com

Results 22201 - 22225 of 22481Sort Results By: Published Date | Title | Company Name
Published By: ForeSee Results     Published Date: Jul 20, 2007
This report analyzes satisfaction of the various methods of generating site traffic (email, search marketing, recommendations, shopping comparison sites, etc.) to see which result in the most satisfied customers -- who are also more likely to purchase in the future and recommend the site to others.
Tags : 
foresee, foresee results, online marketing, comparative, conversion, conversions, customer satisfaction, referrals, word-of-mouth, word of mouth, customer value
    
ForeSee Results
Published By: ForeSee Results     Published Date: Jul 20, 2007
Online retailers are always on the lookout for ways to improve the online shopping experience and stay ahead of the competition. Adding consumer product reviews is one such way. As part of the analysis of the Spring 2007 edition of the Top 100 Online Retail Satisfaction Index, we delved into the data specific to consumer product reviews to answer pertinent questions.
Tags : 
customer reviews, reviews, purchase decision, referral, recommendation, customer satisfaction, online retail, e-commerce, ecommerce, ebusiness, e-business, foresee, foresee results
    
ForeSee Results
Published By: ForeSee Results     Published Date: Jul 20, 2007
Online retailers are always on the lookout for ways to improve the online shopping experience and stay ahead of the competition. Adding consumer product reviews is one such way. As part of the analysis of the Spring 2007 edition of the Top 100 Online Retail Satisfaction Index, we delved into the data specific to consumer product reviews to answer pertinent questions.
Tags : 
customer reviews, reviews, purchase decision, referral, recommendation, customer satisfaction, online retail, e-commerce, ecommerce, ebusiness, e-business, foresee, foresee results, best practices, customer interaction service, sales & marketing software, customer experience management
    
ForeSee Results
Published By: ForeSee Results     Published Date: Jul 20, 2007
This report analyzes satisfaction of the various methods of generating site traffic (email, search marketing, recommendations, shopping comparison sites, etc.) to see which result in the most satisfied customers -- who are also more likely to purchase in the future and recommend the site to others.
Tags : 
foresee, foresee results, online marketing, comparative, conversion, conversions, customer satisfaction, referrals, word-of-mouth, word of mouth, customer value, best practices, customer interaction service, ebusiness, customer experience management
    
ForeSee Results
Published By: MASERGY     Published Date: Jul 20, 2007
Organizations of all sizes are evolving to an enlightened, business-focused method of choosing network services and service providers called Total Customer Experience (TCE). This white paper describes the evolution toward a TCE approach and the benefits and clarity that TCE brings to the marketplace.
Tags : 
mice, multimedia, internet, communications, entertainment, service level, service level agreement, ip networks, collaboration, tce, quality of service, service provider, network provider, isp, masergy, wide area networks, customer interaction service, customer satisfaction, customer service, customer experience management
    
MASERGY
Published By: Torry Harris Business Solutions     Published Date: Jul 18, 2007
Service-Oriented Architecture (SOA) promises significant benefits to today's organizations. Successfully delivering SOA benefits, especially Business Agility and Component Reuse, will be dependant on the Test Approach that your organization adopts to implement your SOA.
Tags : 
soa, service oriented architecture, middleware, service level, performance testing, business agility, quality of service, qos, quality assurance, governance testing, testing, soa governance, torry harris, thbs, open source, software outsourcing, software testing, sla
    
Torry Harris Business Solutions
Published By: Perimeter     Published Date: Jul 17, 2007
Download this free paper about read about identity protection services and how it can help fortify the trust that customers place on their Financial Institutions.
Tags : 
financial institution, privacy, consumer, consumer privacy, data protection, cardholder data, pci, compliance, security, personal data, perimeter, phishing, pharming, perimeter esecurity, identity management, customer relationship management, database security, information management
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips, perimeter, perimeter esecurity, security software, malware, trojan, anti spam, anti virus, firewalls, hacker detection, internet security, intrusion detection, security management
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit, infrastructure, patch management, email defense, email security, perimeter, perimeter esecurity, security, anti spam, anti virus, firewalls, internet security
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids, spam, spam filtering, security policies, gateway av, risk management, perimeter, perimeter esecurity, anti spam, email security, internet security, patch management
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. The purpose of this paper is to help individuals understand the scope of the problem, and specific strategies available to combat this continually changing threat.
Tags : 
patch, ips, intrusion prevention, ids, intrusion defense, security policies, spam, spyware, malware, firewall, firewalls, virus, anti-virus, anti virus, perimeter, security software, perimeter esecurity, anti spam, anti spyware, internet security
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
Before Microsoft released Microsoft XP Service Pack 2 (SP2), most attackers would compromise a computer system by simply attacking it with known vulnerabilities or "bugs" that could allow the attacker to gain some level of control over the system. Newer attack methods were starting to be seen where the attacker would take advantage of vulnerabilities within the Internet browser itself.
Tags : 
virus, anti-virus, anti virus, spyware, windows xp, xp sp2, intrusion detection, ids, intrusion prevention, ips, spam, filtering, blocking, malware, malicious code, windows firewall, perimeter, perimeter esecurity, anti spam, anti spyware
    
