Skip to main content
 

web logs

Results 1 - 24 of 24Sort Results By: Published Date | Title | Company Name
Published By: Clearswift     Published Date: Jun 09, 2008
Anyone who spends any time online cannot have failed to notice. People are using the Web in new ways; ways that make the 'brochureware' of the early Web experience look and feel decidedly flat. It's a new world, characterised by a wave of new jargon, brands and web based experiences. MySpace. FaceBook.  Wikipedia. Flickr. Twitter. YouTube. Mashups. Blogs. Newsfeeds. Download this white paper for a simple guide to the terms, opportunities and threats that Web 2.0 poses.
Tags : 
internet security, web 2, web 2.0, clearswift, social media, social networking, facebook, myspace, web 2.0, security, web security, clearswift
    
Clearswift
Published By: IBM     Published Date: Aug 10, 2009
Digital Media convergence, Web 2.0 and social networking's growing influence are forcing Telecommunications companies to transform their service offerings. Watch this webcast to learn about IBM's asset-based telecommunications solutions that solve our clients most important challenges.
Tags : 
web 2.0, social networking, telecommunications, digital media, collaboration, ibm, empowering people, spde, cem, customer experience management, blogs, wikis, user profiles, tagging, feeds, mobile services, lotus
    
IBM
Published By: Amazon Web Services     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
Amazon Web Services
Published By: Oneupweb     Published Date: Jun 24, 2008
Uncover the social marketing secrets of the hottest holiday products with Oneupweb's white paper, Secrets of Social Marketing Success: How 2007 Hot Holiday Products are Being Marketed Online.
Tags : 
oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing, sem, paid search engine marketing, ppc, social media tactics, blogs, podcasts, video, consumer-generated content, social networks, virtual worlds, social media, video podcasting
    
Oneupweb
Published By: Oneupweb     Published Date: Jun 24, 2008
Learn from the mistakes and successes of others in part 2 of Oneupweb's landmark social media marketing study, Social Media Marketing Hits and Misses: How 2007 Hot Holiday Brands and Products Performed Online.
Tags : 
oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing, sem, paid search engine marketing, ppc, social media tactics, blogs, podcasts, video, consumer-generated content, social networks, virtual worlds, social media, video podcasting
    
Oneupweb
Published By: ReadyTalk     Published Date: Jul 07, 2016
By now, most people have had the experience of attending a webinar. An attendee logs on, and spends a certain amount of time listening to audio and viewing a slide presentation. It is likely that attendees will interact via online polling and ask questions during the presentation. Hopefully they will leave the experience with a few takeaways. Webinars have proven to be a great marketing tool, as well as a valuable way to connect people in various geographic locations to information. But, how much of the webinar do attendees actually listen to?
Tags : 
best practices, business optimization, business management, productivity, engagement practices
    
ReadyTalk
Published By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS Inc.
Published By: Verio     Published Date: May 04, 2011
Discover how to make your small business website work harder than you by utilizing blogs, ecommerce and social media.
Tags : 
verio, cpanel vps hosting, interactive website, small business website, blogs, ecommerce, social media
    
Verio
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS, Inc.
Published By: Silk Road Technology     Published Date: Jul 30, 2014
Five years ago, many HR representatives put their hands over their ears and pretended they’d never heard the words “social media.” However, social media – which encompasses any internal or external online outlet that allows for two-way dialogue and includes websites such as blogs, Facebook, Instagram, LinkedIn, Pinterest, Twitter, Yelp, and YouTube – has only become more pervasive. In fact, according to Laura Friedel, a partner in Levenfeld Pearlstein’s Labor and Employment Practice Group, 75 percent of employees currently access social media on their mobile devices while at work and 67 percent do so more than twice a day.
Tags : 
silkroad, social media, legal risks, facebook, instagram, linkedin, pinterest, twitter, yelp, employees
    
Silk Road Technology
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag, web logs, log files, server logs, server log files, log-file analysis, web metrics, on demand reporting, real time data, real-time reporting, data collection, statistics analysis, business metrics
    
VisiStat
Published By: IBM     Published Date: May 30, 2008
In the age of Web 2.0, Internet users are rewriting the rules of social interaction, using blogs, forums, and social bookmarking for sharing information and sustaining relationships across borders. This IBM white paper looks at how organizations can achieve tangible business benefits through embracing these technologies.
Tags : 
ibm, collaboration, ibm ep, ep campaign, ibm
    
IBM
Published By: Mediative     Published Date: Jan 14, 2008
More and more, companies are realizing the importance of creating a strong online presence both in the free organic search results and the paid advertisements that appear alongside those results. The tracking features of website logs and the measurability of pay-per-click ads enable marketers to monitor the traffic of their organic listings and the performance of their online advertising campaigns. However, it's comparatively more difficult to determine how the placement of those search listings and online ads affect consumer brand perceptions.
Tags : 
search marketing, organic search, buying behavior, buying behaviors, ctr, search, branding, google, eyetracking, heatmapping, heatmap, enquiro, enquiro research
    
Mediative
Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations, event management solution
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Do you need to simplify your financial reporting process to ensure that you are meeting the Sarbanes Oxley requirements? Read this whitepaper to learn more…
Tags : 
sox, sarbanes oxley, sox compliance, sarbanes oxley compliance, compliance, comply, information technology, security, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: BatchBlue Software     Published Date: Mar 27, 2009
Even though you may not be familiar with the term “social media”, chances are you’ve heard about it or maybe even are using it to communicate in your personal life. But is social media successfully making the crossover from personal pastime to business tool? This blue paper outlines the different types of tools in the social media toolkit and proposes ways they can be used to promote your brand, communicate with your customers and help grow your business.
Tags : 
social media, matternow, communications, brand management, media toolkit, marketing communications, myspace, youtube, facebook, social networking, internet advertising, linkedin, twitter, blogs, weblogs, microblogging, pownce, flickr, del.icio.us, dig
    
BatchBlue Software
Published By: Oracle     Published Date: Sep 05, 2014
B2B Blogs are a different animal than the personal musings, rants, and raves populating the web. Powerful, if done with care, business oriented blogs can move interest to consideration. This easy-to-absorb guide explores what it takes to create the most compelling entries for the jaded world of business buyers. Learn to build long-term relationships. Grow your following. And, in the end, close more deals. Read the guide now.
Tags : 
b2b, blogs, absorb, personal, business, buyers, musings, rants, raves, web
    
Oracle
Published By: Amazon Web Services     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
Amazon Web Services
Search      

Add Research

Get your company's research in the hands of targeted business professionals.