social applications

Results 51 - 72 of 72Sort Results By: Published Date | Title | Company Name

Ensuring the Voice of Business

Published By: Plantronics     Published Date: Oct 18, 2013
Emerging technologies empower, but they can also confuse. Workers in the new mobile landscape struggle to manage communications with mobile phones, landlines, VoIP calls and different voicemail boxes, email, IM, text messages and social networking applications. Unified Communications is the answer. It’s the bridge between all these communication systems helping manage communications with one interface.
Tags : 
plantronics, office environment, unified communications, emerging technologies empower, manage communications, audio quality, communication channels, acoustic technology, working offsite, b2b communication, telecommuting, plantronics audio devices, plantronics technology, ergonomic innovations, acoustic intelligence, networking, wireless, knowledge management, electronics, best practices
    
Plantronics

Using Digital, Web 2.0 Tactics to Boost B2B Marketing Results

Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free 15-minute podcast, Laura Ramos of Forrester Research explains how B2B marketers can leverage Web 2.0.  Listen at your desk or on the road and discover: how to enhance marketing ROI by driving real engagement and dialog ... how to reach key decision-makers ... reasons behind the move from demand generation toward more organic demand management ... and more.  Understanding Web 2.0 tactics is a must for B2B marketers who want to compete.  Find out why; listen to this free podcast now.
Tags : 
using digital, promo code: wp2, marketing, b2b marketing, social marketing, social networks, social networking, interactive direct marketing, interactive demand generation, digital media, engagement, rich media, rich web, rich applications, blogging, rss, social networks, facebook, myspace, digital marketing
    
Marketo, INC.

Bringing Web 2.0 to the Enterprise: Leveraging Social Computing Technologies for ERP Applications

Published By: QuinStreet     Published Date: Feb 05, 2009
This white paper details how Web 2.0 technologies support business strategies by improving efficiency and productivity as well as harnessing knowledge through collaboration. They also reduce IT costs by simplifying integration and improving IT administration and maintenance.
Tags : 
quinstreet, web 2.0, social computing technologies, erp applications, enterprise applications, technology applications, data management, application integration, application performance management, enterprise resource planning, web services
    
QuinStreet

Social Advances: Five Ways HR Can Use Social Technology to Build a Smarter Workforce

Published By: IBM     Published Date: Jul 07, 2014
Enterprise HR departments are using social technology to improve employee recruiting, onboarding, knowledge sharing, mergers and acquisitions, and learning and development. These innovative applications lead to measurable improvements in job satisfaction, employee retention and the bottom line.
Tags : 
ibm, social business, smarter workforce, social advances, enterprise, technology, business technology
    
IBM

Oracle Social Network White Paper

Published By: Oracle     Published Date: Jan 16, 2014
In this whitepaper, learn how Oracle Social Network: -Drives enterprise collaboration through natural Conversations -Enables purposeful social networking without the noise -Builds cross-enterprise knowledge by integrating conversations with CRM, HCM, and other business applications
Tags : 
marketing mix, social media marketing, marketing channels, digital marketing, internet marketing, marketing strategy
    
Oracle

The Case for Social Consumer Market Insights: Uncovering the unique value in social media research

Published By: Brandwatch     Published Date: Nov 03, 2016
Learn how social media intelligence can fill gaps in your research mix. We provide six unique benefits of social media research, four key layers of the social intelligence stack and eight core applications of social media data for modern businesses.
Tags : 
social media, consumer insights, market research, b2b marketing, consumer market insights, social data, social insights, social listening, social intelligence, business intelligence, voice of the customer, social intelligence platforms, social listening platforms
    
Brandwatch

Talent acquisition for the 21st century

Published By: IBM     Published Date: Mar 28, 2016
To succeed today, organizations need to take advantage of information technology in every area of their business. Talent acquisition is no exception. Robust, reliable technology can help recruiters more effectively engage with candidates. According to Aberdeen Group, the user experience is key. It is more important than ever to have friendly and interactive platforms. In terms of talent acquisition, companies that prioritize the candidate experience are more than twice as likely to improve their cost per hire on a year–by-year basis.1 In addition, social capabilities can enable recruiting professionals to use the Internet for job applications, social referrals and video interviewing. Mobile integration also enables users to connect with information where and when they need it. With better tools and insight into people and data, organizations can much more quickly identify talent, match capabilities to market needs, retain the best talent and improve recruiting outcomes. Simply put, rec
Tags : 
ibm, talent acquisition, human resources, recruiting, recruiting software/services
    
IBM

Mobile Social Networking: The New Ecosystem

Published By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : 
blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wifi, wireless application software, wireless communications, wireless hardware, wireless infrastructure
    
BlackBerry

Magic Quadrant for Web Conferencing

Published By: IBM     Published Date: Jul 20, 2016
Web conferencing is emblematic of the dynamic blend of content and collaboration in the digital workplace. Conferencing markets converge as audio, video and Web mix with persistent spaces to enable faster decisions and remote teamwork. Read this Gartner review to see how IBM is recognized as a leader in the web conferencing market.
Tags : 
ibm, enterprise social solutions, enterprise applications, web conferencing, collaboration, digital workplace, gartner, magic quadrant, business technology, telecom
    
IBM

A New Breed of Servers for Digital Transformation

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
Group M_IBM Q418

You Can’t Control It,But You Can Protect it:Enabling Security for Cloud, Mobile, Social Applications

Published By: Rapid7     Published Date: Mar 19, 2014
This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.
Tags : 
rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection, network security, firewalls, intrusion prevention, data protection, vulnerability management, mobile device management, data loss prevention
    
Rapid7

Improving Collaboration by Adding Social Capabilities to Email

Published By: IBM     Published Date: Sep 04, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
ibm, collaboration, email communication, real time communication, business communication, social software
    
IBM

2010 Threat Predictions

Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security, anti spam, anti spyware, anti virus, application security, identity management, internet security, policy based management, security management, security policies, web service security
    
McAfee

Ten Tips for Preparing an Effective Acceptable Use Policy

Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality, security, it management, knowledge management, data management
    
SpectorSoft

Social Media Analytics - Making Customer Insights Actionable

Published By: IBM     Published Date: Aug 08, 2012
This white paper examines the role social media can play in presenting a more strategic view of customer data and how the right combination of technologies can deliver insight to help companies more effectively meet perpetually shifting consumer demands expressed through, and influenced by, these dynamic communication channels. Discover the implications of social media for marketing and sales, as well as IT. And learn the how and why social media tools and applications can be integrated with existing technology investments.
Tags : 
social media analytics, consumer insight, marketing digitization, ibm, facebook, strategic considerations, lower cost, influence, intimacy, scale, speed, assess, measure, integrate, predictive capabilities, virtualization, analysis, mobile computing, mobile data systems, mobile workers
    
IBM

Gartner Magic Quadrant for Web Content Management

Published By: Adobe     Published Date: Feb 20, 2014
Adobe positioned highest in Ability to Execute and Completeness of Vision in Gartner’s Magic Quadrant for Web Content Management. Gartner’s evaluation is based on Adobe Experience Manager, part of the Adobe Marketing Cloud. Adobe is named a Leader and is positioned highest in both Ability to Execute and Completeness of Vision.
Tags : 
gartner, adobe, adobe social, digital asset management, web content management, adobe experience manager, aem, internet marketing, marketing, customer engagement, user experience, mobile applications, content management
    
Adobe

7 Simple Steps to Getting a Handle on Social Applications in Your Enterprise

Published By: Jive     Published Date: Feb 13, 2014
7 Simple Steps to Getting a Handle on Social Applications in Your Enterprise
Tags : 
jive, social media, social applications, facebook, twitter, sarbanes-oxley
    
Jive

HP Converged Storage: Simplify and Optimize Your Virtualization and Cloud Deployment

Published By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
    
HP and Intel ®

Improving Collaboration by Adding Social Capabilities to Email

Published By: IBM     Published Date: Nov 13, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
email capabilities, integration, social software, business operations, it management, knowledge management, enterprise applications, business technology
    
IBM

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance

Make Faster and More Precise Decisions in a Real-Time World

Published By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
AWS

A Practical Guide to Transform Manufacturing Operations with Smart Pull

Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
    
Dassault Systèmes
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.