gma

Results 1 - 25 of 101Sort Results By: Published Date | Title | Company Name

Email in the Age of Social Media

Published By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking, twitter, youtube, rich media
    
StrongMail

The On-Premise Advantage for Marketing and Transactional Email

Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking
    
StrongMail

Facebook Best Practices: Building Your Brand & Your Community

Published By: StrongMail     Published Date: Sep 08, 2010
With more than 500 million active users, Facebook can be an extremely effective channel for engaging customers around your brand. However, before you rush out to build a fan page, you need to first understand the best way to interact with them based on conversations about your brand that are already happening on the social web.
Tags : 
strongmail, email, facebook, channel, social networking
    
StrongMail

Real Cost of Web site Tagging

Published By: Tagman     Published Date: Mar 21, 2011
This white paper examines the true costs associated with the Tagging of websites to implement and track the performance of online marketing technologies such as web analytics, display ad serving and search marketing. This research was conducted by TagMan, a smart container tag with real-time attribution and web-page acceleration.
Tags : 
web analytics, tagging, real time attribution, web page acceleration, tagman
    
Tagman

Information Governance: Pragmatism & Priorities White Paper

Published By: Ricoh     Published Date: Sep 28, 2018
xxx
Tags : 
    
Ricoh

Transforming productivity for distributed, agile manufacturing enterprises with the FabPro 1000

Published By: 3D Systems     Published Date: Mar 07, 2019
To stay competitive, manufacturers have to meet the rapidly changing needs of customers while retaining high quality products, at the same time as controlling costs. Product lifetimes are shrinking and customers are expecting more customization and innovation. Agility is the key to staying ahead of the competition and meeting the needs of customers. The FabPro 1000 entry-level industrial 3D printer delivers production-grade parts, at high speed, with six sigma repeatability, and can be used across a distributed manufacturing and engineering enterprise. With a low cost of entry, FabPro 1000 enables agile manufacturing operations to meet customer needs rapidly and effectively empowers engineers to deliver more value and quality in the product development process. To find out more download this whitepaper today!
Tags : 
    
3D Systems

Case Study: Wegmans Goes a Cut Above With RFID for Supermarkets

Published By: Zebra     Published Date: Oct 12, 2011
Using Zebra's Technologies, supermarket chain Wegmans was able to increase their production rate and improve their read rate. Read this case study to find out more about Wegmans and what Zebra can do for you!
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions, best practices, business intelligence, data protection, data quality, business technology
    
Zebra

Blue Coat SSL Visibility

Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility, server hardware, servers, small business networks, service management
    
Blue Coat Systems

Securing the Enterprise 5 Pragmatic Steps to Security

Published By: Secureworks     Published Date: Nov 11, 2016
This paper sets out five major areas of focus for the practical CISO.
Tags : 
managed security services, ciso, security, risk management, security, threat and vulnerability management, vulnerability management, data loss prevention
    
Secureworks

Your trusted well-being resource: right format, right place, right time

Published By: LifeWorks     Published Date: Dec 04, 2018
For many years, an organization’s approach to employee mental well- being was simply “leave your problems at the door”. But those days are gone. Not only are mental and emotional health issues losing their stigma, but businesses are realizing that failure to understand and fulfill employees’ total well-being requirements, such a physical and financial well-being, ultimately leads to reduced productivity and output.
Tags : 
    
LifeWorks

Fifteen Best Practices for a Successful Data Center Migration

Published By: Schneider Electric     Published Date: Oct 31, 2017
Most successful data center migration projects share similar practices, such as expertise, preparation, management, execution, communication and business alignment. The purpose of this research is not to provide an extensive examination of each one of these practices. Rather, it is to provide a pragmatic list of best practices. This list was derived from observations of numerous Gartner clients involved in data center migration projects over the last six years.
Tags : 
planning, contingency plan, testing, migration, preparation, project team, audit, closure
    
Schneider Electric

ALLEVIATE TECHNICAL DEBT

Published By: RedHat     Published Date: May 10, 2017
A practical path to IT modernization powered by Intel and Red Hat This paper discusses the challenges involved in making this decision and offers recommendations as to how to approach IT modernization in a pragmatic, structured way.
Tags : 
intel, red hat, it modernization, agility, efficiency, reduce costs
    
RedHat

Automate Your Way to the Pragmatic Cloud

Published By: HP     Published Date: Mar 15, 2013
HP Webinar: Automate Your Way to the Pragmatic Cloud
Tags : 
    
HP

MEDICINA DE PRECISIÓN: Nuevos Paradigmas, Riesgos y Oportunidades

Published By: SAP SME     Published Date: Nov 02, 2017
La medicina de precisión está cambiando principalmente la forma en que se desarrollan las terapias. Ha extendido sus implicaciones para todo, desde genómica hasta dispositivos médicos y crea nuevos modelos para las empresas.
Tags : 
    
