    
Bizible
Published By: Bizible     Published Date: Jun 09, 2017
Companies that excel at marketing performance management focus on the measurable outcome of marketing: revenue, deals, and retention. Learn more about developing the right MPM framework for your organization.
Tags : 
marketing performance management, marketing performance, marketing measurement, marketing planning, marketing plan, marketing roi, marketing revenue, revenue marketing, revenue plan, revenue planning
    
Bizible
Published By: Bizible     Published Date: Jun 09, 2017
Learn how B2B marketers are moving away from vanity metrics and starting to optimize and plan for revenue with pipeline marketing. Get the comprehensive guide to get started!
Tags : 
    
Bizible
Published By: Bizible     Published Date: Jun 19, 2017
Learn how B2B marketers are moving away from vanity metrics and starting to optimize and plan for revenue with pipeline marketing. Get the comprehensive guide to get started!
Tags : 
pipeline marketing, full-funnel marketing, revenue marketing, b2b marketing, conversion tactics, growth marketing, growth hacking, demand generation, demand gen, lead gen, lead generation, marketing data
    
Bizible
Published By: Bizible     Published Date: Jul 25, 2017
Learn how B2B marketers are moving away from vanity metrics and starting to optimize and plan for revenue with pipeline marketing. Get the comprehensive guide to get started!
Tags : 
    
Bizible
Published By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning
    
Black Duck Software
Published By: BlackBerry     Published Date: Apr 13, 2010
Equipping staff with the right tools can enhance productivity, motivation and staff retention. Highly secure mobile email and data applications help mobile workers stay in touch and up-to-date with a wide range of business issues. Extending that streamlined anytime, anywhere access to mobile voice applications is the next frontier in worker empowerment.
Tags : 
blackberry, fixed mobile convergence, fmc, pbxvoip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 19, 2010
Today, many companies are investing in wireless and mobile solutions. Where mobility was once viewed as a risky venture, its value is now understood. These solutions are expected to increase productivity and improve efficiency due to improved field-based access to knowledge within the mobile workforce. In the current competitive climate where companies must compete globally, wireless solutions are no longer about gaining an edge, but about keeping up with the competition.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 03, 2009
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy. Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Tags : 
blackberry, mobile applications, mobile security, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, mobile applications, enterprise server, planning guide, aes, des, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Jul 23, 2010
Investing in mobility is like investing in any other important business activity, and its success will largely depend on how closely it is aligned with both business and IT drivers. A successful mobility plan should focus on 'mobilizing' your critical business processes and include planning phases for discovery, development and deployment. This Guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, touchpoint
    
BlackBerry
Published By: BlackBerry     Published Date: Jul 22, 2010
Unified Communications (UC) integrates multiple communications modalities and adds presence features to allow workers to communicate and collaborate more effectively with co-workers, customers and suppliers. Learn about the cost, productivity and reachability issues associated with increased enterprise mobility and the benefits and future directions of Mobile UC.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, fmc, telecom, touchpoint
    
BlackBerry
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library