Skip to main content
 

best practices

Results 2476 - 2500 of 2657Sort Results By: Published Date | Title | Company Name
Published By: Jason Swenk     Published Date: May 02, 2011
This paper briefly defines social CRM, explains its value and sets forth some best practices and common pitfalls to avoid. Finally, a case study is presented as a best practices example of social CRM strategy
Tags : 
social crm, technology platform, workflow, business intelligence, collaborative communities
    
Jason Swenk
Published By: Achievers     Published Date: Jan 28, 2013
The field of employee rewards and recognition is changing. Download the 2013 guide for a crash course in current trends and best practices to manage your successful implementation.
Tags : 
employee recognition, employee rewards, online recognition program, trends
    
Achievers
Published By: Achievers     Published Date: Nov 08, 2013
Recent research conducted by Harvard Business Review Analytic Services and Achievers reveals how best-in-class companies gain a competitive advantage by improving their employee engagement initiatives. Download The impact of employee engagement on performance and learn best practices for tying engagement to business performance, the business case for employee engagement and helpful metrics to measure the impact of engagement.
Tags : 
employee engagement, business results, performance management, employee metrics
    
Achievers
Published By: Trillium Software     Published Date: Jun 06, 2011
The fourth Web seminar in the series is titled "Tips, Tools & Best Practices" which shows how you can learn to deliver high performance data quality in real-time.
Tags : 
trillium software, operational data quality, odq, performance management, real-time transactions, high performance data quality, business processes optimization, information integrity, reusable data quality, application optimization
    
Trillium Software
Published By: PhaseWare     Published Date: May 25, 2011
Multichannel customer service and support is increasingly required in today's digital world. Best practices for multichannel offerings increase customer satisfaction and loyalty.
Tags : 
multichannel customer service, multichannel customer support, live chat support, customer self service and support
    
PhaseWare
Published By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost, pii, ehr, data breach, data security, audits, encryption, key management
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Jun 03, 2011
This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Tags : 
liaison, nubridges, data protection, encryption, key management, tokenization, data security, audit trails, database, backup storage
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Jun 03, 2011
Tune in to this Tokenization webcast where we'll discuss the business drivers behind tokenization, exactly what 'tokenization' is, some best practices for a successful implementation, and lastly, a customer example of tokenization used to reduce the PCI DSS audit scope.
Tags : 
liaison, nubridges, tokenization implementation, pci dss audit scope, gary palgon, brian grafsgaard, data protection
    
Liaison Technologies
Published By: IBM Software     Published Date: Jun 08, 2011
Learn the six myths that surround direct marketing best practices and how your organization can use specific analytical techniques and tools to bust these myths and maximize your bottom line - so you won't just survive, you'll thrive.
Tags : 
ibm cognos, predictive analytics volume, direct marketing, best practices, analytical techniques
    
IBM Software
Published By: Idera     Published Date: Jan 23, 2013
This white paper provides clear guidance on best practices for managing tempdb to provide the optimum balance between performance, reliability, and manageability.
Tags : 
tempdb, performance, manageability, idera, it management, reliability
    
Idera
Published By: BonitaSoft     Published Date: Jun 27, 2011
10 steps and guidelines to ensure the success of organization's BPM implementation while minimizing the possibility of any potential setbacks.
Tags : 
bpm, implementation, colleboration
    
BonitaSoft
Published By: Citrix Systems     Published Date: Feb 18, 2012
Ready for 2048-bit SSL? The Iron Age is officially over. The Cloud Age is here. Don't let stronger security compromise performance. Download the Citrix and Verisign White Paper and the NetScaler Performance Comparison now.
Tags : 
2048-bit ssl, security, ssl, performance, citrix, verisign, netscaler, cloud, protection, hacking, ecommerce, traffic, ssl everywhere always-on, encryption, application
    
Citrix Systems
Published By: Spredfast, Inc.     Published Date: Sep 23, 2013
5 Social Media Best Practices for Retail Brands
Tags : 
spredfast, social media, best practices for retail brands, marketing, audience targeting, retail brands
    
Spredfast, Inc.
Published By: Accelrys     Published Date: Feb 08, 2012
In this 18-page Scientific Computing eBook, Bennett Lass Ph.D. PMP shares best practices based on his experiences planning and managing ELN deployments in large and small pharmaceutical and biotechnology research organizations.
Tags : 
accelrys, eln, symyx, scientific computing, electronic lab notebook, electronic, notebooks, lass, eln deployments, pharmaceutical, pharm, biotech, biotechnology, research, compliance
    
Accelrys
Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure, patients, utmost, security, confidentiality, integrity, sensitive, information, compliant, compliance, practice, particular, emphasis
    
Dell Storage
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: Alere Wellbeing     Published Date: May 02, 2012
Join us for our latest Clear Insights webinar, Deconstructing DASH: How Your Workforce Would Benefit from America's #1 Rated Diet, presented by Robert F. Kushner, MD, Clinical Director of the Northwestern Comprehensive Center on Obesity and one of the 22 expert panelists who rated the Best Diets for 2012. Dr. Kushner will provide an overview of DASH, compare it to other top ranked diets, and offer insights into the evidence behind their design. Dr. Kushner will also discuss the keys to sustainable weight loss and best practices for employers to choose an effective worksite weight loss plan.
Tags : 
    
Alere Wellbeing
Published By: Gleanster Research     Published Date: May 15, 2013
A must read if you are considering a marketing automation solution. Gleanster Research surveyed 219 organizations to isolate practices from "Top Performers". The report explores the use of Marketing Automation, solutions to common challenges, metrics for measuring the success of the investment, and best practices for maximizing the return on investment.
Tags : 
    
Gleanster Research
Published By: Gleanster Research     Published Date: Sep 18, 2013
Gleanster Research uncovered the top 5 best practices from Top Performing regional marketing organizations to uncover how new ways to dramatically boost the return on local marketing engagement.
Tags : 
    
Gleanster Research
Published By: Oracle     Published Date: Feb 03, 2012
Delivering a Unique Online Experience for Segments, Regions, and Brands: Knowing When to Use Personalization, Microsites, and Independent Sites - This white paper discusses a range of site implementation options and recommending best practices.
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service, software-as-a-service, pms, product management
    
Oracle
Published By: Symantec     Published Date: Jun 28, 2012
Transport Layer Security or TLS widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world.
Tags : 
transport layer security, tls, secure soclets layover, ssl
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
The most well-known example of the use of public key infrastructure has proven flexible enough to assist in authentication, encryption and data integrity.
Tags : 
tls/ssl, public, key, infrastructure, transport, layer, security
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : 
exchange 2010, ssl certificates, ssl, exchange implementation, sans, security
    
Symantec
Published By: Janrain, Inc.     Published Date: Feb 28, 2012
Your customers interact with you on social networks, but how effectively are you using social media to connect with them on your website? This white paper explores best practices to build on-site engagement by integrating social tools.
Tags : 
social login, social sharing, game mechanics, gamification, social media, social tools, social networks, facebook, twitter, linkedin, social commerce, engagement, conversion, user intelligence, customer intelligence, roi, rewards, best practices
    
Janrain, Inc.
Published By: Janrain, Inc.     Published Date: Jan 07, 2013
This paper covers establishing best practices in implementing user registration, and strategies for collecting more and better user data without sacrificing conversion rates. Topics include social login, progressive profiling, CAPTCHA, SSL, and more.
Tags : 
online registration, data management, unified data, data validation, ssl, progressive profiling, social media, marketing research
    
Janrain, Inc.
Start   Previous    93 94 95 96 97 98 99 100 101 102 103 104 105 106 107    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.