list management

Results 101 - 125 of 161Sort Results By: Published Date | Title | Company Name
Published By: Litmos     Published Date: Apr 27, 2015
Read this case study to see how Zumba enlisted the help of Litmos’ learning management system to expand and enhance Zumba’s fitness training program online.
Tags : 
learning management system, learning strategy, online training, mobile access, accessibility, human resources
    
Litmos
Published By: Polycom     Published Date: Feb 25, 2015
Video is already being utilized in most enterprises to some extent. The era of pervasive video has arrived, and with it the need to manage video holistically across the enterprise and throughout its lifecycle. Developing a proper strategy for management and governance can yield a competitive advantage especially when it is focused on key business outcomes.
Tags : 
polycom, ecm, video, content, platform, vcm, corporate communications, content marketing, corporate learning, customer support, community, analytics
    
Polycom
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Engine Ready     Published Date: Apr 30, 2009
Are you thinking about outsourcing your PPC Management and not sure how to really evaluate the best agency to meet your needs?  With thousands of agencies to choose from, how do you make sure you hire the right company? Read this insightful whitepaper that discusses the 57 questions you should be focusing on in your pursuit for the right PPC Management agency.
Tags : 
engine ready, checklist, search agency, search, seo, roi, return on investment, agency, agencies, marketing, search marketing, metrics, return on ad spend, roas, b2b, b2c, lead generation, landing pages, a/b, turnkey
    
Engine Ready
Published By: Fathom SEO     Published Date: Jan 28, 2008
A new guide from Fathom SEO explains how businesses can maximize search engine marketing efforts by adopting a holistic management plan for Pay-Per-Click and Search Engine Optimization. Learn how to effectively share data about keywords, ad copy and landing page performance.
Tags : 
seo, search engine, sem, search marketing, search engine marketing, ppc, pay per click, keywords, traffic generation, site traffic, web traffic, fathom, fathom seo
    
Fathom SEO
Published By: IBM     Published Date: May 09, 2014
Agile methods have become increasingly popular because they empower organizations to more quickly address emerging opportunities, to better ensure accurate fulfillment of functional requirements and to significantly enhance team productivity. Many organizations, however, are hesitant to employ agile methods for their safety-critical systems—since they have serious concerns about compromising those systems and thereby exposing themselves to completely unacceptable consequences.IBM Rational Chief Evangelist Bruce Powel Douglass explains how best practices for project management can assist organizations in experiencing all the benefits of agile development while continuing to maintain rigorous standards essential for successful delivery of safety-critical systems.
Tags : 
ibm, agile development, product development, agile methods, safety critical systems development, project management, productivity
    
IBM
Published By: Medical Group Management Association (MGMA)     Published Date: Apr 14, 2010
Learn about the flourishing medical group practice market and find out how to best position your product or service in front of this affluent consumer base. Listen to an informative 15-minute podcast and understand what Medical Group Practice Management Association (MGMA) members are looking for in the ideal vendor relationship. Hear what six MGMA members had to say about what they value - and what they avoid - when doing business with new companies.
Tags : 
mgma, medical, group practice, branding, health, vendor relationships, marketing
    
Medical Group Management Association (MGMA)
Published By: Tippit, CRM     Published Date: May 15, 2009
Today's Customer Relationship Management (CRM) solutions aim to recapture the personalized customer service provided by local mom-and-pop shops of yore – except with high-tech-analytics capabilities, collaborative platforms and automated processes. By gathering information from multiple data sources and storing it in a centralized location, a hosted CRM solution provides a holistic view of a customer in real time. Armed with this insight, a company’s management, sales and service people can better generate leads, target top customers, manage marketing campaigns, drive sales and boost customer satisfaction.
Tags : 
tippit, marketing, analytics, sales force automation, crm, onyx software, rightnow technologies
    
Tippit, CRM
Published By: InfusionSoft     Published Date: Apr 07, 2011
Infusionsoft, the Leader in Marketing Automation Software has created a simple Guidebook to help business owners navigate online growth.
Tags : 
internet marketing, infusionsoft, small business success, website effectiveness, traffic generation, list building, contact management, e-mail marketing
    
InfusionSoft
Published By: Emerson Network Power     Published Date: Nov 02, 2010
The ten steps outlined in this paper represent proven strategies for improving data efficiency and availability and create the foundation for holistic data center infrastructure management.
Tags : 
virtualization, high availability, emerson power network, liebert, data center infrastructure management, dcim, power usage, precision cooling, energy efficiency
    
Emerson Network Power
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : 
alienvault, threat intelligence, vulnerability assessments, vulnerability data
    
