it strategies

Results 26 - 50 of 1060Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Jul 24, 2014
Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges—and discover the strategies they deploy to overcome them. In late 2013, Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. The survey reveals that 85% of the respondents believe video conferencing helps them achieve their business goals. See how they successfully use video in their profession and how you can leverage technology to defy distance and improve remote collaboration within your organization as well.
Tags : 
polycom, collaboration video conferencing, defy distance, networking, it management
    
Polycom
Published By: CEB     Published Date: Nov 24, 2014
Many brands are struggling to keep up and are losing ground as consumers demand higher levels of service through a more digital experience. Making matters worse, these changes are driven by a massive generation that is notoriously difficult to engage. Winning consumers over today requires building new capabilities that make brands more agile and provides deeper, more intimate knowledge of buyers.
Tags : 
b2c marketing insights, b2c marketing teams, consumers demand insights, customer experience, effortless experience, marketing leaders, global marketing executives, digital marketing strategies, marketing executives
    
CEB
Published By: Arthur J. Gallagher & Co.     Published Date: Oct 26, 2015
Employers of choice are committed to providing their employees with a rich benefits and compensation program while trying to decrease or maintain operating costs. Our 2015 survey - with over 3,000 participating organizations - covers everything from high-level questions about organizational priorities and benefit strategies, to current and future tactics related to medical and pharmacy benefits, wellness, work-life balance, retirement and employee communications. Download Gallagher's Benefits Strategy & Benchmarking Survey Executive Summary for a glimpse of what organizations are doing nationwide as they pursue their goals to compete, succeed and prosper in a competitive and constantly evolving market.
Tags : 
arthur j. gallagher, benefits survey, organizational priorities, medical benefits, pharmacy benefits, wellness, work-life balance, retirement, employee communications
    
Arthur J. Gallagher & Co.
Published By: IBM     Published Date: Oct 02, 2015
IBM BigFix is recognized as a leader in Gartner's Magic Quadrant for the fourth year in a row. Despite being a relatively mature technology, new product capabilities and diverging vendor strategies make selecting a client management tool vendor as challenging as ever for end-user computing and support managers.
Tags : 
client management, ibm, bigfix, gartner magic quadrant, cmt, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
IBM BigFix is recognized as a leader in Gartner's Magic Quadrant for the fourth year in a row. Despite being a relatively mature technology, new product capabilities and diverging vendor strategies make selecting a client management tool vendor as challenging as ever for end-user computing and support managers.
Tags : 
ibm, ibm bigfix, gartner, magic quadrant, client management tools, knowledge management, enterprise applications
    
IBM
Published By: VMware AirWatch     Published Date: Nov 12, 2015
VMware continues to raise the bar in business mobility. It offers the most streamlined process for deployment and management of business mobility solutions through its EUC products, and has given IT administrators the perfect set of options to efficiently manage the challenges of business mobility. The company continues to grow by bringing complete solutions that go beyond simply providing basic client or desktop monitoring services. Frost & Sullivan believes that VMware is in an ideal position to help its customers execute on their next-generation business mobility strategies; based on this analysis Frost & Sullivan recognizes VMware with the 2015 Visionary Innovation Leadership Award.
Tags : 
vmware, business mobility, euc products, end user computing, it management, knowledge management, enterprise applications, business technology
    
VMware AirWatch
Published By: IBM     Published Date: Jul 22, 2016
Ordinary analytics tools can’t keep up with today’s digital, multichannel and demanding customers. This guide highlights three major challenges associated with traditional analytics and how innovative strategies combined with IBM’s Customer Experience Analytics solution can solve them.
Tags : 
ibm, commerce, customer analytics, customer insight, data insights, business opportunity, analytics, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 29, 2016
Ordinary analytics tools can’t keep up with today’s digital, multichannel and demanding customers. This guide highlights three major challenges associated with traditional analytics and how innovative strategies combined with IBM’s Customer Experience Analytics solution can solve them.
Tags : 
ibm, commerce, data, insights, analytics, analytics tools, ibm customer experience analytics, knowledge management, enterprise applications, business technology
    
IBM
Published By: AdRoll     Published Date: Dec 01, 2017
Last year, we found the vast majority of marketers are familiar with running programmatic campaigns. So when we surveyed over 1,300 marketers from Europe and North America this year, we shifted our focus and dove deeper into how they're thinking about the latest performance strategies across every stage of the marketing funnel. You will learn: • Why 57% of marketers are changing their attribution model this year • Why almost 40% of marketers spend a majority of their budgets on measurement alone • Why 69% of marketers are using dynamic email based on user behaviour • And more! See how you compare!
Tags : 
performance, marketing, professionals, channels, industry, advertising
    
