Skip to main content
 

nic

Results 3901 - 3925 of 4298Sort Results By: Published Date | Title | Company Name
Published By: Vision Critical     Published Date: Jun 23, 2009
When times get tough, people re examine old habits and brand loyalties. Consumers are more conscious about spending their hard earned money and their tastes shift dramatically as they cut back. Virgin Mobile USA was able to see exactly how their consumers were changing during the economic downturn by surveying their online community of customers. The panel brings together hundreds of customers to interact with the organization on a variety of issues. The results were so interesting that both Forbes Magazine and the Chicago Tribune wrote an article about the findings.
Tags : 
virgin, mobile, online community, customer voice, customer data, crm, cost savings, vision critical, marketing research, market research, feedback, trial, customer, brand tracking, longitudinal studies, testimonials, advertising, communication, testing, community
    
Vision Critical
Published By: Vision Critical     Published Date: Jun 23, 2009
Kodak's community-which boasts over 2,600 members to date-has been effective in combining quantitative and qualitative research initiatives, resulting in a more comprehensive understanding of consumer behavior, trends, and demand, which the company continues to use to its advantage. In addition to evaluating existing products and marketing initiatives, it has helped to identify new product and marketing opportunities through analysis of how members shop.
Tags : 
kodak, online community, customer voice, customer data, crm, cost savings, vision critical, marketing research, market research, feedback, trial, customer, brand tracking, longitudinal studies, testimonials, advertising, communication, testing, community, branding
    
Vision Critical
Published By: Vision Critical     Published Date: Jun 23, 2009
Roxy, global designer, producer and distributor of clothing and accessories, needed a way to connect with teenage girls on an ongoing basis to help produce, design and advertise their clothes.  Roxy decided to find style mavens – girls who are the trend setters among their peers – and instead of doing ad-hoc focus groups of 20-30, they created an online community of over 900 girls.
Tags : 
roxy, online community, customer voice, customer data, crm, cost savings, vision critical, marketing research, market research, feedback, trial, customer, brand tracking, longitudinal studies, testimonials, advertising, communication, testing, community, style squad
    
Vision Critical
Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
Nuance Communications
Published By: IBM     Published Date: Jun 15, 2009
Read the white paper to see how IBM Lotus Notes and Domino software empowers users to take action, create and share knowledge and collaborate with teams. And discover how this new kind of desktop application, leveraged from 20 years of leadership can help deliver an enhanced user experience, drive greater business value and boost IT performance.
Tags : 
ibm, lotus, lotus notes, lotus domino, it performance, collaboration, connect, desktop application, connect, socialize, communicate, user experience, eclipse, alloy, developers, client, sap, it performance, green, optimize
    
IBM
Published By: IBM     Published Date: Jun 15, 2009
In this white paper, you'll see how Lotus Notes 8.5 boosts bandwidth by storing one copy of attachments, rather than allowing duplicate via threads. You'll also discover how upgrading lets you elevate collaboration and enhance efficiency with tools that empower users to take action, create and share knowledge, and collaborate with teams.
Tags : 
ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities, lotus, lotus notes, lotus domino, it performance, collaboration
    
IBM
Published By: IBM     Published Date: Jun 15, 2009
Read this astounding case study to see how migrating to IBM Lotus software with a broadly functional messaging platform increased the efficiency and support of mobile users for the Kentucky Baptist Convention. Then you'll learn how your own business can improve communications, drive down costs and eliminate the need for additional Web software.
Tags : 
kentucky baptist convention, case study, nonprofit, lotus software, messaging platform, ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities
    
IBM
Published By: Citrix     Published Date: Jun 11, 2009
Consolidation through server virtualization is a powerful agent for datacenter change, but shrinking your server footprint is just a part of the value that server virtualization brings to your IT organization. This paper explores the TCO of server virtualization, the costs that drive TCO and factors you should consider when calculating the return on your next virtualization investment.
Tags : 
citrix, virtualization, tco, total cost of ownership, datacenter, server virtualization, servers, xenserver, network interface cards, nics
    
Citrix
Published By: Semphonic     Published Date: Jun 11, 2009
A Microsite is an independent, focused website subsidiary to a larger, parent website. Its marketing, branding, and Search/Viral potential has been increasingly recognized by marketing and website managers, but measurement and analysis of a Microsite’s effectiveness requires analytical strategies and approaches that differ from the analysis of the parent website. Learn more today!
Tags : 
microsite, microsites, semphonic, independence, integration, saturation, directionality, lifetime contribution, branding awareness, keyword concentration, sourcing velocity, seo, kpi, conversion, saturation, sourcing
    
Semphonic
Published By: Citrix     Published Date: Jun 10, 2009
This paper explores common challenges associated with server virtualization deployments and the ways Citrix Essentials for Hyper-V together with Windows Server 2008 Hyper-V and Microsoft System Center Virtual Machine Manager can help organizations maximize the value of server virtualization.
Tags : 
citrix, virtualization, tco, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers, xenserver, network interface cards, nics
    
