HIT Consultant Insightful coverage of healthcare innovation
 

web forms

Results 26 - 50 of 70Sort Results By: Published Date | Title | Company Name
Published By: Lawson     Published Date: May 11, 2011
Check out this Lawson Talent Management demo and see for yourself how Lawson Talent Management works and what it can do for your organization.
Tags : 
lawson hcm, spaces demo, talent management solution, human capital management system, strategy, execution, actionable content
    
Lawson
Published By: OutSystems     Published Date: Apr 10, 2014
David Norfolk of Bloor Research International discusses research that compares two high-productivity platform as a service (PaaS) development platforms: OutSystems Platform and Force.com from Salesforce.com (now re-branded as Salesforce1 Platform). In this webcast, he will debunk the main myths surrounding high-productivity application development and how both platforms have overcome them, albeit with somewhat different approaches for different kinds of customers.
Tags : 
outsystems, predictive analysis, salesforce, cloud platforms, high productivity paas, management software company
    
OutSystems
Published By: Demandbase     Published Date: Nov 16, 2012
As a B2B marketer, you spend a lot of time creating content to attract interest from prospects, but many of those prospects never actually see your content because of lengthy web forms. Download now for six steps to shorten your forms today.
Tags : 
demandbase, b2b web forms, business to business web forms, b2b marketer
    
Demandbase
Published By: Dell Windows Server     Published Date: Jan 16, 2009
The Windows Server 2008 OS promises to supercharge enterprise computing by providing a solid foundation to support critical workloads and deliver rich Web-based experiences—all in an exceptionally secure, industry-standard operating environment. Dell smoothes the way by providing business-ready platforms optimized for Windows Server 2008 together with Structured Solution Designs to make the migration flexible, simple, and green.
Tags : 
dell, microsoft windows server 2008, structured solution designs, windows migration
    
Dell Windows Server
Published By: Webroot UK     Published Date: Nov 11, 2009
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration, compliance, remote work
    
Webroot UK
Published By: Limelight Networks     Published Date: Feb 14, 2012
An effective mobile website experience is essential to your brand's success. In this report, learn insights on how to extend your brand image effectively across mobile devices and tips for targeting multiple mobile platforms
Tags : 
    
Limelight Networks
Published By: Symantec     Published Date: Sep 29, 2015
From building the business case for Website Security and explaining the science of SSL, to top tips and best security practices, this easy-to-read Dummies Guide will demystify the world of Website Security. Download now for yourself or share with a colleague. Learn to: • Make the business case for website security • Explain how SSL forms the foundation of great website security • Choose and implement the right SSL certificates for your website • Follow best practice for maintaining a healthy and trusted website
Tags : 
    
Symantec
Published By: Marketo     Published Date: May 18, 2017
Across industries, marketing increasingly plays a critical role in company growth. After all, the top expectation of CEOs polled by Gartner, in the 2014 Gartner Executive Summary for CMO Leadership, Accountability, and Credibility within the C-suite, is that the CMO would not only improve, but also own the customer experience by 2016. Combine this with the fact that digital is quickly becoming the de facto medium for customer interactions, and it’s easy to see why it’s essential that CMOs build an effective, efficient, and scalable marketing technology (aka MarTech) stack. Today, according to Forrester’s 2015 research, “Don’t Let Muddled Messaging Compromise Customer Experience,” as much as 90% of a buyer’s journey is self directed. Your buyers have moved online and many of them (likely a majority of them) prefer to be reached through digital channels.
Tags : 
integrate, social lead tool, slide share, webinar platform, lead capture, web forms, delivery assurance, event automation
    
Marketo
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Achieving a 360-degree view of customers has become increasingly challenging as companies embrace omni-channel strategies, engaging customers across websites, mobile, call centers, social media, physical sites, and beyond. Learn how software solutions in AWS Marketplace can automate data lake analysis, enabling self-service platforms for analysis that expand and enhance personalization while deepening customer understanding so you can spend more time acting on insights.
Tags : 
    
AWS - ROI DNA
Published By: IBM     Published Date: Jun 24, 2009
WebSphere Portal remains IBM's strategic front end for SOA. It enables our clients to closely align their business objectives on standards-based platforms with role-based delivery of composite applications across and beyond their enterprise. At the end of June we delivered a new version of WebSphere Portal Version 6.1. This release significantly improves performance by tapping into the 64-bit capabilities of the IBM System z platform. Click here to learn more!
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
    
IBM
Published By: Webroot UK     Published Date: Mar 22, 2010
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, remote access, malware, viruses, spyware, phishing, threat protection
    
Webroot UK
Published By: Zebra Technologies     Published Date: Jan 30, 2019
Don’t let your legacy devices hold you back. Watch these three exclusive 2018 webinars to learn how Zebra can help you and your organization modernize your warehouse. Webinar #1: The Age of Android in the Enterprise Zebra’s Kevin Lollock, Regional Product Manager, Mobile Computing OS and Developer Platforms will unpack the vast migration to Android™ and the opportunities available for your warehouse and distribution centers. Webinar #2: Modernize the Warehouse with Android Warehouses without Windows®? Mark Wheeler, Zebra’s Director of Supply Chain Solutions discusses the migration to Android devices and shares a vision of the warehouse of the future. Webinar #3: How to Start your OS Migration Zebra’s Ritesh Gupta, Lead for Zebra Learning Services simplifies the steps of migrating to Android devices, including key considerations for planning, management, support and security. Get free access to these Webinars today!
Tags : 
    
Zebra Technologies
Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion
    
Rapid7
Published By: MoreVisibility     Published Date: Dec 19, 2017
As the approach to strategic business decision making becomes more and more data driven, a method for consolidating our various data sets, which are often spread across multiple systems becomes exceedingly important. Two of the biggest players in data driven decision making are website analytics platforms and customer relationship management systems. The former includes accumulating data on top of the funnel behavior such as site traffic origins, lead generation, content consumption tracking, device usage, and overall site behavior. While the latter has a focus more on bottom of the funnel activity such as lead nurturing, customer status, lifetime value, etc. Lastly, without communication between these two essential platforms, a complete understanding of your customers, from lead to longtime client, may never be possible. A web analytics (Google Analytics) and CRM integration provides you with a 360 degree view of your customer base, so that you can understand not just what PPC efforts
Tags : 
    
MoreVisibility
Published By: iCIMS     Published Date: Sep 30, 2013
View this webcast from iCIMS to learn wyas to take your employee referral program to the next level with the use of social media and how to use best-of-breed tech to optimize your job postings over SEO and mobile platforms.
Tags : 
icims, social recruiting, new employees, hiring management, new talent, talent pool
    
iCIMS
Published By: Acquia     Published Date: Feb 26, 2015
Way back in 1999—a thousand years ago in Internet years—a writer and designer, named Darcy DiNucci, coined the phrase Web 2.0. This marked the beginning of the web as a social experience, eventually altering commerce so that today customers can be brand advocates who play a crucial role in building your business. You already know that your customers are talking about your brand on social media platforms, posting images from your product pages to Pinterest, and checking reviews. The brick-and-mortar and virtual commerce experiences have become so intertwined that customers sometimes make an online purchase while standing in your store. So, there's no question that all commerce today is social, and this ebook will dive deeper into that concept.
Tags : 
social experience, acquia, vitual commerce experience, online shopping
    
Acquia
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 07, 2019
With more data to analyze than ever before, companies are finding new ways to quickly find meaning in their data with artificial intelligence (AI). Natural Language Generation (NLG) technologies deployed on Amazon Web Services (AWS) can enable organizations to free their employees from manual data analysis and interpretation tasks. NLG transforms data into easy-to-understand, data-driven narratives with context and relevance.
Tags : 
    
AWS
Published By: Act-On     Published Date: Nov 12, 2008
Discover how to get maximum response from your next e-mail Webinar invitation. Learn how to make your event stand out from the crowd, and how to avoid the common mistakes that doom most Webinars to mediocrity.
Tags : 
act-on, webinars, marketing, campaigns, marketing automation, lead generation, lead management, email, webforms, webex.
    
Act-On
Published By: IBM     Published Date: Oct 13, 2015
How open source web platforms can open your organization to attack. This paper reviews security concerns with content management systems (CMS), CMS attack metrics, and how organizations can protect websites built on a CMS platform
Tags : 
ibm, content management system, cms, platform
    
IBM
Published By: Gizmox     Published Date: May 24, 2012
In this Webinar, Jeffrey Hammond of Forrester Research discusses those trends, their challenges and why organizations need to rethink their application development strategies.
Tags : 
webgui, ajax frameworks, mobile, virtualization, visualwebgui, silverlight, winforms, enterprise, application, development, platform, server, webgui, ria, indirect, web, visual, studio, microsoft, dhtml
    
Gizmox
Published By: Cisco     Published Date: Dec 21, 2016
The 2015 Aragon Research Globe™ for web and video conferencing examines 22 major providers in the market. Emerging use cases make real-time collaboration a strategic imperative that requires proper planning and execution.
Tags : 
    
Cisco
Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach, hackers, business security, security
    
bitglass
Published By: Clicktale     Published Date: Oct 27, 2015
Forms can make or break your business goals. How do yours stack up? In our newest e-book, How Forms Can Confuse, Confound and Chase Your Customers Away, we take a look at some common form pitfalls. Check it out!
Tags : 
conversion optmization, forms optimization, website optimization, web forms, website analytics, website engagement, user experience, user interface, digital customer experience, user engagement, a/b testing, customer experience, form optimization, checkouts, data insights, analytics software, enterprise
    
Clicktale
Published By: Clicktale     Published Date: Feb 25, 2016
Forms are the place where you and your website visitors get personal. Forms are where visitors agree to supply their most precious online commodities - facts about themselves and their hard-earned money.
Tags : 
website development, business practices, business optimization
    
Clicktale
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.