AdRoll
Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9
Published By: Wells Fargo     Published Date: Oct 19, 2018
With the effects of 2017's Tax Cuts and Jobs Act (TCJA) beginning to be felt, we are likely to see extensive planning impacts this year. Before you make any changes, we recommend meeting with your wealth planner and your tax and legal advisors to discuss the strategies in this guide.
Tags : 
    
Wells Fargo
Published By: CrowdTwist     Published Date: Mar 16, 2016
Acquiring customers to join loyalty programs requires that brands offer amazing incentives and get creative with their marketing efforts. This e-book offers 25 strategies to help companies grow their loyalty program memberships.
Tags : 
multi channels, loyalty, acquisition, branding, consumers, strategy, knowledge management
    
CrowdTwist
Published By: Viavi Solutions     Published Date: Apr 01, 2015
Ready to effectively monitor in the cloud? It’s time to go beyond vendor provided data and establish performance metrics and baselines that matter. The 3 Key Cloud Monitoring Metrics IT Brief helps you identify cloud monitoring challenges while providing the strategies to succeed.
Tags : 
cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics
    
Viavi Solutions
Published By: Entelo     Published Date: Sep 06, 2017
Engaging with candidates is a long game. To be remembered, it's crucial to take the necessary steps to develop effective relationships, grow your network, and cleverly capture candidates' attention. Join TripAdvisor's Jeff McCarthy and Lori Busch as they share how to leverage recruitment marketing and outreach platforms to improve response rates, influence long-term relationships, and stay top of mind with candidates. In this webinar, you'll learn: TripAdvisor's messaging strategies for increasing open rates by 15% How to structure a multi-touch nurturing workflow to sustain a relationship with candidates A breakdown of TripAdvisor's Attract, Engage, and Convert model Why they emphasize employee-generated content as vital to branding and candidate engagement
Tags : 
    
Entelo
Published By: The Starr Conspiracy     Published Date: Sep 19, 2017
It doesn’t matter if your goals involve brand awareness, functional association, or demand generation. Brands that fail to integrate an earned media strategy with paid and owned media strategies are missing key opportunities to influence the buyer’s journey. If you ignore earned media channels, you do so at the risk of missing that ideal customer. In this white paper, we’ll outline the top three reasons you need an integrated approach — that includes PR — to achieve great brand awareness
Tags : 
    
The Starr Conspiracy
Published By: Oracle     Published Date: Feb 24, 2015
30 seconds or less. The average length of time that consumers spend reading or listening to online marketing communications . Marketers today are now equipped with the strategies and technologies to better capture consumer attention. To do this, they need to orchestrate individualized customer experiences across the digital channels. Read on for a statistical profile of today’s distracted consumer, followed by actionable tips for effectively communicating and converting this new type of consumer.
Tags : 
oracle, marketing, consumers, attention, message, distractions, communications, conversions, expectations, profile, experiences, individual, brand advocates, interactions, technology
    
Oracle
Published By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : 
database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction
    
IBM
Published By: Reputation.com     Published Date: Oct 02, 2017
The new year is underway, but your organization’s online reputation precedes you. It’s time to take a look at what’s influencing public perception to prepare for the year ahead. In this report, we examine four key trends guiding the direction of Online Reputation Management strategies in 2017, and provide recommendations for capitalizing on those trends moving forward.
Tags : 
    
Reputation.com
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
At the heart of organizational transformation are people and culture. For executives charged with managing talent, big changes can translate into big challenges. How do you help employees navigate the new work environment? Here are four proven strategies that help HR leaders inspire and retain top talent.
Tags : 
    
Oracle HCM Cloud
Published By: UPS     Published Date: May 24, 2017
One-fourth of all healthcare products today are temperature-sensitive and that number is growing. For many pharmaceutical or biologic shipments, 2 degrees Celsius is all that separates medicine from becoming spoiled inventory and a costly write-off. Here are four risk mitigation strategies for temperature-sensitive shipments.
Tags : 
strategies, healthcare, shipments, ups, temperature-sensitive
    
UPS
Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Spredfast, Inc.     Published Date: Oct 22, 2014
Here at Spredfast, we were as caught up in the World Cup as the rest of the planet. As much as we enjoyed watching the strategy on the field, we were also really excited about the social strategies implemented during the tournament by savvy brands and media properties.
Tags : 
spredfast, marketing, campaign tips, world cup, media properties, social content, technologies, integrations, facebook, instagram, twitter
    
Spredfast, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee