activity

Results 276 - 300 of 330Sort Results By: Published Date | Title | Company Name
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide provides a number of helpful tips for an effective evaluation of campaign activity, including: • How to distinguish between measurement types • An in-depth view on campaign measurement frameworks and dashboards • Common campaign objectives
Tags : 
social media, social analytics, social media monitoring, campaign measurement, campaign management, social listening, social business intelligence, social media campaigns
    
Brandwatch
Published By: LiveHive     Published Date: Feb 16, 2016
Best selling author and sales expert Jill Konrath breaks down productivity hacks to getting more done in less time. Jill will look at different methods to help you eliminate the distractions that don’t contribute to your sales goals, tame procrastination and master the art of motivation, and employ the right tools to automate work and focus your efforts on meaningful activity.
Tags : 
sales process, livehive, productivity hacks, ebook, best practices
    
LiveHive
Published By: AdRoll     Published Date: Jul 11, 2017
Nothing is more top of mind for marketers than attribution. It’s a complex topic, and there are lots of questions. Should you measure only the first click, or the last click? Should you also measure views? Should you combine view measurement with click measurement? How long should you wait to give credit to user activity? In this whitepaper, we examine the history of attribution models and dive deep into AdRoll platform data, third-party research, and advertiser survey data to make the case for marketers to adopt a blended attribution model, one that combines both ad views and clicks. Attribution is critical to marketing success because nothing has a bigger influence on evaluating results than how you measure the impact of your advertising. And in the digital paradigm, almost everything is measurable. When we surveyed our customers, we heard this point loud and clear. Of the 1,050 marketers we spoke to in our 2016 State of the Industry Report, 84% believe attribution is critical or ver
Tags : 
attribution, adroll, performance marketing, advertising
    
AdRoll
Published By: Informatica     Published Date: Jul 07, 2011
Explore how retailers can generate a single view of customers who engage across multiple channels-online, in stores, and via call centers, on social media, and mobile devices.
Tags : 
informatica, competitive edge, customer information management mdm, master data management, multichannel retail environment, social media, single view, customer activity
    
Informatica
Published By: eROI     Published Date: Jan 23, 2007
Your customers are the most important aspect in your business - without them, you have nothing. eROI offers communication advice that can help you to maximize customer satisfaction and loyalty. Topics discussed include loyalty offers, low activity offers, surveys, and more.
Tags : 
lead generation, email marketing, newsletter design, loyalty and retention, content personalization, re-engagement, re-enticement, low activity
    
eROI
Published By: Schneider Electric     Published Date: Jun 07, 2019
Attracting Investors Webinar: With more than $18 billion in M&A activity in the first half of last year alone, the colocation industry is riding the bubble of rapid growth. Colocation data center providers are being evaluated by a wide range of investors, with varying experience and perspectives. Understanding the evaluation criteria is a critical competency for attracting the right type of investor and investment to your colocation business. Steve Wallage, Managing Director of Broad Group Consulting, has led more than 30 due diligence projects and will discuss specific areas of focus including assessment of financials, management, customers, business plan, competitive positioning and future strategy and exit. By attending this presentation colocation providers will: Hear how investors are assessing colocation providers Understand different types of investor strategy and positioning Explore actual case studies –success stories as well as examples where investors walked away Walk away with a greater understanding of how to not only attract investment, but the right type of investor to propel their business growth
Tags : 
investors, schneider electric, - colocation provider, attracting investors, colo data center
    
Schneider Electric
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
This strategic view is the proverbial "gold" that can be mined from your data protection systems; it is the asset that will enable IT management to prioritize activity to bring activities in line with business objectives and communicate policy compliance to corporate officers and data owners.
Tags : 
data consolidation, data protection, business management, business value, security policies, security policy, policy management, mission critical
    
Bocada
Published By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : 
ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy
    
IBM
Published By: OutlookSoft     Published Date: Aug 21, 2009
As vendors rush to embrace and exploit predictive analytics, only those with a truly unified solutions will succeed in capitalizing on this powerful and promising technology. Read this insightful white paper to learn more.
Tags : 
analytics, business analytics, performance managment, business process management, bpm, business activity monitoring, metrics, business metrics
    
OutlookSoft
Published By: Reactivity     Published Date: Aug 21, 2009
Security is one of the main issues when deploying Web services in the enterprise. This white paper discusses the advantages of an appliance over an agent-oriented architecture for Web services security, how cross platform interoperation is immediate with a hardened appliance, and why web services security is different from web server security.
Tags : 
network architecture, quality assurance, xml, web service management, web service, web service security, web services security, security appliance
    
