keys

Results 126 - 150 of 192Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shop-keepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, business technology
    
IBM
Published By: IBM     Published Date: Jun 26, 2013
How to manage reputational and IT risk to protect and enhance brand value and competitive standing.
Tags : 
risk management, protect, enhance, brand value, effective
    
IBM
Published By: CareCloud     Published Date: Jun 24, 2013
This report shows you why Meaningful Use attestation is only one of the steps involved in seeing a return on your EHR investment.
Tags : 
roi, ehr, success, investment, protect, cms
    
CareCloud
Published By: HP - Enterprise     Published Date: Jun 05, 2013
In today’s mobile world, the user is at the center of the application experience. This is true whether the user is a customer, a partner, or an employee. Yet meeting the needs for the enterprise user poses particular challenges. Apps must work seamlessly across devices and screen sizes, enabling real-time collaboration, without sacrificing data security. This balance requires a mobile app development platform built for the unique demands of the enterprise.
Tags : 
applications, apps, mobile applications, mobile, user-driven, data security
    
HP - Enterprise
Published By: CheckPoint HR     Published Date: May 16, 2013
At CheckPoint HR, we've worked with hundreds of small to medium-sized companies. By finding and eliminating unneeded expenses, HR can return money to the business. This white paper identifies the keys for doing so.
Tags : 
checkpoint hr, hr spend, hr expenses, human resources, hr costs, hr spend optimization
    
CheckPoint HR
Published By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
    
Symantec
Published By: RelayHealth     Published Date: Apr 01, 2013
Statements can be a great opportunity to improve the patient experience and expedite collections, or they can lead to frustrated patients, lower self-pay revenue and increased bad debt. As pioneers of the healthcare industry’s patient-friendly initiative nearly 10 years ago, RelayHealth continues to research and innovate. Its most recent patient focus group provided input on how statement design impacts their satisfaction with the hospital, post-discharge experience and willingness to pay. Learn the critical components to creating patient statements that get results and help compel patients to pay: Download the 10 Keys to Creating Engaging Patient Statements today.
Tags : 
statements, patient statements, healthcare, collection, patient experience
    
RelayHealth
Published By: Turn     Published Date: Mar 13, 2013
3 Keys to Look-Alike Modeling
Tags : 
look-alike modeling, targeting, predictive modeling, predictive models, advertising strategy
    
Turn
Published By: Datto Inc.     Published Date: Mar 07, 2013
Why deliver just backup, when data recovery and business continuity are the real keys? Learn how one Datto partner delivers business continuity to their clients.
Tags : 
ibc, bdr, intelligent business continuity, backup and recovery, diaster recovery
    
Datto Inc.
Published By: Achievers     Published Date: Dec 11, 2012
The key to business success is through employees that display the right behaviors to drive results, which are amplified by recognition. Read this white paper to learn the seven keys to creating a successful employee recognition program.
Tags : 
employee recognition, employee rewards, online recognition program, trends
    
Achievers
Published By: Brightpearl     Published Date: Nov 19, 2012
Smart, dynamic and ambitious retailers like you know that good systems and processes are key to growing a business. Learn about commerce acceleration and the keys to it's framework.
Tags : 
brightpearl, commerce acceleration 101, retailers, profit, automation, customers, suppliers, data management, business technology
    
Brightpearl
Published By: Riverbed     Published Date: Nov 12, 2012
This Forrester white paper examines the trends driving the new wave of dynamic web content in enterprises to understand its sources, its shape, and its impact on current web architectures and networks. Learn more about the keys to content management
Tags : 
dynamic web, web content management, wcm, web architecture, enterprise applications, business technology
    
Riverbed
Published By: Symantec     Published Date: Oct 02, 2012
Stuxnet,a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
malware, code, signing, certificates, software, stuxnet
    
Symantec
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this e-book, you'll learn how to protect your valuable assets without the expense or time commitment of building a full IT infrastructure.
Tags : 
database security, data management, data and security, smb, cloud based security, security, business technology, data center
    
Symantec.cloud
Published By: Epsilon     Published Date: Aug 23, 2012
It is easy to lose sight of the fact that, on the other side of the reports, the analytics, and the technology, there is a real person having a conversation with your brand.
Tags : 
marketing, dmps, online data management platforms, crm, data onboarding, online data capture, analytics, data syndicatino
    
Epsilon
Published By: Equinix     Published Date: Aug 01, 2012
The following is an excerpt from the GigaOM Pro report,"Migrating Interactive Media and Web Applications to the Private Cloud"
Tags : 
equinix, cloud computing, saas gigaom, business technology
    
Equinix
Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper reviews the metrics and the technologies you should consider when migrating to the private cloud. Get your complimentary 10-page report now.
Tags : 
public, cloud, private, technologies, technology, public, equinix, gigaom, pro, zynga, cdn, applications, software, network, limelight, iaas, paas, saas, data, center
    
Equinix
Published By: Bronto     Published Date: Jul 16, 2012
Transactional messages are the most opened among message types. Find out the keys that will let you take advantage of this and drive more revenue from your transactional messages.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, customer
    
Bronto
Published By: Crowdtap     Published Date: Jul 03, 2012
New from Crowdtap, learn why influence is the hottest topic in marketing and social media. We'll show you how to tap your brand's peer influencers to drive advocacy and boost word-of-mouth online and off with 5 Keys to Success in Influencer Marketing.
Tags : 
influence, influencer, influence marketing, influencer marketing, influence score, social marketing, social roi, social media, word-of-mouth, wom, word-of-mouth marketing, wom marketing, advocacy, brand advocates, brand advocacy, digital marketing, buzz marketing, product sampling, marketing research, marketing insights
    
Crowdtap
Published By: Appcelerator     Published Date: Jun 20, 2012
Make sure you know how to stand out among the growing number of available apps by thinking strategically before you join the mobile revolution. Download the white paper to learn the 4 keys to success today.
Tags : 
appcelerator, mobile app, strategy, mobile, revolution, wireless
    
Appcelerator
Published By: Wildfire Interactive     Published Date: Jun 14, 2012
Did you know you reach only a fraction of your fanbase every time you post a branded message on Facebook? Whether your fans receive your content in their newsfeeds depends on a Facebook algorithm called EdgeRank. We partnered with the experts at EdgeRank Checker to uncover what makes EdgeRank tick-and how you can use it to your advantage.
Tags : 
marketing, facebook, engagement, reach, social media, advertising, social media campaigns
    
Wildfire Interactive
Published By: Alere Wellbeing     Published Date: May 02, 2012
Join us for our latest Clear Insights webinar, Deconstructing DASH: How Your Workforce Would Benefit from America's #1 Rated Diet, presented by Robert F. Kushner, MD, Clinical Director of the Northwestern Comprehensive Center on Obesity and one of the 22 expert panelists who rated the Best Diets for 2012. Dr. Kushner will provide an overview of DASH, compare it to other top ranked diets, and offer insights into the evidence behind their design. Dr. Kushner will also discuss the keys to sustainable weight loss and best practices for employers to choose an effective worksite weight loss plan.
Tags : 
    
Alere Wellbeing
Published By: IronStratus     Published Date: Apr 10, 2012
Passwords are the keys to your corporate apps in the cloud and they're managed ad-hoc and insecurely in spreadsheets, sticky notes & browser cache. Signup for a free IronStratus account and start securely managing access to your cloud apps in minutes
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption, soo, login, identity management, identity and access management, access, access management
    
IronStratus
Published By: Silver-Peak     Published Date: Mar 21, 2012
Choose the hypervisor flavor of your choice. Download the software. Get the license keys in your mailbox. And off you go. No sales call. No waiting.
Tags : 
wan optimization, wan op, silver peak, technology, network management, network performance, bandwith
    
Silver-Peak
Published By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : 
endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless, microsoft, windows, registry keys, windows registry, windows processes, windows services, agent, desktop management, windows registry, asset discovery, asset management, asset inventory
    
Promisec
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com