SAP SME

Security At Scale With Cloud Computing: A Minute in the Life of Google

Published By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
    
Google

Eine völlig neue Dimension von DevOps: Der Kunde steht im Mittelpunkt

Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
DevOps ist nicht mehr topaktuell. Auch Continuous Delivery oder sogar das „Shift-Left“-Paradigma ist nicht mehr als innovativ zu bezeichnen. Dieses White Paper zeigt auf, wie Sie DevOps-Tools und -Verfahren kundenorientiert einsetzen können, um einen geschäftlichen Nutzen zu erzielen. Dabei wird auf die aktuellen Herausforderungen für Unternehmen eingegangen, wenn sie versuchen, durch DevOps-Innovationen mehr als nur technische Vorteile zu realisieren. Zudem werden die Lücken aufgezeigt, die die Unternehmen in den Continuous Delivery-Ketten schließen müssen, um erfolgreich zu sein. Schließlich befasst sich dieses White Paper auch damit, wie die Themen Anwendereinbindung und Customer Experience in allen Phasen der Bereitstellungspipeline als wichtige Überlegung einbezogen werden.
Tags : 
    
CA Technologies EMEA

Llevar la metodología DevOps al siguiente nivel: Anteponer al cliente a todo lo demás

Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
La metodología DevOps ya no se considera vanguardista. Tampoco lo es la entrega continua, ni siquiera el paradigma de la resolución en origen. En este libro blanco, se explica cómo aprovechar las herramientas y prácticas de DevOps de una manera orientada a los clientes para crear valor de negocio. Se analizan los retos actuales a los que la mayoría de las organizaciones se enfrentan al extender las innovaciones de DevOps más allá del ámbito técnico, se identifican los vacíos que las compañías deben llenar dentro de las cadenas de entrega continua para abordar dichos retos y se explica cómo lograr que el compromiso con los usuarios y la experiencia de los clientes sean una consideración primordial en todas las etapas del canal de entrega.
Tags : 
    
CA Technologies EMEA

Securing the Enterprise 5 Pragmatic Steps to Security

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017

Dysfunction Junction: A Pragmatic Guide to Getting Started with DevOps

Published By: CA Technologies     Published Date: Jun 05, 2014
An eBooklet discussing the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
devops, a guide to devops, integrated journey, application integration, best practices, business process management, enterprise software
    
CA Technologies

Dysfunction Junction: A Pragmatic Guide to Getting Started with DevOps

Published By: CA Technologies     Published Date: Jun 04, 2015
There has been growing buzz about DevOps. DevOps is a methodology that unites the often separate functions of software development (Dev) and production and operations (Ops) into a single, integrated, and continuous process. DevOps is about breaking down the barriers between Dev and Ops. It leverages people, processes, and technology to stimulate collaboration and innovation across the entire software development and release process. Dev and Ops should always be part of an integrated process, but that’s not always as easy as it sounds. You may be stuck in what we call “Dysfunction Junction.” Read this eBooklet to learn about the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
    
CA Technologies

Securosis - Making an Impact with Security Awareness Training

Published By: Mimecast     Published Date: Nov 14, 2018
Mike Rothman, President and Analyst at Securosis, and author of The Pragmatic CSO, conducted this study, which breaks down how companies can most effectively change employee security behavior and lower risk. If you want a blueprint for developing an effective program, this is a great place to start.
Tags : 
    
Mimecast

Challenger migrates to AWS with Rackspace to provide cloud and local market expertise

Published By: Rackspace     Published Date: Mar 20, 2019
Running an IT backend that is secure, scalable and well-managed is resource draining for any enterprise. Challenger, Singapore’s largest IT retailer, took a more pragmatic route by transforming on a Online to Offline (O2O) model. For the journey, it partnered with Rackspace to accelerate the value of its AWS cloud migration, by tapping its proven AWS expertise, strong managed services portfolio, and familiarity with local regulatory compliance and cloud security demands
Tags : 
    
Rackspace

Advocating for Order Processing Automation

Published By: Esker     Published Date: Jun 29, 2016
Automation is widely used in the business world. Still, the concept of order processing automation remains a bit of an enigma - even among those who already know a thing or two about it. That's why it's critical to give yourself a refresher before driving the project forward and getting stakeholders on board. This eBook highlights the six key stakeholders in order management that need to be challenged to go beyond the status quo. Automation aligns with their priorities - it's your job to deliver that message. Download this eBook now to learn more about the key roles in an order processing automation project.
Tags : 
best practices, business optimization, business management, productivity, business process, business intelligence, business process management
    
Esker

Customer-Centric Cloud Provisioning

Published By: ServiceNow     Published Date: Nov 22, 2013
This document discusses how self-service cloud provisioning can serve as a pragmatic customer-centric approach for managing the proliferation of public and private clouds. It discusses customer expectations, critical success factors, and key metrics required for a successful implementation of such an offering.
Tags : 
servicenow, enterprise it, cloud computing, cloud provisioning, customer-centric cloud, it operations and governance, virtual resources, service catalog, automate everything, it services, put it on the cloud, application integration, business activity monitoring, customer interaction service, customer satisfaction, ebusiness, content management
    
ServiceNow

Driving Efficiency Across the Board at Trader Interactive

Published By: Groove     Published Date: May 16, 2018
Trader Interactive provides marketing services and technology solutions to customers across seven verticals. Their customer support team was bogged down with associating support requests with the appropriate cases in Salesforce, and they needed a solution to streamline their work. Now, the customer support team enjoys Gmail integration with Salesforce, and the sales team takes advantage of multi-step campaigns, email tracking, and much more. Overall, they’ve been able to work more efficiently and provide better value to their customers. Let’s check out their story.
Tags : 
    
Groove
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.