AlienVault
Published By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : 
mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing, email opt out management, email acquisition, affiliate email marketing, b2b scrubbing, can spam compliance
    
UnsubCentral
Published By: Brandwatch     Published Date: Apr 22, 2015
Download this case study to learn how agency DDB was able to use Brandwatch’s powerful coverage and flexible filtering capabilities to measure the success of its new Game of Thrones campaign.
Tags : 
social media, social analytics, social media monitoring, campaign measurement, campaign management, social listening, social business intelligence, social media campaigns, social media management
    
Brandwatch
Published By: VMware     Published Date: Feb 24, 2017
End users expect to be able to work anywhere, at any time, and from any device. Additionally, they expect a similar experience for accessing work apps and data across all their devices—desktop, laptop, tablet, and smartphone. Meeting these expectations is becoming more and more complex for IT teams that continue to use multiple disconnected tools to manage mobile and desktop devices. A unified endpoint management (UEM) solution provides a holistic and user-centric approach to managing all endpoints. VMware AirWatch® Unified Endpoint Management™ provides IT with a comprehensive view of asset inventory and full lifecycle management of endpoints across the organization. Read more to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Tags : 
    
VMware
Published By: Bronto     Published Date: Jul 16, 2012
Acquiring addresses is as essential as creating a targeted message. Learn where the best places are to start and how you can continue to grow strong lists over time. Download this whitepaper to learn more.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, list management, customer
    
Bronto
Published By: DATAbuddy     Published Date: Apr 27, 2009
Thousands of companies already leveraged the power of email marketing to promote their business to a wide range of customers. For those businesses that haven't yet introduced email marketing into their advertising efforts - and even for some of those who have - the strategy does reveal some challenges. Companies struggling to get the most out of their email marketing efforts should consider using a managed email marketing service. Let's take a look at the challenges of email marketing and how an outside firm can tackle those issues.
Tags : 
databuddy, email marketing, e-mail, email, email campaign, outside agency, smb, small business, medium business, smb, design and editorial, html coding, browser, paperless marketing, templates, click-thrus, deliverability, spam, website integration, consistent deployment
    
DATAbuddy
Published By: sweetiQ     Published Date: Jan 23, 2014
Successful brands, whether big or small, need ambassadors to trumpet their products and services. Finding the right people to represent you is a task - they are more than influencers. Download this whitepaper and you'll discover that while the best brand ambassadors are loyal customers, developing them may require significant work.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo, social local mobile, local search analytics, local marketing, local marketing analytics, local listing presence, local search optimization analytics, local search optimization software, local search optimization tools, local venue listings, local marketing recommendation, local search analytics, local seo analytics
    
sweetiQ
Published By: sweetiQ     Published Date: Jan 23, 2014
So you're looking for more places to get your website listed? There are thousands of them out there, but finding those truly relevant sites that can help bring traffic and possibly impact your rankings in the search engines usually takes work. Now sweetiQ offers you a way to accomplish this in less than a week. Download the paper to learn more about how you can get access to these listings and ensure that your information is accurate.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo, social local mobile, local search analytics, local marketing, local marketing analytics, local listing presence, local search optimization analytics, local search optimization software, local search optimization tools, local venue listings, local marketing recommendation, local search analytics, local seo analytics
    
sweetiQ
Published By: IBM     Published Date: Oct 14, 2014
IBM Rational Chief Evangelist Bruce Powel Douglass explains how best practices for project management can assist organizations in experiencing all the benefits of agile development while continuing to maintain rigorous standards essential for successful delivery of safety-critical systems.
Tags : 
    
IBM
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide provides a number of helpful tips for an effective evaluation of campaign activity, including: • How to distinguish between measurement types • An in-depth view on campaign measurement frameworks and dashboards • Common campaign objectives
Tags : 
social media, social analytics, social media monitoring, campaign measurement, campaign management, social listening, social business intelligence, social media campaigns, social media management
    
Brandwatch
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide features tips, tricks and case studies to help you learn how to identify and utilize influencers, including: • How influencer marketing works • Working examples from a variety of brands • How to evaluate and measure the success of your influencer campaigns
Tags : 
social media, social analytics, social media monitoring, influencer marketing, influencer campaigns, social listening, social business intelligence, social media management
    
Brandwatch
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide is an introductory overview of best practices for crisis and issues communications in the social media age, focusing on: • What reputation monitoring actually means • How to identify a crisis & assess the damage • Real-world examples from Marriott, United Airlines and Walmart/Asda
Tags : 
social media, social analytics, social media monitoring, crisis management, reputation management, social listening, social business intelligence, brand monitoring, social media management
    
Brandwatch
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library