Perimeter
Published By: Baystate Health / Baystate Medical Center     Published Date: Jul 16, 2007
Get this free white paper to read why mass casualty and other public health emergencies create a demand for information within hospitals, between hospitals, between hospitals and local incident command centers, and between local, statewide and multi-state incident command centers and agencies.
Tags : 
hospital, healthcare, health care, medical records, fema, disaster, natural disaster, business continuity, hurricane, preparedness, disaster recovery, emergency, hipaa, gis, geographic information systems, baystate, bay state, best practices, business integration, hipaa compliance
    
Baystate Health / Baystate Medical Center
Published By: Gold Lasso     Published Date: Jul 13, 2007
There are more than one hundred Email Service Providers (ESPs) selling their services in the market today and all of them are on the hunt for new customers. This white paper identifies what we call, "decision points," factors that make it worth your while to consider finding a new ESP.
Tags : 
email service, isp, esp, vendor selection, vendors, email marketing, service provider, dns configuration, communication, gold lasso
    
Gold Lasso
Published By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : 
change management models, auditing, configuration management, security, change management, network security, efficiency, productivity, tripwire, cmdb, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, change control, infrastructure, business metrics
    
Tripwire
Published By: Gold Lasso     Published Date: Jul 13, 2007
There are more than one hundred Email Service Providers (ESPs) selling their services in the market today and all of them are on the hunt for new customers. This white paper identifies what we call, "decision points," factors that make it worth your while to consider finding a new ESP.
Tags : 
email service, isp, esp, vendor selection, vendors, email marketing, service provider, dns configuration, communication, gold lasso, marketing automation, sales & marketing software, sales automation
    
Gold Lasso
Published By: Gold Lasso     Published Date: Jul 13, 2007
Since the introduction of e-mail as a viable marketing and communications vehicle, the focus has shifted from a "one size fits all" model to content that is relevant and specific to the intended recipient. This paper reviews general concepts behind personalization, further investigates its advantages, discusses the challenges to personalizing campaigns and provides solutions to overcome the challenges.
Tags : 
personalization, newsletter design, content personalization, return on investment, email marketing, ebusiness, ecommerce, e-commerce, customer relationship, crm, gold lasso, marketing automation, sales & marketing software, sales automation
    
Gold Lasso
Published By: Gold Lasso     Published Date: Jul 13, 2007
Successful delivery is the driving force behind an effective email marketing campaign. The purpose of this paper is to provide a summary of terms (or jargon) related to e-mail deliverability, increase general knowledge of the concept, discuss delivery barriers and provide tactics to overcome these issues.
Tags : 
email delivery, deliverability, inbox, email marketing, enewsletter, email newsletter, e-newsletter, newsletter, blocking, filtering, gold lasso, marketing automation, sales & marketing software, sales automation
    
Gold Lasso
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Quocirca     Published Date: Jul 11, 2007
Operating and maintaining a complex IT infrastructure requires the necessary skills and investment but getting the right staff at an affordable price can be a problem. Finding ways around this can give SMBs a competitive edge leaving them free to focus on new business opportunities.
Tags : 
infrastructure, smb, small business, online business, high availability, ebusiness, productivity, outsourcing it management, it management, quocirca, small business networks, it spending
    
Quocirca
Published By: Quocirca     Published Date: Jul 11, 2007
SOA enables composite applications or collections of services that have been assembled to support a company’s business processes.  Portal and collaboration software delivers the essential people-focused capabilities of the SOA strategy to provide significant value to the organisation.
Tags : 
productivity, soa, service oriented, service-oriented, collaboration, bpm, business process management, portals, workforce management, team management, quocirca, it management, business management, service oriented architecture, corporate portals
    
Quocirca
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony, best practices, customer interaction service, customer relationship management, corporate portals
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony, best practices, customer interaction service, customer relationship management, corporate portals
    
Cymfony
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
In this white paper we do not make specific recommendations for manufacturers to follow; rather, we present suggestions for competing effectively in a fast-paced industry. From adopting lean manufacturing practices to strengthening bidding and quoting processes, opportunities exist for companies to grow and thrive despite relentless cost pressures.
Tags : 
manufacturing, manufacturer, scm, supply chain, supply chain management, lean methods, lean manufacturing, lean, industrial, competitive, competitive analysis, productivity, microsoft, microsoft dynamics, best practices, enterprise resource planning, product lifecycle management, return on investment
    
Microsoft Dynamics
Start   Previous    882 883 884 885 886 887 888 889 890 891 892 893 894 895 896    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.