tactics

Results 176 - 200 of 301Sort Results By: Published Date | Title | Company Name
Published By: VMTurbo     Published Date: Mar 25, 2015
This whitepaper examines the latency-inducing pitfalls of common VM placement tactics, as well as a network flow approach that minimizes network, compute, and storage latency all at once.
Tags : 
vmturbo, network flow, application performance, vm placement tactics, network flow approach, storage latency, it management, knowledge management, enterprise applications
    
VMTurbo
Published By: IBM     Published Date: Aug 23, 2018
IBM Planning Analytics Local is the on-premises version of the planning solution built on the powerful, in-memory OLAP engine of IBM TM1. It automates your planning, budgeting and forecasting, and helps you link operational tactics with financial plans.
Tags : 
    
IBM
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Powerful IT doesn’t have to be complicated. Hyperconvergence puts your entire virtualized infrastructure and advanced data services into one integrated powerhouse. Deploy HCI on an intelligent fabric that can scale with your business and you can hyperconverge the entire IT stack. This guide will help you: Understand the basic tenets of hyperconvergence and the software-defined data center; Solve for common virtualization roadblocks; Identify 3 things modern organizations want from IT; Apply 7 hyperconverged tactics to your existing infrastructure now.
Tags : 
    
Hewlett Packard Enterprise
Published By: Volacci     Published Date: Sep 03, 2013
Newsletters engage customers, prospects and peers in a humanizing way that informs a targeted audience while building a relationship of trust and respect. This guide provides email newsletter strategies and tactics that have proven themselves across a wide variety of industries.
Tags : 
    
Volacci
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Alere Wellbeing     Published Date: Nov 09, 2011
For decades, tobacco has been known as the number one cause of preventable death and disease. Now, obesity is becoming an equal contributor to the burden of morbidity and mortality. This white paper discusses the parallels of these two epidemics, the potential crossovers in prevention tactics, and the ways that subsidized, comprehensive programs can help address the issue at the heart of both epidemics.
Tags : 
alere, human resources, tobacco cessation, obesity, work management
    
Alere Wellbeing
Published By: Oracle Social Cloud     Published Date: May 02, 2014
The Olympics provided clear examples of how media companies and brands can magnify their marketing efforts using social media. These strategies and tactics are not just reserved for events of this magnitude and can be applied to any major campaign.
Tags : 
oracle, srm, social marketing, tv social marketing, broadcast network social marketing
    
Oracle Social Cloud
Published By: DNN Corp.     Published Date: Mar 26, 2014
This step-by-step playbook walks you through the five most important things you must do to recruit and engage your community. In this free playbook you’ll find: • 10-point quick start checklist, • Key responsibilities for the Community Manager, • Top Tactics for recruiting and engaging community members Download this free playbook with all the essentials you need to build and manage your organizations online community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: Reputation.com     Published Date: Feb 26, 2018
The balance of power has shifted from brand owners to customers, and what people say about you online can either derail your business or accelerate its success. This is especially true for consumer-focused brands in industries such as retail, hospitality, automotive and healthcare This guide will help you understand the role of online reviews in overall brand health, and the tactics to maximize your online reputation.
Tags : 
    
Reputation.com
Published By: Reputation.com     Published Date: Jun 29, 2018
When it Comes to Brand Perception, You’re No Longer in Control The balance of power has shifted from brand owners to customers, and what people say about you online can either derail your business or accelerate its success. This is especially true for consumer-focused brands in industries such as retail, hospitality, automotive and healthcare This guide will help you understand the role of online reviews in overall brand health, and the tactics to maximize your online reputation.
Tags : 
    
Reputation.com
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: Bronto     Published Date: Sep 26, 2011
With the Bronto Marketing Platform, the welcome series are easy to set up and they run automatically. Gander Mountain uses Bronto's automation functionality to easily test different options - on pricing or special offers - and employs Bronto's analytics to see what is providing the best results. To gain insight on how you may employ some of the same tactics, read the full case study. Answer these short questions then click the Download now button.
Tags : 
best practices, email marketing, automation, e-commerce, welcome emails, shopping cart, transactional messages, case study, bronto software, bronto, bronto marketing platform
    
Bronto
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
    
GFI
Published By: Symantec     Published Date: Dec 04, 2014
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.
Tags : 
phishing, cyber crime, internet fraud, phishing schemes, hacker, fraud alert, phishing kits, security
    
Symantec
Published By: ttec     Published Date: Jul 24, 2019
Fraud prevention and content moderation take center stage. Trust & Safety is good business Change your password often. Keep your virus software up to date. Beware of so-called princes from Nigeria. These are the costs of doing business online. Since its inception, the internet has always had its share of bad guys. And as nearly all companies move to a more digitally enabled world, the thieves, con artists, and hackers are finding new ways to steal money, information, and disrupt the world in a bad way. Having a trustworthy and safe brand is now a differentiator, especially from companies that operate primarily online. But it’s becoming harder to keep up as technology advances and information moves quicker every day. This eBook details how companies can protect their brand and keep customers safe by enabling fraud prevention and content moderation strategies and tactics.
Tags : 
    
ttec
Published By: Eloqua     Published Date: Sep 28, 2011
Use this guide as a checklist to compare your current email marketing technology against four core areas where marketing automation extends the power of email - audience targeting, automating marketing tactics, enabling sales and measuring results.
Tags : 
email marketing, marketing white paper, marketing automation, behavioral targeting, marketing data, email marketing technology, marketing automation, marketing tactics automation, audience targeting
    
Eloqua
Published By: Eloqua     Published Date: Jan 13, 2012
Use this guide as a checklist to compare your current email marketing technology against four core areas where marketing automation extends the power of email - audience targeting, automating marketing tactics, enabling sales and measuring results.
Tags : 
email marketing, marketing white paper, marketing automation, behavioral targeting, marketing data, email marketing technology, marketing automation, marketing tactics automation, audience targeting
    
Eloqua
Published By: Act-On     Published Date: Aug 28, 2012
In this Gleanster Deep Dive, analyst Ian Michiels discusses tactics for determining the ROI of social engagement for B2B, and demonstrates the Social Media Mean Performance Score (MPS) Dashboard.
Tags : 
social media roi, b2b marketing, social media engagement, gleanster, content marketing, social media metrics
    
Act-On
Published By: Medium Blue     Published Date: Jan 29, 2007
If you are looking to partner with a search engine optimization company, it’s important that you choose a firm you can trust. Many search engine optimization companies today use tactics that are questionable and that can lead to your site getting penalized by the major search engines. In this article, you will be given several important questions to ask any SEO firm that you are considering, and learn how to interpret the answers you are given.
Tags : 
search marketing, search engine optimization, outsourcing, seo firms, seo firm, seo
    
Medium Blue
Published By: Spredfast     Published Date: Aug 24, 2018
Looking for a general primer or quick tactical reference on social marketing? We wrote the 2018 version of the Social Media Pocket Guide for you. In engaging, easy-to-read chapters, the Pocket Guide provides a broad overview of social media’s evolution — including current themes like pay to play, digital integrations, social care, and more. We also break down the latest tips and tactics for the four most common social objectives and explore specific use cases like product launches, events, and capitalizing on real-time trends. Do you learn by example? This guide is packed with fresh strategy inspiration from 15 different global brands and media properties. Keep The Social Media Pocket Guide on hand as your quick and definitive reference on all things social strategy.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: IBM     Published Date: Jan 06, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles.
Tags : 
competition, recruiter, engagement, acquisition team, marketing tactics
    
IBM
Published By: IBM     Published Date: Jan 06, 2016
Your recruiting strategy should be an integrated partnership between strategy and tools. There is no secret sauce. However, if you broaden your approach and your definition of recruiting, attraction and connection, the goal of finding the right talent becomes increasingly attainable. Try creating a multi-faceted approach to talent attraction using target audiences and ads. Create a robust strategy to connect with talent in your lead management tool, social network, and career site or recruitment technology system. Be willing to change and try new tactics, even if it means starting small. There are countless ways to approach a truly social strategy for recruitment – when done right; they yield great results that can actually prove ROI. Embrace that recruiting is marketing and change how your team finds, attracts and connects with the next great employee for your company.
Tags : 
recruitment, marketing, talent acquisition, recruiting strategy, talent search, social strategy, lead management tool
    
IBM
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
What is ransomware? Ransomware is a malicious software designed to hold a user’s files (such as healthcare records, financial contracts, manufacturing blueprints, software code, and other documents) for ransom by encrypting them and demanding the user pay a fee (often in Bitcoin) to decrypt them. How ransomware works Attackers initiate attacks using an array of tactics. Ransomware infections often first begin with an exploit kit — which are software kits designed to identify software vulnerabilities on endpoints and then upload and execute malicious code on the endpoint. Although variants of ransomware behave differently — there are many ways that Cisco can help. Download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee