social

Results 1 - 25 of 1849Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If you’re a small-to-midsized business (SMB), you know that you’re operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure you’re under. If you can’t deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Aug 22, 2017
Die Welt ist heute digital – Cloud, Mobilität, Social Media und das Internet of Things verändern Arbeit und Freizeit für jeden. Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Mit OAuth kann der Benutzer den Zugriff an eine API delegieren. So kann für diesen Benutzer ein Service in einen anderen integriert werden. Die gleichen Social Web-Anbieter, die dafür gesorgt haben, dass APIs verfügbar gemacht werden, damit externe Entwickler ihre Plattformen optimieren können, waren auch die ersten, die solche Mechanismen für die delegierte Autorisierung angewendet haben. OAuth wurde im Jahr 2006 definiert, um derartige Mechanismen zu standardisieren.
Tags : 
    
CA Technologies
Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
Marketing automation is quickly becoming a competitive necessity for most organizations. According to a recent Demand Gen Report, 42% of b2b marketers identified marketing automation as the tool they plan to test or deploy in 2016—beyond predictive analysis, account-based marketing, lead nurturing, and attribution modeling. Download this white paper to discover how to use marketing automation to attract, engage, and convert buyers across all marketing channels by streamlining workflow, monitoring social, and managing content.
Tags : 
    
Oracle Marketing Cloud
Published By: Pure Storage     Published Date: Oct 09, 2017
Semiconductors run and connect today’s technology-driven world, powering all the electronic systems and products around us. Critical to communication, entertainment, work, medical diagnoses, travel, socializing, and making new discoveries, these specialized chips are ubiquitous. And chip designs grow ever more sophisticated in order to power new generations of devices, computers, the Internet, and the cloud. To enable new applications and use cases – like the Internet of Things – semiconductor vendors have continually pushed the boundaries of their designs to accommodate new fabrication processes that make chips smaller, more power efficient (to make personal devices last longer), and able to pack more gates into smaller dies (to make them more powerful).
Tags : 
verification, storage, customer, innovation, management, pure storage
    
Pure Storage
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: Curalate     Published Date: Aug 02, 2017
People control their own consumer journeys. Consumers expect a borderless world in which they roam freely between a brand’s social media channels, email campaigns, blogs and e-commerce site, effortlessly buying things that catch their eye. It’s led to a sporadic, personalized shopping journey that frequently begins on digital touchpoints that weren’t built for commerce. That’s made it increasingly complex for brands hoping to meet customers’ needs and measure the results of their marketing strategies. At the center of this new customer-driven revolution is visual content. Images and videos play starring roles in the decisionmaking process, and provide consumers with a whole new level of inspiration and knowledge. Every picture and video clip is now the entrance to a digital storefront, meaning brands can use them to drive not only engagement but revenue.
Tags : 
visual commerce, personalized shopping, e-commerce, email campaigns, blog, media channel, branding
    
Curalate
Published By: Curalate     Published Date: Aug 16, 2017
Digital technology has completely changed how we discover products, engage with brands and share our experiences with others. Amazon revolutionized customer feedback and product reviews. Social media transformed the way people share word-of-mouth recommendations, connecting shoppers to off-the-cuff opinions, compelling visual content and real-life experiences from peers and influencers they follow and admire. Sure, TV, radio and print ads are still part of the mix but they hardly carry the same weight as they did in years passed. This statistic speaks volumes: 92% of consumers trust peer recommendations over branded advertising. With the advent of social media and digital technology, brands have a powerful new tool at their disposal that brings word-of-mouth to the masses: usergenerated content (UGC).
Tags : 
ugc, user generated content, revenue, curalate, social media, millenials
    
Curalate
Published By: Dassault Systèmes     Published Date: Jul 25, 2017
Jim Brown, President of Tech-Clarity, explores how fast growing, midsized, High-Tech manufacturing companies can accelerate their time-to-market by streamlining their engineering and business processes on a unified platform. Watch the 20-min webinar and learn: • How a unified platform accelerates collaboration between all stakeholders of product development • How the principle of ‘invisible governance’ helps engineering teams save time on unnecessary reporting and administration • How online collaboration helps build customer intimacy and validate product ideas early and effectively • How modern, secure social collaboration platforms can smoothly transition to structured product development
Tags : 
project management, company optimization, execution, product development, research report, web based, business impacts
    
Dassault Systèmes
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
Patients trust healthcare organisations with vast amounts of their sensitive data – not just details on their medical and social wellbeing, but also personally identifiable information such as dates of birth and residential addresses. People will always make mistakes – and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help overcome this to avoid mistakes, sensitive patient information remains at risk.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: Sprinklr     Published Date: Sep 28, 2017
Jerry Nichols breaks down the five crucial steps marketing teams must take to digital transformation. As the Global Head of Marketing Performance Management at SAP, Jerry speaks from his experience in creating accountability within SAP’S marketing team and how that has benefited the business.
Tags : 
marketing strategy, marketing performance, roi, digital marketing, digital advertising, paid media, earned media, owned media
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
75% of today’s S&P 500 companies will be replaced by 2027. It’s a tenuous time to be a marketing leader - many of the strategies that have worked in the past are no longer relevant. Learn how companies like Microsoft, LVMH, and IBM are approaching digital transformation.
Tags : 
customer experience, marketing strategy, marketing performance, roi, digital marketing, digital advertising, paid media, earned media
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
After the largest tech merger in history, Dell and EMC needed to align their marketing and social departments. Karen Quintos took the challenge and along with Alison Herzog formed the Chief Customer Office.
Tags : 
customer service, customer relationships, customer experience, customer retention, voice of the customer, social customer service, customer journey
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
At the Sprinklr Digital Transformation Summit in Nashville, Cisco Chairman John Chambers issued a stark warning during his keynote address: “75 percent of the companies in this room will be digital in just four years, that’s the good news,” Chambers said to the audience. “The bad news? It’s only going to work for a third of you, because you won’t reinvent yourself.”
Tags : 
customer experience, customer retention, customer service, digital marketing, digital marketing strategy, technology trends, voice of the customer, social customer service
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
For Mohan Sawhney, Innovation and Marketing professor at the Kellogg School of Management, digital transformation is about customers. Companies are no longer just competing against their industry but against the best of the best - companies like Amazon, Netflix and Airbnb.
Tags : 
marketing, content marketing, user generated content, ugc, marketing strategy, social media strategy, social strategy, ugc strategy
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
"The Harvard Business Review recently surveyed 600+ executives from the world's biggest companies to uncover their customer experience strategies. The survey reveals that customer experience is vital for business success, and establishes social media as the foundation for customer experience. "
Tags : 
customer service, customer experience, customer retention, voice of the customer, social customer service, social customer care, customer care
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
Customer service today is broken, and the data shows it. Tried-and-true customer service models are losing your organization customers and prospects. So what is the solution? It’s called social customer service.
Tags : 
social customer service, social media customer service, social media, social, customer service, customer care, customer reviews
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
CXM is the process of providing unforgettable experiences to your customers at every touchpoint – online, on the phone, on social, and in person. It’s the future of every business operating in a networked world. So where do you begin?
Tags : 
customer service, customer relationships, customer experience, customer retention, voice of the customer, social customer service, customer journey
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
150+ million people are active on Snapchat every day. 60% of Snapchatters create content every day. Users spend an average of 25-30 minutes spent on Snapchat each day. For marketers this represents an incredible source of potential customers, but how do you best leverage this?
Tags : 
social ads, social advertising, social media advertising, linkedin ads, linkedin advertising, snapchat, snapchat advertising
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
75% of today’s S&P 500 companies will be replaced by 2027. It’s a tenuous time to be a marketing leader - many of the strategies that have worked in the past are no longer relevant. Learn how companies like Microsoft, LVMH, and IBM are approaching digital transformation.
Tags : 
customer experience, marketing strategy, marketing performance, roi, digital marketing, digital advertising, paid media, earned media
    
Sprinklr
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : 
careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training
    
CareerBuilder
Published By: Context Optional     Published Date: Mar 09, 2010
If you're a brand marketer or digital agency looking to amplify your social marketing initiatives this year, this document will guide you through the growing world of Facebook apps. Today, there are more than 500,000 active applications on Facebook, but of these only 250 applications have more than one million monthly active users. You've downloaded this guide because you recognize that marketing today means creating a two-way dialogue with your customers.
Tags : 
context optional, social media, facebook, social networking, social applications, social marketing, email newsletters
    
Context Optional
Published By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking
    
StrongMail
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.