social enterprise

Results 1 - 25 of 178Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Nov 16, 2016
The perfect stock image pulls triple duty for creative teams. That means it doesn’t just match campaign messaging. It also meets design specs for multiple channels and maps back to your overall brand guidelines. Read Finding the Perfect Image, and learn how the right stock service can help you: - Spend less time on processes and more time on creating experiences - Keep pace with every channel, including social media - Scale creative production to meet the demands of enterprise
Tags : 
adobe, stock, stock image, creative, design
    
Adobe
Published By: Adobe     Published Date: Jan 26, 2017
The perfect stock image pulls triple duty for creative teams. That means it doesn’t just match campaign messaging. It also meets design specs for multiple channels and maps back to your overall brand guidelines. Read Finding the Perfect Image, and learn how the right stock service can help you: - Spend less time on processes and more time on creating experiences - Keep pace with every channel, including social media - Scale creative production to meet the demands of enterprise
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe
Published By: Adobe     Published Date: Apr 13, 2017
The perfect stock image pulls triple duty for creative teams. That means it doesn’t just match campaign messaging. It also meets design specs for multiple channels and maps back to your overall brand guidelines. Read Finding the Perfect Image, and learn how the right stock service can help you: • Spend less time on processes and more time on creating experiences • Keep pace with every channel, including social media • Scale creative production to meet the demands of enterprise
Tags : 
creative assistance, graphic design, photo editing, creative cloud, design, creative design
    
Adobe
Published By: Adobe     Published Date: Mar 02, 2017
The perfect stock image pulls triple duty for creative teams. That means it doesn’t just match campaign messaging. It also meets design specs for multiple channels and maps back to your overall brand guidelines.
Tags : 
adobe, stock, image, customer experience, social media, creative production, enterprise
    
Adobe
Published By: BMC Software     Published Date: Jan 31, 2014
IT is embracing to this new world of consumerized technology, with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity. Please download the white paper for more information.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
Today’s mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, you’ll learn why businesses are moving to cloud-based ITSM and the advantages they’ve achieved. Explore how this innovative approach to IT management might be right for your organization. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, thinkstrategies
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization
    
BMC Software
Published By: BMC Software     Published Date: Feb 03, 2014
Analysts predict that soon, half of all new IT service desk tools will be adopted as cloud-based services. While shifting to an on-demand model can be a complex decision, requiring organizations to assess carefully the potential impact on their business operations, a growing number of companies are clearly finding the move worthwhile. This paper explores the reasons for the rapid growth of cloud-based IT service management (ITSM) solutions and the benefits they offer for enterprises. Topics include: • The cost savings companies can achieve by deploying ITSM solutions via the cloud, which allows better management and optimization of consumption and costs. • Improved alignment between IT to and business, as self-service, a service catalog, collaboration, and mobility help IT expose and provide its services more effectively. • The ability to integrate cloud and on-premise solutions to leverage existing systems while leveraging new innovations via the cloud. • The advantages of cloud
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools
    
BMC Software
Published By: Brainshark     Published Date: Oct 16, 2013
Traditional ways of talking to customers, partners, and employees—memos, phone calls, newsletters—are being replaced by web-based interactive and social communication tools. Of those surveyed, 88% said that mobile access to social communication or collaboration tools was either important or very important. This whitepaper examines how companies can leverage Mobile, Social Enterprise, and video to create an enriched environment that delivers important communications and fosters active engagement.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video, tablet
    
Brainshark
Published By: Brandwatch     Published Date: Jun 17, 2013
An introduction to using social media in business, this eBook discusses the importance of setting social media goals and how to foster a positive brand experience, along with tips to become a thriving social enterprise.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputatino monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data. This transformation is also amplifying competition. As analyst Mark Raskino notes, “As a consequence, all players rebuilt their strategies around the same time, and all have awakened to the power of digital business at the same time. Contention is therefore inevitable.” To find out more download this whitepaper today!
Tags : 
    
CA Technologies EMEA
Published By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : 
cloud computing, infrastructure, marketplace, application, hybrid, enterprise
    
Cisco
Published By: Cision     Published Date: May 02, 2016
In the following paper, we will share the following key strategies that will fuel a successful social media strategy for your business. We will: - Outline the six strategies and technologies for creating a framework for success - Map out a social implementation model for setting up the distribution of your content in order to protect your brand when third-party platforms, such as Google and Facebook, inevitably make changes - Share the right way to think about measuring, monitoring and managing your social media strategy and performance
Tags : 
cision, social media, social media strategy, marketing
    
Cision
Published By: Clearvale by BroadVision     Published Date: Oct 22, 2012
When implemented correctly, Enterprise Social Networks increase collaboration and productivity with customers, partners and more. For those deploying ESN in their enterprise, this guide gives an adoption process that will increase chances of success.
Tags : 
business social network, business social networking, collaboration software, collaboration tools, enterprise 2.0, enterprise collaboration, enterprise social, enterprise social network, enterprise social networking, social crm, social enterprise, social network software, social networking for business, social networking in business, social networking platform, team collaboration, team collaboration software, social enterprise software, social intranet, social business
    
Clearvale by BroadVision
Published By: Clearvale by BroadVision     Published Date: Dec 26, 2012
After the swift and ubiquitous adoption of social networking sites like Facebook and Twitter among consumers,many businesses have been moving to recreate some of that success within their enterprise. Enterprise Social Networks are the result.
Tags : 
social network, broadvision, enterprise social network, facebook, twitter
    
Clearvale by BroadVision
Published By: Clearvale by BroadVision     Published Date: Dec 26, 2012
In the traditional business environment, business processes evolve over time. As companies grow, most do not have the time or ability to implement infrastructure that continually enables effective collaboration, innovation or knowledge transfer.
Tags : 
social media, social network, 8 key metrics, broadvision, enterprise
    
Clearvale by BroadVision
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Resource Library