Skip to main content
 

word

Results 351 - 375 of 586Sort Results By: Published Date | Title | Company Name
Published By: ExpertVoice     Published Date: Jun 14, 2019
Of course you want to ensure your customers have a good experience, that you’re creating brand loyalists and building a positive reputation along the way, but most importantly, you want to impact your bottom line. That’s where advocacy marketing comes in. Advocacy marketing is harnessing the voices of your brand’s fans and leveraging them to increase sales. Also known as word-of-mouth marketing, advocacy marketing is using happy customers to promote your business — and sell more
Tags : 
    
ExpertVoice
Published By: ExpertVoice     Published Date: Jun 14, 2019
Grab your harness as we take a deeper look into how Black Diamond partnered with ExpertVoice to assist with a product launch. When Black Diamond decided to manufacture their own climbing shoe, they knew how critical a successful launch would be to long- term success: the climbing shoe market is dominated by one manufacturer, and climbers are an extremely loyal group. Breaking into the market would be tough. Although ExpertVoice had a daunting task ahead of them, they knew honing in on Experts spreading wordof- mouth recommendations was key to a successful product launch.
Tags : 
    
ExpertVoice
Published By: SwellPath     Published Date: Sep 04, 2012
This guide provides the framework to build a successful analytics foundation in your organization, and shows you how to create an effective analytics measurement program that provides actionable insights and results driven recommendations.
Tags : 
google analytics, marketing analytics, ecommerce analytics, analytics strategy, web analytics, analytics implementation, google analytics consulting, measurement strategy, analytics program, key performance indicators, campaign reporting, analytics best practices, website optimization, kpis, website optimization, advanced google analytics, dashboards, scorecards, social analytics, analytics training
    
SwellPath
Published By: Jobvite     Published Date: Aug 25, 2016
According to the BCG Group, recruiting is the most critical HR function--delivering 40% more profit growth than the next HR function. In other words, recruiters are quite simply the most valuable people in HR, and in the business at large. You’re the folks that fuel the company’s talent machine, responsible for finding and hiring the most skilled workers and keeping the funnel full. And odds are, you know more than a thing or two about how to source these strong candidates and convince them to join the team. But who couldn’t use a few extra aces up the sleeve?
Tags : 
    
Jobvite
Published By: Ektron     Published Date: Aug 26, 2009
Social media allows people to be more connected than ever before and the mediums available for marketing are changing rapidly as new technologies come available. Online users are communicating in real time and every brand in the world is being caught up in the conversation whether they are participating or not.
Tags : 
social media, ektron, intranets, powerpoint, word of mouth, marketing, .net, cms, facebook, twitter
    
Ektron
Published By: Centrify Corporation     Published Date: Apr 13, 2018
This ebook helps you determine whether your company has an access issue and outlines ways to lower your risk of getting breached by increasing your identity and access (IAM) maturity through adopting a Zero Trust approach with the right IDaaS solution. You’ll learn the best practices to establish identity assurance, limit lateral movement, enforce least privilege and audit everything. Discover how to avoid a Password Crisis.
Tags : 
    
Centrify Corporation
Published By: Oneupweb     Published Date: Jun 24, 2008
Paid Search produces results. Learn when, where and how with Oneupweb's white paper, Paid Search: Follow the Money.
Tags : 
oneupweb, paid search, paid, ppc, online marketing, lead generation, traffic, conversion rates, sales, cpa, brand recognition, online advertising, google, yahoo, marketing, natural search engine optimization, seo, search engine marketing, sem, keywords
    
Oneupweb
Published By: SubscriberMail     Published Date: Dec 12, 2008
If you’ve ever heard George Carlin’s famous “Seven Dirty Words” you can’t say on TV, you can safely avoid using all seven in your subject lines – they will definitely get you blocked. Here is a list of 100 more that you should avoid using as well. Top 100 words NOT to use in your subject  lines.
Tags : 
email marketing, subscribermail, spam words, junk words, subject line titles
    
SubscriberMail
Published By: ThreatMetrix     Published Date: Jan 21, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
IBM WebSphere ILOG Rule Solutions for Office meets the demands of business users by integrating Microsoft Office Word and Excel with the market-leading WebSphere ILOG BRMS. See Rules for Office in action during this one-hour webinar, including a live demonstration.
Tags : 
ibm, ilog, business rule management systems, brms, websphere, application integration
    
IBM ILOG.
Published By: MoreVisibility     Published Date: Dec 19, 2017
Although keyword-targeting and on-page search engine optimization are just some areas that search engines evaluate when ranking pages, it is important to get these elements “right.” This complimentary white paper offers tips and a template to help establish a useful foundation for your on-page optimization efforts. Topics include: How to create content for users first, search engines second Body Copy Optimization Checklist Keyword Targeting Best Practices Meta Data Checklist with Downloadable Template Images & Multimedia Content Checklist
Tags : 
    
MoreVisibility
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : 
quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing, cms, content management system, project management
    
Quark, Inc.
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : 
quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing, cms, content management system, project management
    
Quark, Inc.
Published By: Hanapin Marketing     Published Date: Jun 03, 2013
Whether you’re hiring a new digital marketing agency or looking to improve your current agency relationship, Hanapin Marketing’s longstanding expertise and reputation as the agency that other agencies turn to can provide you with invaluable knowledge. In this guide to building a healthy agency relationship, Hanapin provides best practices and long-established wisdom about what your agency relationship should look like—including what your agency should be doing, and just as importantly, what you can do to help your agency.
Tags : 
ppc, agency, ppc agency, search marketing agency, ppc management company, ppc manager, hire an agency, agency relationship, sem, adwords, vendor
    
Hanapin Marketing
Published By: Hanapin Marketing     Published Date: Jun 03, 2013
Whether you’re hiring a new digital marketing agency or looking to improve your current agency relationship, Hanapin Marketing’s longstanding expertise and reputation as the agency that other agencies turn to can provide you with invaluable expertise. In this guide to choosing and hiring an effective PPC agency, Hanapin provides best practices and long-established wisdom about what your agency relationship should look like—including what your agency should be doing, and just as importantly, what you can do to help your agency.
Tags : 
ppc, agency, ppc agency, search marketing agency, ppc management company, ppc manager, hire an agency, outsource marketing, sem, adwords, vendor
    
Hanapin Marketing
Published By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection
    
Lumension
Published By: Mobify     Published Date: Jan 27, 2015
We at Mobify want to help you further deepen your understanding of the mobile shopping landscape and the expectations of mobile consumers. In this white paper, you’ll discover: - Why ‘omnichannel’ is not a buzzword, but the new retail reality - What the key differences are between smartphone and tablet users and what this means for your bottom line - Why Millennials are a market that you can’t afford to ignore - How your mobile presence can make or break a customer’s in- store experience
Tags : 
mobile website, responsive ecommerce website, mobile conversion optimization, mobile shopping, mobile retail, mobile e-commerce, omnichannel app, make responsive website, ecommerce mobile, e-commerce mobile, mobile retail website, mobile app development, mobile shopping platform, ecommerce mobile website, retail app development, mobile ecommerce solutions, ecommerce app development, ecommerce mobile site, mobile ecommerce site, mobile ecommerce website
    
Mobify
Published By: Intercom     Published Date: Apr 05, 2018
Word of mouth can only take a startup so far, which means advertising is an inevitable investment. So how do you advertise profitably? It begins with metrics.
Tags : 
    
Intercom
Published By: Okta     Published Date: May 12, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
    
Okta
Published By: Okta     Published Date: May 12, 2017
Read this whitepaper to learn about moving beyond user names and passwords, and how Okta's multi-factor authentication solution for on premises and cloud apps provides both the highest security and simplest administration possible.
Tags : 
    
Okta
Published By: OKTA     Published Date: Oct 23, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Die Cloud ist in fast jedem Bereich des Enterprise Computing zur Normalität geworden. Sie ist ein wesentlicher Bestandteil der Geschäftswelt und sollte als neuer Standard betrachtet werden. Datensicherung – insbesondere Backup, Archivierung und Disaster Recovery – steht zurzeit ganz oben auf der Liste der Cloud-Aktivitäten. Doch haben Sie auch Ihren Public Cloud Vertrag vor der Unterzeichnung sorgfältig durchgelesen und ausgehandelt, sodass er Ihren Geschäftsanforderungen entspricht? Oder haben die zahllosen Seiten mit rechtlichen Bestimmungen Sie dazu verleitet, zu schnell zu unterschreiben Ihre Rechtsabteilung muss selbstverständlich das gesamte Dokument umfassend prüfen. Im Folgenden finden Sie zudem drei wichtige Punkte, die Sie bei der Zusammenarbeit mit Ihrem Cloud-Anbieter berücksichtigen sollten.
Tags : 
unterzeichnung, public, cloud, vertrages, beachten, sollten
    
AstuteIT_ABM_EMEA
Published By: Astute IT DACH     Published Date: Feb 28, 2018
Die Cloud ist in fast jedem Bereich des Enterprise Computing zur Normalität geworden. Sie ist ein wesentlicher Bestandteil der Geschäftswelt und sollte als neuer Standard betrachtet werden. Datensicherung – insbesondere Backup, Archivierung und Disaster Recovery – steht zurzeit ganz oben auf der Liste der Cloud-Aktivitäten. Doch haben Sie auch Ihren Public Cloud Vertrag vor der Unterzeichnung sorgfältig durchgelesen und ausgehandelt, sodass er Ihren Geschäftsanforderungen entspricht? Oder haben die zahllosen Seiten mit rechtlichen Bestimmungen Sie dazu verleitet, zu schnell zu unterschreiben Ihre Rechtsabteilung muss selbstverständlich das gesamte Dokument umfassend prüfen. Im Folgenden finden Sie zudem drei wichtige Punkte, die Sie bei der Zusammenarbeit mit Ihrem Cloud-Anbieter berücksichtigen sollten.
Tags : 
unterzeichnung, public, cloud, vertrages, beachten, sollten
    
Astute IT DACH
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.