launch

Results 251 - 275 of 319Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 10, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm.
Tags : 
cisco, akaamai, customer experience, digital customer experience, enterprise, wan, integrated solutions, optimization, infrastructure, internetworking hardware, quality of service, wireless hardware, application performance management, data center design and management
    
Cisco
Published By: CenturyLink Technology Solutions     Published Date: May 22, 2014
Read “Linedata Launches SaaS-Based Offering and Expands Global Reach with Markets Infrastructure” now, and learn how Linedata partnered with CenturyLink to expand its product offerings and achieve a global presence.
Tags : 
centurylink, agile it, it infrastructure, network infrastructure, data center, networking, infrastructure, network architecture, network management, compliance, service management, data center design and management, business technology
    
CenturyLink Technology Solutions
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
HP helped plan and deliver secure, next generation infrastructures for Kraft Foods Inc.’s launch as two independent public companies. Read how this fast-paced drive toward business agility through client virtualization and a versatile cloud architecture lowered operational costs, increased efficiencies, and improved resource control; giving the two giant “start-ups” the ability to be immediately productive.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, data center
    
HP Enterprise Services
Published By: Phunware     Published Date: Dec 06, 2014
Case study of the partnership between The CW Network and Phunware to develop and launch a next generation mobile app to 6 million users
Tags : 
mobile apps for entertainment, mobile apps for media, mobile dynamic content, app monetization, mobile monetization, mobile content discovery, mobile dynamic content, mobile cross promotion, tv everywhere, emerging marketing
    
Phunware
Published By: RF Code     Published Date: Sep 03, 2014
In the coming months, RF Code will launch the first of its planned new software tools, which the company says will enable users to add data relating to the physical datacenter to any number of other applications. Click here to get a preview.
Tags : 
rf code, sensor technology, rfid, radio frequency, data center power, power and cooling, energy savings, blade servers, green computing, data center design and management
    
RF Code
Published By: Skyword     Published Date: Nov 14, 2014
Before you write a single word, you must build a home and create a vision for your content strategy. Skyword’s “Getting Started With Content Marketing” eBook leads by example, showing you exactly how to create identity in writing branded content, with real-life examples from our own launch of The Content Standard. Download it today to get started!
Tags : 
content strategy, content marketing, b2c content, b2b content, content marketing platform, content marketing agency, brand content, branded content, branded content marketing, content marketing strategy, content marketing guide, content marketing plan, contentn strategy guide, content marketing strategies, content marketing services, content marketing software, content marketing platform, content marketing solution, original content, web content marketing
    
Skyword
Published By: Trapit     Published Date: Jun 02, 2016
In this book, you will find tips on: - Understanding your objectives and assessing your team's readiness - Assigning roles for your program - Developing a content strategy for sales - Training your team - Assessing your social selling program's progress
Tags : 
social selling, customer aquisition, trapit, social selling programs, content strategies, social media, internet marketing, sales
    
Trapit
Published By: Wyng     Published Date: Jul 02, 2015
Are you looking for some inspiration to make your next digital experience an overwhelming success? There are plenty of brands doing great things in digital, but there are a few standouts that deserve recognition for their outstanding marketing programs, including STA Travel's unique use of data, L'Oreal's product launch strategy, and BuildDirect's highly successful 'Shop by Inspiration' programs. The brands identified in this ebook represent some of the best in digital and social marketing, and their lessons will serve as a great foundation as you build out your future marketing campaigns.
Tags : 
offerpop, digital marketing, social marketing, brand awareness, marketing campaigns, emerging marketing, business intelligence, market research, e-commerce
    
Wyng
Published By: Altiscale     Published Date: Aug 25, 2015
Hype abounds about Big Data. And it's hard to know how to effectively exploit its potential. Learn how to separate fact from fiction in this new webinar + research note titled "Amazon EMR is Easy and 7 Other Myths." If you're considering launching a new Big Data initiative, or if you are currently struggling with Amazon EMR, view this 30 minute on-demand webinar + research note and dispel the most common untruths about Amazon EMR, as determined by leading Hadoop experts. Specifically, you'll learn: • The differences between Hadoop-as-a-Service and Amazon EMR • Why Hadoop on Amazon is not elastic • Why EMR is not a "plug-n-play" application • How costs get out of control with Amazon EMR
Tags : 
amazon emr, big data, haddop
    
Altiscale
Published By: Cisco     Published Date: Feb 16, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere.
Tags : 
cisco, threat, cybercrime, infrastructure, security
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
technology, infrastructure management, security, network management, network performance, best practices, productivity
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There will be a ransomware attack on businesses every 14 seconds by the end of 2019 . Every 40 seconds, one of those attacks will prove successful , with devastating effects ranging from permanent loss of irreplaceable data to life-threatening interruptions to patient care. In years past, expert malware authors packaged up their know-how into costly exploit kits sold on the underground market. Cyber criminals had to recover high upfront costs before launching a campaign and realizing a profit. Today, ransomware-as a-service groups like Satan make it easier than ever before for would-be cyber criminals with minimal technical skills to launch attacks, offering free ransomware toolkits and hands-on help to manage campaigns and extort payments. Read our white paper to learn how CylancePROTECT® prevents Petya, Goldeneye, WannaCry, Satan, and many more from executing, with machine learning models dating back to September 2015, long before the ransomware first appeared in the wild.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Jan 29, 2015
Mobility is no longer an IT trend: It is the new reality for how technology is deployed for business benefit. Research and consulting firm Forrester refers to this tidal wave of change as the “mobile mind shift” and emphasizes that it is more important than ever for enterprises to get it right the first time. But getting it right means more than just launching a customer app, implementing enterprise mobile policies, improving mobile device security or creating campus-wide hot spots. It means developing and continuously delivering mobile applications that truly make a difference for employees, business partners and customers. Increasingly, that means adopting new ways of thinking about how best to develop and manage mobile applications.
Tags : 
mobile mind shift, it trends, mobility policies, mobile device security, security, it management, knowledge management, enterprise applications
    
IBM
Published By: SAS     Published Date: Apr 25, 2017
Your company’s culture is indispensable in informing the right way to govern data, a point we hope to drive home in this white paper. When you review the mistakes that otherwise earnest companies have made in their quests to apply rigor to their data, you’ll see why our mantra is: There is no template for data governance. And hopefully, you’ll realize what you need to do now.
Tags : 
    
SAS
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
We live in a digital world, surrounded by the most powerful innovations in human communication since the invention of the printing press. We document our daily lives on a global scale. With Twitter, Facebook, Instagram, and other social media sites, we are always plugged in, consuming and producing content every minute of every day. Understanding the power of social integration is half the battle; finding the right tools and strategies to help you do this easily and effectively is equally important. Knowing what to look for and what to get out of a social experience platform is extremely important in creating a successful campaign, product launch, or dynamic brand experience.
Tags : 
spredfast, social media, sponsorship, content, social integration, emerging marketing, internet marketing
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
During SXSW Interactive, we gathered a team of five leading brand strategists to answer the five most pressing social questions in our industry. 1. What are the factors your brand considers before launching a social campaign? 2. How has social integration evolved within your organization? 3. How do you think social will influence your brand campaigns in the future? 4. Why is it important to involve your audience with your brand? 5. What advice would you share with someone who is developing a social campaign? Here’s what we discovered...
Tags : 
spredfast, social, social brand, sponsorship, recognition, consideration, consumer experience, social campaign, integration, emerging marketing, social media, internet marketing
    
Spredfast, Inc.
Published By: Quantcast     Published Date: Feb 13, 2015
Twitter ist ein globales Phänomen, das die Art, wie Marken und Konsumenten online miteinander interagieren, quasi buchstäblich verändert hat. Erst kürzlich hat Twitter eine Werbemöglichkeit gelauncht, mit der Unternehmen und Marken ihre Tweets und Accounts über Zielgruppen-Targeting an die richtigen Nutzer ausliefern können. Diese neue Werbeform – bekannt als „tailored audiences” oder „maßgeschneiderte Zielgruppen” – ermöglicht es Unternehmen, ihre eigenen Daten zu verwenden, um ein detaillierteres Targeting zu erstellen und noch bessere, maßgeschneiderte Werbung über Twitter auszuliefern.
Tags : 
tailored audiences, quantcast, real time-marketer, twitter, emerging marketing, social media, business intelligence, market research
    
Quantcast
Published By: IBM     Published Date: Aug 21, 2013
In many enterprises, marketing is a multichannel effort that includes a wide range of touch points. The touch points range from websites and email promotions to traditional print advertising, postal mail, and broadcast, and direct sales by phone and in-person sales teams. But too often, each channel works independently, accountable to its own objectives, unaware of the efforts and results made within other marketing channels. As a result, call centers speak to customers without knowing the offers the customers previously accepted or rejected. In addition, emails launch without reference to online promotions and websites present messages that disregard their visitors’ previous contact history.
Tags : 
cross channel marketing, customer communications, interactive marketing, multi-channel marketing, sales, multichannel, communications, email marketing, customer relationship management, crm, business technology, telecom, infrastructure
    
IBM
Published By: MobileBits Corporation     Published Date: Oct 15, 2013
General statistics for digital advertising point to relatively modest click through and conversion rates across the board. Its about scale in almost every case in order for any impact to be felt. And in mobile, traditionally it has been even harder to find relevance with a vast consumer base. Until now. There is a mobile app that has been pioneered in Europe and now launching in the US that is literally eclipsing typical performance measures.
Tags : 
    
MobileBits Corporation
Published By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : 
attacks, viruses, protection, networks, threats, arms race, vulnerabilities, macroviruses, worms, spyware, rootkits, defenders, security, data management
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm. Businesses that embraced the Internet in its early days gained a significant advantage over their competitors; those that did not became irrelevant very quickly.
Tags : 
digital experience, internet, perfect storm, transformative effects, technology, computers, revolution, browsers, broadband, it management, wireless
    
Cisco
Published By: HP     Published Date: Aug 11, 2014
A few years ago, two technologies emerged to dramatically improve the industry’s ability to protect data. The cost of disk drives came down, and deduplication technology was introduced. This breakthrough is sometimes referred to as Deduplication 1.0. Like any technology, you’d expect it to evolve over time. HP launched the HP StoreOnce deduplication technology roadmap in 2010 to do just that. The result? Deduplication 2.0 or what HP calls “Federated Deduplication”. This next generation deduplication addresses some of the issues inherent in existing deduplication solutions: performance, flexibility, and data management and not only that, when moving from your legacy storage backup systems, you can reduce the amount of your stored backup data by 95 percent or we’ll make up the difference with free disk capacity and support.
Tags : 
deduplication, storage, it benefits, backup systems, challenges, challenges, technologies, data management, productivity
    
HP
Published By: Polycom     Published Date: Jan 06, 2015
This document will outline five easy steps to create awareness, increase utilization and expedite adoption of video collaboration across your organization. You’ve recently added video to your communications environment. Now the real challenge begins –getting your company to actually use the solution. What is the best way to launch and promote video collaboration internally? Which departments or groups should you be targeting? What are the keys to maximizing usage levels? What are the major concerns surrounding video, and how do you overcome them?
Tags : 
train, video, network, telecommuting, mobility, on-demand webinar, polycom, collaboration, guide, networking, it management, knowledge management, enterprise applications, data management, human resource technology
    
Polycom
Published By: CrowdTwist     Published Date: Jan 18, 2017
Engaging customers in a loyalty program is no easy feat. Read how 16 brands grabbed headlines in 2016 by launching new loyalty offerings or updating their existing initiatives to engage customers and invigorate sales.
Tags : 
loyalty, engagement, customer loyalty, customer engagement, branding, consumers, strategy
    
CrowdTwist
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.