all media

Results 301 - 325 of 338Sort Results By: Published Date | Title | Company Name
Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance, security, compliance
    
Cenzic
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
An introductory view of AutoPlay Media Studio 6.0 from the ground up. Learn all about AutoPlay Media Studio 6.0 and see everything it can do. Create everything from attractive front-end menu systems for CD/DVD-ROMs to full multimedia applications!
Tags : 
enterprise applications, sales & marketing software, multimedia software, multimedia, indigo rose
    
Indigo Rose Corporation
Published By: Interactive Intelligence     Published Date: May 07, 2012
IT strategies in insurance have traditionally been driven by business objectives and business strategy. But with technology advancements for mobile solutions, social media, analytics, content management (ECM), and process automation, insurers can now take a conjoinment view to evaluate opportunities and drive differentiation. Read more in this paper from Mark Breading of Strategy Meets Action.
Tags : 
interactive, technology, ecm, process automation, social and mobile technology, application integration, business analytics, content management system
    
Interactive Intelligence
Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary, best practices, web development, web services, web service management
    
Integration New Media
Published By: Concentra     Published Date: Mar 31, 2008
There is a lot of interest at the moment in Web 2.0, a catch-all term for ways of making websites much more dynamic and socially interactive. What is a pity is that all the jargon about mash-ups and social media might suggest opening up your online presence this way will require lots of investment in arcane or unproven technology.
Tags : 
concentra, sharepoint, intranet, 2.0, collaboration, knowledge management, document management, intranets
    
Concentra
Published By: SchemaLogic     Published Date: Jun 11, 2008
The Associated Press, like all publishing and digital media companies, must work rapidly to meet the demands of a shifting media landscape. An exploding wave of free content on the web meant that AP not only had to deliver more content online, but needed to create more relevance and niche content in order to update traditional ad revenue models with targeted web-based products and more potential for advertising dollars.
Tags : 
schemalogic, associated press, content delivery, content management, cms, content management system, knowledge management
    
SchemaLogic
Published By: Marketo     Published Date: Oct 17, 2016
The impact of social media transcends almost every aspect of our daily lives—work, politics, breaking news, and more. Today, it’s almost universally used—by consumers and brands—and is one of the most effective channels to connect with your audience. Download this definitive guide to learn how to effectively use social media marketing.
Tags : 
    
Marketo
Published By: Webroot UK     Published Date: Aug 07, 2013
Mobility is one of the driving factors for all business and IT initiatives. IDC has characterized it as one of the four pillars of computing’s next dominant platform, along with social media, Big Data and cloud services. Mobility has the potential to dramatically enhance business agility, improve employee productivity and enable major shifts in the way individuals and businesses approach work.
Tags : 
mobile, security, small business, midsize business, improve employee productivity, business agility
    
Webroot UK
Published By: MoreVisibility     Published Date: May 07, 2012
Social media, social media, social media! It's all that anyone online is talking about these days. What people aren't talking about are ways to successfully measure their social media efforts. Read to learn more.
Tags : 
morevisibility, social media, marketing, emerging marketing, internet marketing, web analytics
    
MoreVisibility
Published By: Century Interactive     Published Date: Sep 28, 2010
Call tracking overview presentation to understand the basics, FAQs and how you can take action immediately!
Tags : 
call tracking, call analytics, lead optimization, trackable phone numbers, measurement
    
Century Interactive
Published By: TalentWise     Published Date: Feb 28, 2011
Gain insight into the future of employment background screening and how the industry will be changing. This whitepaper details the pitfalls of using Social Media, upcoming legislation and how to conduct a comprehensive background check.
Tags : 
talentwise, employee screening, hiring, background check, staffing, employment, business issues and trends, human resources management
    
TalentWise
Published By: Pitney Bowes     Published Date: May 17, 2011
Inefficient invoice management processes are costing European businesses billions of Euros each year. This white paper examines how hybrid solutions are allowing businesses to grasp immediate gains.
Tags : 
invoicing, efficiency, digitisation, e-invoicing, asset management, marketing, technology
    
Pitney Bowes
Published By: EDGE Technology Services     Published Date: Jun 22, 2011
Aligning IT to your business is critical, especially media. Learn how to leverage digital without sacrificing margins or a competitive advantage.
Tags : 
broadcasting, strategy, media, productivity, project management, software compliance
    
EDGE Technology Services
Published By: Spredfast, Inc.     Published Date: Oct 03, 2013
All You Need to Know to Win with Social Media Marketing
Tags : 
spredfast, blog, marketing, branding, social media marketing, corporate blogger
    
Spredfast, Inc.
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: IBM     Published Date: Aug 08, 2012
This white paper examines the role social media can play in presenting a more strategic view of customer data and how the right combination of technologies can deliver insight to help companies more effectively meet perpetually shifting consumer demands expressed through, and influenced by, these dynamic communication channels. Discover the implications of social media for marketing and sales, as well as IT. And learn the how and why social media tools and applications can be integrated with existing technology investments.
Tags : 
social media analytics, consumer insight, marketing digitization, ibm, facebook, strategic considerations, lower cost, influence, intimacy, scale, speed, assess, measure, integrate, predictive capabilities, virtualization, analysis, mobile computing, mobile data systems, mobile workers
    
IBM
Published By: Adobe     Published Date: Aug 22, 2013
Some people want more "likes" because their goal is increased awareness. Others may struggle with losing customers and want improved customer service to reduce churn rates. Whichever challenge your strategy is trying to solve, you will find only a short-term solution if you deal with each challenge in isolation. What you need is an integrated approach that puts social media at the heart of your business as a solid foundation for long-term growth.
Tags : 
customer experience management, social media data, web trends and analytics
    
Adobe
Published By: BlackBerry     Published Date: Oct 03, 2012
Seeing an opportunity to help its customers and local distributors, TFC worked with BlackBerry® Alliance Elite Member FloatPoint Media Inc. to develop the custom iGasketT app. The result? Improved user safety and a wider worldwide market.
Tags : 
blackberry, mobile applications, application development, case study, mobile computing, wireless application software, wireless phones
    
BlackBerry
Published By: uberVU via HootSuite     Published Date: Apr 23, 2013
Today’s B2B buyers are socially sophisticated and informed. Do you have the tactics, tools and training to leverage social media for sales success? Find out how to use social media to relate to customers, identify opportunities for engagement, establish credibility, and stay visible and valuable at every stage of the purchase process.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : 
it governance, risk, compliance, servicenow, webinar, software development, it management, knowledge management, platforms, data management
    
ServiceNow
Published By: Sitecore     Published Date: Feb 25, 2015
The forces of digital disruption have empowered consumers and inverted the power relationship between buyers and sellers. Competitive advantages based on manufacturing, distribution, and IT are no longer sustainable. Customer loyalty has all but disappeared; buyers can and will shift their allegiance immediately if disappointed. In the era of the empowered consumer, business success depends upon offering consistently outstanding customer experiences across multiple touchpoints and over the entire customer lifecycle.
Tags : 
content management, vendors, digital experience, optimization, web page, hosting, business, agenda, software development, enterprise applications
    
Sitecore
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks, security, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : 
ibm, insurance, data, big data, analytics, solutions
    
IBM
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.