HIT Consultant Insightful coverage of healthcare innovation
 

news

Results 226 - 250 of 311Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet, twitter, job spam
    
McAfee
Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment
    
BlueHornet
Published By: SAS     Published Date: Sep 30, 2014
Former Intel CEO Andy Grove once coined the phrase, “Technology happens.” As true as Grove’s pat aphorism has become, it’s not always good news. Twenty years ago, no one ever got fired for buying IBM. In the heyday of customer relationship management (CRM), companies bought first and asked questions later. Nowadays, executives are being enlightened by the promise of big data technologies and the role data plays in the fact-based enterprise. Leaders in business and IT alike are waking up to the reality that – despite the hype around platforms and processing speeds – their companies have failed to established sustained processes and skills around data.
Tags : 
    
SAS
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
The old adage, "you get what you pay for" may no longer be true when it comes to traditional paid media investments. Effectiveness of traditional advertising and paid media - TV, newspaper, print - is on the decline, so marketers are choosing to push their dollars to social advertisements. In fact, 62% of marketers expect to increase their spending on Facebook marketing, along with other social media sites, over the next year. Marketers now must focus their attention on getting more from their advertising efforts by making sure that their media strategies work together. This means their paid media must work with their owned media to get more consumers to engage and participate - thus driving more earned media and amplification for their brand. Download here to learn more!
Tags : 
spredfast, converged media, social media, social advertisements, earned media, consumer engagement
    
Spredfast, Inc.
Published By: SpectorSoft     Published Date: Apr 03, 2015
You just got news of yet another issue that just happened in your business that now you need to deal with – it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. Especially in cases of data theft, fraud, embezzlement, etc., having detail on everything the employee did leading up to the purported “bad deed” will be critical in determining whether something improper occurred or not.
Tags : 
sexual harrassment, embezzlement, employee investigations
    
SpectorSoft
Published By: Brainshark     Published Date: Oct 16, 2013
Traditional ways of talking to customers, partners, and employees—memos, phone calls, newsletters—are being replaced by web-based interactive and social communication tools. Of those surveyed, 88% said that mobile access to social communication or collaboration tools was either important or very important. This whitepaper examines how companies can leverage Mobile, Social Enterprise, and video to create an enriched environment that delivers important communications and fosters active engagement.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video, tablet
    
Brainshark
Published By: Bridgeline Digital     Published Date: Oct 28, 2013
Blogging. For one contingent of marketers, pumping out posts on the company blog is their favorite part of the day; an opportunity to muse about industry news, highlight their product, and release creative fuel that is otherwise bottled up. For other marketers, blogging is the chore in the way of getting “more important” work accomplished. In other words, writing daily posts is an endless nuisance, like listening to “The Song That Never Ends.”
Tags : 
blogging, corporate blogging, blogging basics, blog speak, blog posts, company blog, blog writing, types of blogs
    
Bridgeline Digital
Published By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci, dss, hackers
    
Viavi Solutions
Published By: Volacci     Published Date: Sep 03, 2013
Newsletters engage customers, prospects and peers in a humanizing way that informs a targeted audience while building a relationship of trust and respect. This guide provides email newsletter strategies and tactics that have proven themselves across a wide variety of industries.
Tags : 
    
Volacci
Published By: Oracle     Published Date: Nov 18, 2013
The Oracle Value Chain Planning solution provide organizations with the insight and tools needed to move beyond Sales and Operations Planning, to Integrated Business Planning (IBP), aligning global operations, and achieving profitable revenue growth through a range of best-in-class processes.
Tags : 
oracle, newsletter, oracle value chain planning, supply chain, vcp solution
    
Oracle
Published By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : 
computer viruses, automated attacks, encryption, deceptive packaging, security controls
    
Symantec
Published By: CrowdTwist     Published Date: Jul 25, 2018
Over the last decade customer-brand relationships have become more and more digitized. Companies have enjoyed access to new technologies, new capabilities, and greater access to customer data. In turn, consumers have become better informed and able to connect with brands with greater flexibility and convenience. However, concerns around mismanagement of customer data, the proliferation of fake news, high profile retailer database breaches, and the Cambridge Analytica scandal has contributed to an erosion of trust between consumers and brands and demands for data privacy. What can brands do to overcome consumer skepticism? What keeps a customer coming back in 2018? And what can brands do to demonstrate relevancy and provide value?
Tags : 
customer, branding, relationships, consumer, database
    
CrowdTwist
Published By: Marketo     Published Date: Jan 08, 2014
Download this worksheet to determine if your company is ready to use marketing automation. Regardless of your score, there's good news: where you are now is exactly where you need to be in order to get more leads, get better leads, and know how to tell the good from the bad.
Tags : 
marketing automation, marketo, demand generation, lead generation
    
Marketo
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.
Tags : 
messagelabs symantec, security safeguard, email spam, malware
    
MessageLabs Ltd.
Published By: Progress Software     Published Date: Mar 12, 2014
For IT managers, choosing the wrong vendor can lead to disruption, high costs, and the loss of confidence from within the business. Learn how to de-risk your vendor selections by aligning with market trends.
Tags : 
progress software, choosing vendors, datadirect, connectivity, saas applications, big data, data warehousing, nosql, newsql, and non-relational databases
    
Progress Software
Published By: Business.com     Published Date: Jun 03, 2009
Learn the 9 keys to improving the quality of your leads from your B2B search marketing efforts - simply and effectively - with this Business.com whitepaper. Download to learn more today!
Tags : 
business.com, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: Business.com     Published Date: Jun 03, 2009
Download B2B search marketing tips from over 140 top B2B search marketing agencies and the experts at Business.com. This whitepaper offers key insights and tips to help B2B marketing professionals quickly deliver better search marketing ROI.
Tags : 
business.com, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: Business.com     Published Date: Jun 03, 2009
At a time when most businesses are facing lengthening sales cycles, reduced budgets and staff cut-backs, its imperative to keep leads flowing into the business and at a lower cost. In this study of over 27,000 B2B web sites, Business.com found 93% of B2B companies are in danger of having their best intentions come back to haunt them. Learn more today!
Tags : 
black box, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: TRUSTe     Published Date: Sep 16, 2009
Put yourself in the customer's shoes: when shopping online, what are the things that worry you most? Before you enter your name and email address do you think about spam clogging your inbox? If you are like most consumers, you check to see if the site bears the seal of a third-party verification program and if the site has a privacy policy.
Tags : 
truste, cheapflights, customer confidence, privacy policy, adsense, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales, increase online sales, increase online transactions, boost online transactions
    
TRUSTe
Published By: TRUSTe     Published Date: Jul 24, 2009
Whether registering for downloads or e-newsletters, re-ordering or renewing, or telling their friends, customers who feel more confident to click, learn, and shop online, spend more. See how Truste privacy products and programs have helped businesses of all sizes increase conversions, order value, and customer engagement throughout the customer lifecycle.
Tags : 
truste, cheapflights, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales, increase online sales, increase online transactions, boost online transactions, certification, registrations
    
TRUSTe
Published By: TRUSTe     Published Date: Aug 31, 2009
TRUSTe works to advance privacy and trust for a networked world. TRUSTe Privacy Seals help consumers click with confidence by guiding them to trustworthy Web sites. Thousands of Web sites rely on TRUSTe industry best practices to help them make the right decisions about privacy and protecting confidential user information. Most of the top fifty Web sites are certified to TRUSTe's leading practices, including Yahoo, Facebook, MSN, eBay, AOL, Disney, New York Times, Comcast and Apple. To learn more about internet privacy visit www.truste.com.
Tags : 
truste, cheapflights, customer confidence, privacy policy, adsense, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales, increase online sales, increase online transactions, boost online transactions
    
TRUSTe
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale
    
Symantec Corporation
Published By: Cision     Published Date: Aug 23, 2016
Social media has transformed the way we share and consume the news. But are your target journalists embracing it?
Tags : 
social engagement, social media analytics, social media integration, social media listening
    
Cision
Published By: Act-On     Published Date: Jan 08, 2015
Learn Facebook’s Rules of Engagement so you can make your content more sharable and searchable – and avoid violating the terms of service. This eBook will give you a thorough understanding of Facebook principles, and the general rules that apply to content and behavior.
Tags : 
act-on, facebook, social, media, rules, engagement, b2b, marketing, search, tags, post, data, feed, news, algorithm, branding, control
    
Act-On
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.