social

Results 1926 - 1950 of 1968Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Nov 13, 2013
In today’s lean business environment, companies are maximizing the value of their people. Your people—or talent— are an asset you can leverage to dramatically increase your success. The more you know about your talent, the more you can drive performance. Leveraging talent management can help you capture meaningful information about people, know the talent that is driving results, and act on insight for better business performance. In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : 
zenithoptimedia, oracle, top 10, talent management, best practices of talent management, social recruiting strategy, extend employment brand, engaging line managers, talent shortage, talent management processes, business agility, retain good talent, stock of internal talent
    
Oracle
Published By: IBM     Published Date: May 30, 2014
Join IBM clients as they share how they drove real outcomes with collaborative processes. See how IBM partners are innovating the leading enterprise software platform. Hear IBM's perspective on these technological shifts and see the latest advancements in action.
Tags : 
ibm, ibm software, software, collaboration solutions, enterprise social software, collaboration platform, cloud, marketing programs, software development, enterprise applications
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : 
ibm, insurance, data, big data, analytics, solutions, business technology
    
IBM
Published By: IBM     Published Date: Nov 13, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
email capabilities, integration, social software, business operations, it management, knowledge management, enterprise applications, business technology
    
IBM
Published By: Cisco     Published Date: Sep 15, 2015
IDC finds that leveraging data analytics in business decisions is becoming a top priority for an increasing number of companies. This in turn is placing new demands on IT organizations; the need is twofold: to manage new streams of unstructured data from sources such as social media and to speed response times to deliver real-time analytics.
Tags : 
sap, analytics, data, real-time, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video
Tags : 
cloud computing, cisco, contact center, best practices, cloud network, data integration, data quality, data center
    
Cisco
Published By: DNN Corp.     Published Date: Mar 26, 2014
Download your free copy of this 12-page report, loaded with charts and analysis of Forrester Research’s 2013 "B2B Social and Community Marketing Online Survey."
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: DNN Corp.     Published Date: Mar 26, 2014
Download your free copy of this special report from LeadTail and DNN, loaded with charts and analysis of the Twitter patterns of marketing decision-makers at mid-sized companies
Tags : 
dnn, online communities, marketing communities, community management, email marketing, twitter marketing, leadtail, social web
    
DNN Corp.
Published By: DNN Corp.     Published Date: May 14, 2014
Forrester Research shares key findings from their report on branded communities in B2B marketing in this on-demand webinar. While Facebook and Twitter have failed to reach their full potential, B2B marketers are reaping the rewards of branded communities: driving lead generation and revenue, as community members influence both prospects and customers. Watch this replay as Forrester's Kim Celestre describes the tactics that B2B marketers are finding the most successful and provides a business case for creating and managing your own branded community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Oracle     Published Date: Sep 05, 2014
There are so many social options for businesses these days it can be overwhelming. This guide gives you some helpful tips on choosing what communities – from online forums and content hosting sites to brand communities and Q&A sites – are right for your business goals. How do you plan for participation? How do you ensure the highest value is delivered. And do you need a designated community manager? Find out.
Tags : 
social, business, community, manager, goals, tips, value, participation, plan, management
    
Oracle
Published By: AdRoll     Published Date: Oct 05, 2016
Reach your customers on one of the world’s most popular social platforms. Download this white paper to learn more.
Tags : 
social media, instagram, advertising, mobile
    
AdRoll
Published By: AdRoll     Published Date: Dec 20, 2017
Reach your customers on one of the world’s most popular social platforms. Due to hundreds of millions of active daily users, Instagram is becoming a key component in every cross-device marketing strategy. To help you reach and engage a wider audience, we put together The Performance Advertiser’s Guide to Instagram. Highlights from the guide: Guidelines for Instagram ad formats Essential tips for Instagram advertising success How to track the performance of your campaigns How other companies have used Instagram to grow their business And more!
Tags : 
instagram, social media, cross-device marketing, performance advertising
    
AdRoll
Published By: Salesforce     Published Date: Nov 19, 2015
In the next five years, more than $2 trillion is expected to transfer between generations. To capitalize on this massive redistribution of wealth, today’s financial advisors need to meet the demands of today’s clients who are social, mobile, more connected, better informed and looking to collaborate with their advisors when they want, where they want.
Tags : 
salesforce, financial services, cloud, mobile, data, data center
    
Salesforce
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
To drive organizational change and achieve successful results, growth CMOs focus on fostering five specific adaptive capabilities: technology, omnichannel, measurement, social connectivity, and talent
Tags : 
    
Tyco Integrated Security
Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning, social listening, brand crisis, brand monitoring, brand protection, reputation management, corporate communications, public relations
    
Meltwater
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast
Published By: Lumesse     Published Date: Feb 13, 2015
This White Paper illustrates the trends that increase the complexity of recruitment, causing talent acquisition managers and HR leaders significant concern: the emergence of new technology, changing demographics and recruiting across borders and increasing globalisation.
Tags : 
use of technology in recruitment, new recruitment methods, mobile jobseekers
    
Lumesse
Start   Previous    65 66 67 68 69 70 71 72 73 74 75 76 77 78 79    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.