Reactivity
Published By: Reactivity     Published Date: Aug 21, 2009
The vast majority of IT professionals and business people agree that security is the leading concern for SOA and XML messages and most quickly realize that SSL is limited by not providing content security, auditability or reliability. This paper will discuss how to extend SOA beyond the perimeter through high performance.
Tags : 
soa, web services, xml, service oriented architecture, service-oriented architecture, soa security, xml security, security performance
    
Reactivity
Published By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity
    
Reactivity
Published By: Reactivity     Published Date: Aug 21, 2009
This white paper discusses the three critical Web services deployment issues-security, provisioning connections, and operations. As each is owned by different factions within an enterprise, each can become a 'show stopper' to Web services deployment initially, and every time a change must be made.
Tags : 
web service security, secure web services, web service, internet security, web applications, file sharing, network security, reactivity
    
Reactivity
Published By: Reactivity     Published Date: Aug 21, 2009
This white paper introduces the requirements for an XML infrastructure that is designed to ensure the opportunities and benefits of SOAs and Web Services can be realized.
Tags : 
soa, web services, xml, infrastructure, service oriented architecture, service-oriented architecture, xml infrastructure, reactivity
    
Reactivity
Published By: Reactivity     Published Date: Aug 21, 2009
Load balancers, name servers (e.g. DNS), even stock brokerage services are existing examples of virtual services in the worlds of networking and financial services. This paper will introduce the concept of virtual services for SOAs and provide details of the characteristics of virtual services that enable SOA success.
Tags : 
service provider, service virtualization, virtual machine, soa, service-oriented architecture, service oriented architecture, change management, reactivity
    
Reactivity
Published By: Villanova     Published Date: Aug 21, 2009
Based on the Japanese words Seiri, Seiton, Seiso, Seiketsu and Shitsuke, the 5S philosophy focuses on effective workplace organization and standardized work procedures. 5S simplifies your work environment, reduces waste and non-value activity while improving quality efficiency and safety. Once fully implemented, the 5S process can increase morale, create positive impressions on customers, and increase efficiency and organization.
Tags : 
lean methods, productivity, efficiency, workforce management, customer service, six sigma, 6 sigma, project management
    
Villanova
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how to meet regulatory requirements for system change and user activity monitoring with NetIQ Change Guardian for Windows, without the need for performance-hindering native auditing.
Tags : 
pci, pci dss, data protection, compliance, netiq, net iq, change management, monitoring
    
NetIQ Corporation
Published By: Microworld     Published Date: Dec 12, 2007
Content Security refers to monitoring Internet access and e-mail activity in your network. This white paper provides information about Content Security, its need and recommends features that good Content Security software should have.
Tags : 
email content, content security, anti spam, internet security, email security, internet security, spam, filtering
    
Microworld
Published By: Clickatell     Published Date: May 20, 2008
Communication is a profoundly human activity and the primary driving force behind all technological development. The secret of the mobile phone’s success lies not just in its simplicity, but also in its adaptability.  Download this white paper to learn more.
Tags : 
clickatell, mobile marketing, sms marketing
    
Clickatell
Published By: Software Quality Systems (SQS)     Published Date: Oct 05, 2010
White paper discussing the specific opportunities available to companies through the use of MTS; using different areas of activity to show how the introduction of MTS impacts on technology, processes and organisation
Tags : 
software testing, outsourcing, managed testing services, quality assurance
    
Software Quality Systems (SQS)
Published By: Virgin Pulse     Published Date: Apr 23, 2012
Discover Integrated Incentives, the tool that tracks employee health progress through a single online portal. This management solution seamlessly bundles wellness incentives while helping employees engage in the variety of reward opportunities available through healthy lifestyle choices.
Tags : 
wellness, corporate wellness, incentives, rewards, activity, health, fitness, motivation
    
Virgin Pulse
Published By: Virgin Pulse     Published Date: Aug 20, 2012
Employee wellness efforts have historically been "one size fits all" -which is ineffective at improving employee health behavior. See how offering a personalized health experience for your employees based on robust data, reporting and segmentation can drive engagement and long-term healthy behavior change.
Tags : 
wellness, corporate wellness, incentives, rewards, activity, health, fitness, motivation
    
Virgin Pulse
Published By: EZappt     Published Date: Nov 19, 2010
Automating and Managing Student Advising Activity in Higher Education
Tags : 
advising management software, appointment management, software
    
EZappt
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.