Citrix
Published By: Safari Books     Published Date: Jun 08, 2009
ITIL Version 3 Best Practices has expanded the concept of IT service delivery from day-to-day operations of those services to the Service Lifecycle. ITIL Version 3 Best Practices includes five lifecycle phases (each with its own guidebook): Strategy, Design, Transition (which covers implementation and change), Operations and Continual Improvement.
Tags : 
safari books online, government, it service management, itil, version 3, best practices, strategy, design, transition, maintenance, office of management and budget, omb, sox, sarbanes-oxley, it operations, service strategy, service design, service level management, slm, operational level agreements
    
Safari Books
Published By: Safari Books     Published Date: Jun 08, 2009
IT and business leaders today can no longer look at IT simply as a cost center, it is now a vital part of business success. Improving the efficiency of IT and improving the measurement of its impact on business performance are at the forefront of managers' concerns. Access to ITIL books can be instrumental in providing the methodology for IT improvement. Learn more today!
Tags : 
safari books online, government, it service management, itil, version 3, best practices, strategy, design, transition, maintenance, office of management and budget, omb, sox, sarbanes-oxley, it operations, service strategy, service design, service level management, slm, operational level agreements
    
Safari Books
Published By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : 
email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention, messaging, mailbox, find emails, e-mail, data protection, archiving, archive, outlook
    
MessageLabs
Published By: Citrix     Published Date: May 27, 2009
Whether you're considering your first virtual desktop solution or trying to salvage an existing implementation, Citrix XenDesktop is the clear choice on the market that offers the performance, scalability and manageability required to meet your business needs.
Tags : 
citrix, virtualization, hdx, xendesktop, sla, service level agreement, scalable, streamline, tco, view composer, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers, xenserver, network interface cards, nics
    
Citrix
Published By: Mentor Graphics     Published Date: May 21, 2009
No question the UI in electronic devices today is playing a larger role in the success of a device. Get the UI wrong and your product will have little chance of surviving. And it isn’t enough to deliver a UI that is merely functional: it has to look good too. Studies have shown that a good cosmetic design can encourage users to explore the full range of features and often, can engender the perception that a product is easier to use, which can make consumers more tolerant of product deficiencies. Learn more today!
Tags : 
mentor, user interface, electronic devices, consumer, cosmetic, graphics, nucleus, time-to-market, phone, media, tv set-top box, java, embedded software, pim apps, embedded component, callback, opengl, scripting, engineering, engineer
    
Mentor Graphics
Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Silverpop Engage B2B     Published Date: May 19, 2009
Smaller budgets. Fewer personnel. More pressure to show value. As the recession lingers on, B2B marketers are being called upon to deliver bigger, faster, cheaper results with less resources. But the current economic climate means even companies able to make high-dollar purchases will require more touch points to nurture them through the buying process. Today's business buyers are cautiously working to make smarter, more informed decisions.
Tags : 
silverpop, engage, roi, metrics, email marketing, opens, clicks, recession, b2b, b2c, roi, return on investment, engaging, recipient, communications, customers, prospects, customer relationship management, crm, click-through rates
    
Silverpop Engage B2B
Published By: BlackBerry     Published Date: May 11, 2009
Research In Motion (RIM) has made its name by providing email to wireless devices for more than ten years. It has made wireless email available around the globe and has pioneered a number of the technologies that are needed to provide seamless integration between corporate and desktop email systems and BlackBerrys in the field.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Genesys     Published Date: May 07, 2009
This white paper provides insights on the key attributes of SIP for customer service; how businesses can prosper with adoption of SIP; and flexible deployment strategies for migrating from TDM to VoIP. In addition, this paper will look at the available software, including relatively new arrivals such as unified communications, which can enhance a distributed customer sales and service strategy. Learn more today!
Tags : 
genesys, virtualization, ip migration, voip, sip, session initial protocol, voice over ip, customer service, ip network, data center, unified communications, internet engineering task force’s, ietf’s
    
Genesys
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : 
virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy, hot site, low cost, high-availability deployment, electronic vaulting, recovery, backup, data recovery, downtime, business data, smbs, small and midsized businesses, recoverability
    
SafeData, LLC
Published By: IBM     Published Date: May 04, 2009
Intel faces a familiar challenge: do more with less. With compute capacity growing exponentially and chip size expectation shrinking, the new 5500 series delivers on both fronts. This white paper delivers test results that show increased performance and speed along with greater efficiency.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, (eda) applications, quad-core processors, 64-bit intel® xeon® processor, pre-silicon verification, automation, global design team and collaboration, simulation synthesis, layout versus schematic
    
IBM
Start   Previous    150 151 152 153 154 155 156 157 158 159 160 161 162 163 164    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.