Social Networks and Community ManagementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Business SolutionsGroupware and CollaborationSocial Networks and Community Management  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 360 | Next Page

WAN Optimization For Today and Tomorrow by BlueCoat

November 01, 2011 - (Free Research)
This white paper examines a WAN optimization solution that maximizes the performance and utility of your WAN to deliver an optimal video experience for all your users. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: The Top Four Business Risks of Social Media by BlueCoat

September 19, 2011 - (Free Research)
Social networks are changing the way people interact, communicate, form opinions, and purchase. And businesses must support social media to drive their business. However, this medium can also pose new security risks. View now to explore the top four risks of social networking and discover various ways to protect against and mitigate these risks. 
(WHITE PAPER) READ ABSTRACT |

Threat Containment for Facebook by BlueCoat

October 08, 2010 - (Free Research)
This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook. 
(WHITE PAPER) READ ABSTRACT |

Customer Success Story: Charlotte County Public Schools Optimize WAN Performance with Blue Coat by BlueCoat

July 09, 2009 - (Free Research)
Watch this webcast to learn about the challenges and successes of Chris Bress, Director of Learning Through Technology for a public school system in Florida, which serves 17,000 students. 
(WEBCAST) READ ABSTRACT |

5 Reasons Why You Need Better Visibility of Your Network by BlueCoat

April 20, 2009 - (Free Research)
If you can't see what's happening, then you can't even begin to attack what's wrong with the network. Here are 5 concrete reasons why you should contact Blue Coat today and start working towards greater visibility of your network. 
(ARTICLE) READ ABSTRACT |

Case Study: How cloud computing and Analytics enhance efficiency and the Wimbledon experience by IBM

December 06, 2013 - (Free Research)
Consult this case study to uncover how the Wimbledon Tennis Championships utilized cloud computing to deliver their content to millions of eager fans around the world. 
(CASE STUDY) READ ABSTRACT |

IT in Europe: Adopting an Application-Centric Architecture by SearchSecurity.com

November 03, 2011 - (Free Research)
Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view. 
(EZINE) READ ABSTRACT |

Tips and Best practices for Enterprise Social Software Adoption by IBM

November 14, 2012 - (Free Research)
Most businesses today are aware of the benefits of social technologies, but many organizations are finding that simply deploying social tools isn't enough to ensure social success or user adoption. Read this e-guide to learn 4 steps that lead to enterprise-wide user adoption and the importance of establishing a collaborative environment. 
(EGUIDE) READ ABSTRACT |

Social Media Analytics: How to dramatically improve the capabilities within your organization by IBM

February 11, 2013 - (Free Research)
Much of the potential from social efforts isn't fully realized due to an underinvestment in, or misunderstanding of, social analytics. This resource will help you advance your understanding and capabilities in social analytics. Continue on to learn the keys to your social analytics success and explore the four phases of a complete social strategy: 
(WHITE PAPER) READ ABSTRACT |

Social Media Analytics - Making Customer Insights Actionable by IBM

May 31, 2011 - (Free Research)
This white paper will examine the role social media can play in presenting a more strategic view of customer data and how the right combination of technologies can deliver insight to help companies more effectively meet perpetually shifting consumer demands expressed through, and influenced by, these dynamic communication channels. 
(WHITE PAPER) READ ABSTRACT |

IBM Social Analytics: The science behind social media marketing by IBM

December 31, 2011 - (Free Research)
Access this white paper to learn how savvy marketing professionals are using new technologies to learn about their customers' attitudes, preferences and buying habits from what they say publically, available on social media and through the full range of interactions that can be recorded, measured, and analyzed. 
(WHITE PAPER) READ ABSTRACT |

TDWI Best Practices Report - Customer Analytics in the Age of Social Media by IBM

December 31, 2012 - (Free Research)
This TDWI Best Practices Report examines organizations' current practices and future plans for customer analytics technology strategies, with a special focus on how organizations are adapting to challenges- and potential- of social media. 
(WHITE PAPER) READ ABSTRACT |

