asics

Results 1 - 25 of 162Sort Results By: Published Date | Title | Company Name
Published By: Acquia     Published Date: Feb 26, 2015
The Issue: The Content and Commerce Divide Commerce and digital marketing teams tell a familiar story. The commerce team launches an online store on a commerce platform. Commerce and IT focus on the platform and evolve it as the online business grows—focusing on basics such as PCI compliance and product information and expand-ing to more complex integrations. Now they want to add content, such as reviews and engaging media, that will inform and guide shoppers. Meanwhile, the digital marketing team regards the online store as a missed branding and engagement opportunity and tries to jump in and contribute only to find that the system can’t meet their needs. So marketing goes outside to a digital agency, pays for a separate microsite, and takes their creative production needs elsewhere. And thus a classic divide is formed. Download the Forrester Report to learn the impact of integrated and personalized commerce experiences.
Tags : 
commerce, content and commerce, personalization, increasing conversions, digital marketing, commerce platform
    
Acquia
Published By: Act-On     Published Date: May 10, 2012
For an email campaign to be successful, marketers must reach the right person at the right time, with the right offer. By learning the basics of deliverability, you're better prepared to build emails that will actually reach your potential customers.
Tags : 
email deliverability, deliverability, best practices, spamtrap, spam filtering, blacklists, blocklists, soft bounce
    
Act-On
Published By: Act-On     Published Date: Sep 19, 2014
Over the last 12 years, a massive amount of material has been written about Search Engine Optimization (SEO). Much of this material remains applicable today; However, there are a growing amount of out-dated tactics still being touted as best practices (exact match domain names, keyword density targets, exact anchor text, and so on). In this eBook, you’ll learn the current best practices in SEO that companies of all sizes can use to increase site visibility, increase traffic, and most importantly, improve conversion rates.
Tags : 
marketing content, business, solve, information, prospects, customers, educate, inform
    
Act-On
Published By: Act-On     Published Date: Jan 08, 2015
Ready to move past the basics of email marketing and learn new techniques to optimize your email results? This guide will give you five tips for more successful - and more profitable - email campaigns, including: How to increase engagement with responsive design, tips for better email personalization, ideas for effective trigger emails, effective ways to integrate with social media, and so much more!
Tags : 
act-on, email guide, email campaigns, mobile emails, mobile devices, personalization, personal content
    
Act-On
Published By: AdMob     Published Date: Jul 20, 2009
Devices like the iPhone have made the mobile Internet a massively valuable new advertising medium, with a worldwide audience of 546 million consumers and 10 times higher brand awareness and 10 times higher click-through rates than online advertising. The mobile Internet is changing the face of advertising, and marketers must adapt to stay ahead of the competition. This White Paper is an introduction to mobile advertising and the key things marketers need to know to run successful mobile campaigns. What you'll learn: 1) The Basics: An introduction to mobile advertising; 2) Who you can reach: Demographics and statistics; 3) Spotlight on the iPhone: What it means for marketers; 4) Results you can expect with mobile advertising; 5) Case studies: Examples of Brand and Performance mobile campaigns; 6) What you need to know to extend your campaigns to mobile.
Tags : 
iphone, mobile, internet, pda, mobile phone, cpc, cost per click, blackberry
    
AdMob
Published By: ADP     Published Date: Oct 25, 2017
Motivate employees and attract talent with a collaborative workplace and office perks that really matter.
Tags : 
    
ADP
Published By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
    
AlienVault
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
The European Union’s new regulatory framework for data protection laws, the General Data Protection Regulation (GDPR), became enforceable on 25 May, 2018. Under GDPR, organisations have new obligations to improve the security and privacy practices for the personal data they collect and use. With these new obligations comes the potential for heavier fines and penalties. Fortunately, Amazon Web Services (AWS) can help guide your organisation toward compliance under the new requirements. Take advantage of our services, resources, and experts as you navigate these changes.
Tags : 
    
Amazon Web Services APAC
Published By: Amazon Web Services EMEA     Published Date: Sep 24, 2018
Under GDPR, we all have new obligations to improve the security and privacy of personal data at our organisations. With the new Amazon Web Services eBook, GDPR: The Basics, you’ll gain a fundamental understanding of this new EU regulation. In this eBook, you will learn about: • How to view GDPR as an opportunity, and how you can build on it • Article 32 – a core part of the security principle • Data subject rights • Key players and responsibilities • And much more
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, enterprise applications
    
Avalara
Published By: Black Box Corporation     Published Date: Feb 22, 2011
This white paper explains the basics of NAC and simplifies the many confusing NAC options available in the marketplace.
Tags : 
lack box, black box network black box network, security, black box security, network security, access control, network access control, nac
    
Black Box Corporation
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Aug 18, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations.
Tags : 
consumerization, enterprise, it service, best practices, it management
    
BMC Software
Published By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : 
cloud, it pros, security, dlp, cloud securiity, it management
    
Box
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs, security, enterprise applications
    
Box
Published By: Bridgeline Digital     Published Date: Oct 28, 2013
Blogging. For one contingent of marketers, pumping out posts on the company blog is their favorite part of the day; an opportunity to muse about industry news, highlight their product, and release creative fuel that is otherwise bottled up. For other marketers, blogging is the chore in the way of getting “more important” work accomplished. In other words, writing daily posts is an endless nuisance, like listening to “The Song That Never Ends.”
Tags : 
blogging, corporate blogging, blogging basics, blog speak, blog posts, company blog, blog writing, types of blogs
    
Bridgeline Digital
Published By: Bronto     Published Date: Sep 26, 2011
Regardless of what the email metrics say, there is always room for improvement. In any competitive environment, you never want to settle for good enough. Here we cover seven areas most commonly in need of a refresh.
Tags : 
whitepaper, seven, white paper, email marketing, list growth, basics, opt-in, social
    
Bronto
Published By: CA SM     Published Date: Jun 02, 2008
According to industry experts, organizations that systematically manage the life cycle of their IT assets will reduce the cost per asset by as much as 30% in the first year alone. Yet today, many organizations have little or no insight into exactly what assets they own, let alone how they can optimize assets throughout their life cycle, from requisition to disposal. The same holds true for major IT investments.
Tags : 
ca service management, ca sm, asset management, it asset management, it management
    
CA SM
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Catalyst SF     Published Date: May 05, 2008
This white paper is designed to provide the marketing generalist with the basics of the gaming industry and how to leverage game marketing tools to improve marketing effectiveness. It is not designed for a gaming expert but rather for the person who is curious about the space, believes that game marketing may have value for their brand, but is not well versed in the opportunities available or the dynamics of the industry.
Tags : 
game, gaming, video game, video gamings, catalyst, catalyst sf, game marketing
    
Catalyst SF
Published By: CDW Quantum     Published Date: Sep 07, 2012
What are you doing to keep your data safe? Check out these backup basics, learn about the options available and get advice on how to choose the right protection system for your needs.
Tags : 
disk backup, backup and recovery, deduplication, data protection, disaster recovery, business technology
    
CDW Quantum
Published By: CDW Quantum     Published Date: Sep 07, 2012
Things have changed and your data backup needs to change with it. To get the basics for VM Data Protection click here.
Tags : 
virtual machines, vm data, data protection, virtualization, disaster recovery, backup and recovery, business technology
    
CDW Quantum
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee