site pro

Results 351 - 375 of 578Sort Results By: Published Date | Title | Company Name

Case Study: Urban Outfitters – How to Make User Generated Content from Instagram Shoppable

Published By: Curalate     Published Date: May 03, 2016
Instagram is a social channel being used more than ever, but executives are asking: "Where is the ROI?" In this Urban Outfitters case study, learn how you can tie UGC to commerce by connecting photos to your product pages. Discover how you can: - Collect thousands of images about your brand that Instagrammers are already sharing - Turn website browsers into buyers by linking user images to product pages - Drive exceptional click-through rates from user generated content (Urban Outfitters saw 15% CTR) Read the Urban Outfitters Case Study to see how to put these changes in action for you brand!
Tags : 
curalate, urban outfitters. igc, user generated content, instagram shoppable, social media, browsers into buyers, networking, business technology
    
Curalate

Zero to Insight with the Snowflake Elastic Data Warehouse

Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media, storage
    
SnowFlake

Employee Access to Healthcare Matters More Than You Think

Published By: One Medical     Published Date: Jan 26, 2018
Your employees are overusing ER and urgent care for basic needs because they can’t easily access their primary care doctor. We compare the virtual doctor, the on-site company doctor, and the neighborhood doctor to see how each stacks up. Read our report to learn how to improve your employees’ care experience. We’ll show you how to get them the care they need, when they need it, while lowering your overall health care costs.
Tags : 
    
One Medical

GRC Strategies - Finding the Right Balance of Business and IT

Published By: SAP     Published Date: Nov 23, 2009
Increased regulatory requirements, the need for transparency, and the desire to better manage and mitigate risks have combined to make Governance, Risk, and Compliance (GRC) top of mind for both business and Information Technology (IT) executives. Business managers and IT security managers must work collaboratively and continuously to control access and authorization, guarding against fraud and mistakes, while providing the clear visibility that is prerequisite for sound corporate oversight to ensure profitability and compliance.
Tags : 
sap, governance, risk, compliance, grc, risk management, vulnerability management
    
SAP

Learning from BPM Leaders

Published By: SAP     Published Date: Feb 10, 2011
Read about the benefits, prerequisites, and impact of successful business process management (BPM) initiatives, with a closer look at the United States.
Tags : 
sap, bpm, business process management, idg, it management, soa, business management, enterprise resource planning
    
SAP

How to Create Rich Web Content that Drives Conversation and Generates Results

Published By: Sysomos     Published Date: Aug 01, 2011
This paper is designed to help individuals responsible for portions of their company's websites - PR and IR, professionals, marketing, product and HR managers, to name a few - be more effective.
Tags : 
marketwire, b2b marketers, content marketing, roi, social media, inbound marketing, conversation, rich web content
    
Sysomos

VMtech and Sydney Opera House Take On Cybersecurity

Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. Each year, it attracts more than 8.2 million visitors on site and stages more than 2,000 performances attended by over 1.5 million people. Since opening its doors in 1973, the Opera House has become the symbol of modern Australia and the country’s premier tourist destination, with an iconic national-identity value that Deloitte Access Economics has estimated at $4.6 billion. On the Opera House’s 40th anniversary, it embarked on a Decade of Renewal, a series of projects to prepare the Opera House for future generations of artists, audiences, and visitors. Because renewal isn’t just about the building and the arts; it’s also about renewing technology and systems. This enabled the Opera House to engage VMtech and BlackBerry Cylance to modernize its IT server and network infrastructure, as well as information management, privacy, and cybersecurity.
Tags : 
    
BlackBerry Cylance

Harnessing the Power of Website Personalization to Drive B2B Marketing Improvement

Published By: Gleanster     Published Date: Mar 14, 2012
B2B marketers operate in a world where the ability to dynamically serve up relevant website content at the so-called "moment of truth" has traditionally presented a monumental challenge. This 8-page Deep Dive analyst report explores the promise of what Gleanster terms Real-time Website Content Versioning.
Tags : 
gleanster, marketing, b2b, market research, lead generation, traditional marketing
    
Gleanster

8 Ways Every Solution Provider Can Profit from Rollouts Now

Published By: OnForce     Published Date: Apr 22, 2007
“8 Ways Every Solution provider Can Profit from Rollouts Now” demonstrates how rollouts are creating strong sales opportunities for solution providers of all sizes. Importantly, it also addresses how solution providers have finally “cracked the code” of transforming this high-volume business, which is extremely service intensive, into a high-profit business via innovative on-site service delivery models that let them find the contract IT service professionals they need, right when they need them.
Tags : 
service model, roll-out, rollout, roll-outs, rollouts, customer service, var, vars
    
OnForce

Milhouse Engineering Manages the O’Hare Airport Project with GlobalSCAPE WAFS

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
In 2005, O’Hare International Airport began a project to relocate and modernize a 2.1 million ft.2 runway. Five independent firms worked on the project design with the IT/data management led by Milhouse Engineering and Construction, Inc.  Milhouse implemented GlobalSCAPE WAFS which mirrors critical files to all sites. This provided fast local access to all project files automatically without any administrative burden and with no delays.
Tags : 
globalscape, data management, wide area networks, high availability, project management, information management
    
GlobalSCAPE

Optimizing File Sharing and Data Back Up Over Wide Area Networks

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Disaster can strike when you least expect it.  So how do you back up and maintain control of your data and still provide access to data in a distributed organization?  The challenges are clear...large and growing amounts of data need to be distributed across many sites yet complications such as bandwidth usage, file coherence, version consistency, and file latency all result in lost productivity.
Tags : 
globalscape, wide area networks, backup and recovery, disaster recovery, data protection, information management
    
GlobalSCAPE

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, security solution, ssl, trust, malicious activity, online businesses, sensitive information, e-commerce security
    
VeriSign, Inc.

Automated Lead Management Helps The Hager Group Drive Incremental Revenue

Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The Hager Group is a $1.5-billion electronics manufacturer. With a distributed global workforce of more than 10,000 employees, Hager has 40 sales subsidiaries and 25 industrial sites worldwide.  Today, with a centralized marketing database and software, Hager can ensure data quality and deliver personalized, targeted communications according to customer and prospect profiles and behavior.  This program allows Hager to capture 1,000 new prospects each month, and achieve a 10 percent conversion rate - resulting in an incremental revenue increase of $42 million per year.
Tags : 
neolane, the hager group, e-marketing program, centralized marketing database, central repository customer data, crm software, custom content, deliverability
    
Neolane, Inc.

Eight Elements of Effective Information Security Policies

Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002
    
Information Shield

Mastering New Challenges in Text Analytics

Published By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS Inc.

Transportation Operations: Clear Cash Flow Roadblocks with Enhanced Mobile Document Imaging

Published By: Intermec     Published Date: May 07, 2009
Many transportation companies and other businesses that perform pickup, delivery or other services at customer sites have an excellent opportunity to improve cash flow -- without having to add customers or sell more to existing ones.
Tags : 
transportation operations, mobile devices, cash flow, transportation, delivery, pickup, full-time equivalent, fte
    
Intermec

Forrester Research Reports Real ROI Results Through Device-Based Fraud

Published By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process
    
Iovation

WagerWorks Takes Fraudsters Out of the Game using iovation Device Reputation

Published By: Iovation     Published Date: Oct 21, 2009
With device reputation, WagerWorks gained valuable insight into the account activity on its sites, and as a result achieved greater control over fraud and abuse. By easily identifying account-device relationships and providing data for in-depth forensic analysis, iovation ReputationManager proved to be the most important addition to the company's overall fraud prevention process
Tags : 
wagerworks, iovation, fraud prevention, security, identity management, compliance, online gaming abuse, security management
    
Iovation

An Optimized Website Design or Redesign Checklist

Published By: MoreVisibility     Published Date: Apr 06, 2010
Planning a website redesign project of any size can be an overwhelming endeavor. How do you know where to begin and what should be included? MoreVisibility's Website Redesign Checklist will help you.
Tags : 
more visibility, website design, redesign, lead conversion, web development
    
MoreVisibility

Neverfail Migrate - Simple, Efficient Server Migration

Published By: Neverfail     Published Date: Jan 24, 2013
Neverfail Migrate offers a simple and powerful solution -- Replicates your data between servers, scalable server, application or site migration in minutes, identically clones your current production servers and more.
Tags : 
neverfail, migrate, neverfail migrate, simple, network, server, migration, server migration
    
Neverfail

The Great Multi Protocol Label Switching (MPLS) Migration

Published By: Singtel     Published Date: Oct 28, 2014
There are now a variety of alternatives when it comes to connecting multiple sites with WAN links. Multi Protocol Label Switching is fast gaining popularity for many businesses as their preferred choice when it comes to creating a Virtual Private Network (VPN) over WAN. This paper will discuss the differences between MPLS and IPSec, and the benefits achieved from migrating to MPLS.
Tags : 
singtel, vpn, wan, lan, infrastructure, ip networks, ip telephony, local area networking
    
Singtel

The 7 Habits of Highly Effective Websites

Published By: Sitecore     Published Date: Aug 21, 2013
The first habit of highly effective websites is to embrace the fact that you need to think like your prospects and customers. Start by putting yourself in your customers’ shoes — how would they organize your website?
Tags : 
sitecore, sitecore ebook, effective websites, global software, management platform
    
Sitecore

Reduce Costs and Run Your Microsoft Exchange Server on Amazon Web Services Cloud.

Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud
    
Amazon Web Services, Inc

Bridging the Gap: What it Means to be a Fully Integrated Provider

Published By: QTS Data Centers     Published Date: Feb 17, 2017
According to the 2016 Enterprise IT Spending Benchmarks, compiled by 451 Research, North America will exceed $1 trillion in IT spending by 2017. Businesses of all sizes are expected to move to a hybrid IT approach. When choosing a hybrid approach, you need both on-site and cloud resources that are reliable and well maintained. The easiest way to assure this is by streamlining your data center solutions through a single, fully integrated service provider.
Tags : 
    
QTS Data Centers

Deliver Superior User Experiences With A Cloud-Based DNS Service

Published By: Dyn     Published Date: Jan 14, 2015
Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.
Tags : 
cloud based, dns service, ddos attack, user experience, infrastructure, dns performace, ddos, business intelligence
    
Dyn
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.