BBVA seamlessly monitors and improves its online reputation by IBM

November 30, 2012 - (Free Research)
This white paper examines a business case for analytics at financial institutions. BBVA, a global group that offers individual and corporate customers a range of financial and non-financial products and services, was interested in knowing what new and existing clients were saying about the business through social media. 
(WHITE PAPER) READ ABSTRACT |

Business Analytics in the cloud: Driving business innovation through cloud computing and analytics solutions by IBM

May 14, 2013 - (Free Research)
It's no secret that businesses who build strong analytically oriented teams can set themselves apart from the crowd. Consult this white paper to learn more about how analytical are changing the game of corporate sales and supply chain operations. Find out how your business can balance quantifiable benefits against risks to make the right decisions. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Top 3 Trends That Could Influence CIOs by Dell, Inc. and Intel®

March 13, 2012 - (Free Research)
This expert e-guide from SearchCIO.com offers advice on how to capitalize on cloud computing, social networking and big data for big payoffs in both their business and career by examining strategies for shared services, data analytics and consumerization of IT. 
(EGUIDE) READ ABSTRACT |

Maturing Your DLP Strategy for Today’s Threats by SearchSecurity.com

February 02, 2012 - (Free Research)
Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution. 
(EGUIDE) READ ABSTRACT |

Tablets and Smartphones in the Enterprise: Risks and Management Concerns by SearchSecurity.com

August 21, 2012 - (Free Research)
This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time. 
(EBOOK) READ ABSTRACT |

Security risks that can affect your industry by SearchSecurity.com

February 08, 2012 - (Free Research)
As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment. 
(EGUIDE) READ ABSTRACT |

Threat Management: Devising a new strategy to tackle today's cyberattacks by SearchSecurity.com

May 31, 2012 - (Free Research)
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Preventing Malware Attacks by SearchSecurity.com

February 13, 2012 - (Free Research)
As new technologies emerge, so do new, and often defenseless avenues for malware attacks. In this expert guide, uncover proactive security measures for malware defense as well as gain best social networking practices for preventing social network malware. 
(EGUIDE) READ ABSTRACT |

Proactive security measures: How to prevent malware attacks by SearchSecurity.com

August 30, 2012 - (Free Research)
Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource. 
(EGUIDE) READ ABSTRACT |

Unified Communications Trends and Challenges: How to Stay on Top by SearchSecurity.com

April 06, 2011 - (Free Research)
This e-guide discusses the top trends affecting the unified communication's (UC) market as well as potential UC and IP telephony challenges. Learn what you can do to tackle these issues and stay ahead of the competition. 
(EGUIDE) READ ABSTRACT |

UC and Collaboration: Benefits and Market Drivers by SearchSecurity.com

January 30, 2013 - (Free Research)
This expert E-Guide from SearchUnifiedCommunications.com explores the benefits collaboration can bring your enterprise and provides an in-depth look at the drivers forcing organizations to find a newer, better UCC solution for their employees to leverage. 
(EGUIDE) READ ABSTRACT |

Top 3 Drivers for Flexible UC Reference Architecture by SearchSecurity.com

September 11, 2012 - (Free Research)
This E-Guide from SearchUnifiedCommunications.com offers insight into creating a unified communications architecture that fulfills today's requirements and is flexible enough to adapt to the needs of tomorrow. 
(EGUIDE) READ ABSTRACT |

The Evolution of Collaboration: Tying the Knot with UC by SearchSecurity.com

April 17, 2013 - (Free Research)
In this E-Guide from SearchUnifiedCommunications.com, we explore the evolving relationship between unified communications (UC) and collaboration and explain why UCC is a match that can benefit any organization. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 360 | Next Page

> Explore alternative searches for: Social Networks and Community Management

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts