Frameworks Social NetworkingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Frameworks Social Networking returned the following results.
RSS What is RSS?
Related Categories

 •   Social Networks and Community Management
 •   Collaborative Tools
 •   Data Security
 •   Customer Relationship Management (CRM)
 •   Network Security
 •   Unified Communications / Voice & Data Convergence
 •   Security Policies
 •   Security Monitoring
 •   Mobile Device Management
 •   Marketing Management

Related Searches
 •   Frameworks Make
 •   Frameworks Social Construction
 •   Frameworks Social Impact
 •   Frameworks Social Networking Address
 •   Frameworks Social Networking Policy
 •   Frameworks Social Networking Provider
 •   Plans Frameworks Social
 •   Scheduling Frameworks Social Networking
 •   Standard Frameworks
 •   Version Frameworks
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Total Economic Impact Of IBM Social Collaboration Tools by IBM

December 14, 2010 - (Free Research)
The financial impact of collaboration on productivity and processes is often elusive. Yet companies are purchasing collaboration tools at a growing rate with the expectation of real impact. This study evaluates the potential financial impact of IBM Social Collaboration tools in organizations as part of a strategic investment in collaboration. 
(WHITE PAPER) READ ABSTRACT |

A Framework for 2.0 Adoption in the Enterprise by NewsGator

May 05, 2010 - (Free Research)
This report draws from the knowledge of full‐time practitioners who orchestrate enterprise‐wide rollouts in their organizations. We outline patterns of adoption and highlight practical insight that will help your company and your clients plan for the process and help set realistic expectations for a successful 2.0 rollout. 
(WHITE PAPER) READ ABSTRACT |

Unlock the 6 Secrets to Social Success by Jive Software

July 25, 2013 - (Free Research)
Uncover the top six secrets to social success and receive help implementing and/or adjusting your framework for the addition of social. Also view in-depth key actions you should take and questions you must answer to ensure your social strategy is a beneficial one. 
(WHITE PAPER) READ ABSTRACT |

Running a Successful Enterprise 2.0 Pilot by NewsGator

May 17, 2010 - (Free Research)
NewsGator has years of experience running effective social computing solution pilots. Running a successful pilot not only boosts the value you can derive from your solution, it also prepares you for a successful companywide launch. This whitepaper will provide a framework for a successful pilot, give best practice tips and tricks, and more! 
(WHITE PAPER) READ ABSTRACT |

CyberAgent translates blog user insights into a more engaging experience by IBM

April 29, 2013 - (Free Research)
View this white paper to learn how Japan's largest blog service provider, CyberAgent, found a way to create a new level of engagement and loyalty among its blog readers. By developing an analytics framework that enabled a new kind of insight into blogging preferences and behavior. 
(WHITE PAPER) READ ABSTRACT |

It's 2008: Do You Know Where Your Talent Is? - Connecting People to What Matters by SAP America, Inc.

July 1967 - (Free Research)
Demand for knowledge workers is rising even as their skills and abilities are falling into short supply. This research report about acquisition and retention strategies questions the "war for talent" approach to these emerging trends. 
(WHITE PAPER) READ ABSTRACT |

Using Social Media to Deepen Your Customer Relationships by Infor

November 2010 - (Free Research)
Written for the marketing executive, this paper provides a useful framework to begin to assess how an organization can engage in social media to build deeper relationships with its customers. 
(WHITE PAPER) READ ABSTRACT |

Maturing Your DLP Strategy for Today’s Threats by SearchSecurity.com

February 2012 - (Free Research)
Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution. 
(EGUIDE) READ ABSTRACT |

FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications by FaceTime Communications

September 2010 - (Free Research)
This whitepaper sets out some of the key rules, guidelines and associated risks for FINRA member firms and suggests ways that organisations can use technology to protect themselves and their RRs. In addition, it looks at some of the other issues that enterprises may encounter when enabling the new internet. 
(WHITE PAPER) READ ABSTRACT |

About to Buy Guide: How to Succeed in Social Networking and Collaboration by SearchCIO.com

September 2012 - (Free Research)
In this expert E-Guide, President of The Real Story Group Tony Byrne describes the importance of homing in on specific business applications and of getting IT involved in the implementation—as well as why integration of social tools remains a problem. Read now to learn more. 
(EGUIDE) READ ABSTRACT |

Social Networking in the Enterprise: Benefits and Inhibitors by Cisco Systems, Inc.

June 2010 - (Free Research)
This white paper reveals the primary considerations for social networking, such as: business value and strategic relevance, adoption trends and concerns, and strategic considerations for ESS deployment. 
(WHITE PAPER)

Keeping Networks safe from Social Networking by BlueCoat

November 2011 - (Free Research)
Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking. 
(EGUIDE) READ ABSTRACT |

Social Recruiting Guide: How to Effectively Use Social Networks and Avoid Legal Risks by Oracle Corporation

July 2012 - (Free Research)
Social networking sites are some of the most powerful tools available to recruiters today. If you're not sure where to start with a social recruiting strategy, this paper will outline why social recruiting is becoming an imperative for companies today, what considerations you need to be aware of, and what first steps you can take. 
(WHITE PAPER) READ ABSTRACT |

Social Networking malware: The dangers facing SMBs by GFI Software

November 2011 - (Free Research)
View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more. 
(WHITE PAPER) READ ABSTRACT |

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk by Websense, Inc.

July 2011 - (Free Research)
Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security. 
(WHITE PAPER) READ ABSTRACT |

Mobile Social Networking and the Next Generation of Handheld Devices by BlackBerry

February 2009 - (Free Research)
This paper explains how social networking and the next generation of handheld devices will improve business decision-making through efficient, unified communications and location awareness. 
(WHITE PAPER) READ ABSTRACT |

Balancing Social Networking with Network Security Objectives by BlueCoat

March 2011 - (Free Research)
Social networking has achieved a level of popularity that requires reasonable access at work, but it is also sufficiently mature to bring value to many businesses. But safe social networking requires an aggressive and layered security strategy at the web gateway, as well as the definition of new usage policies and priorities from management and IT. 
(WHITE PAPER) READ ABSTRACT |

Oracle Social Network by Oracle Corporation

January 2014 - (Free Research)
Access the following white paper to uncover how you can collect the social networking data you need to stay competitive in today's market. Discover a solution to the collaboration gap that is both efficient, and allows you and your organization to make the right customer-centric decisions to drive innovation and success. 
(WHITE PAPER) READ ABSTRACT |

Advanced Identity Tracking for Social Networking Sites by Hewlett-Packard Company

May 2012 - (Free Research)
This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Podcast - Emerging Media Series: Online Video, Social Networks and Wikis by KnowledgeStorm, Inc (E-mail this company)

November 2006 - (Free Research)
This podcast, the third in a series of studies examining the impact that emerging online media have on B2B technology marketing, shows how three mainstays of the Web 2.0 culture are evolving into B2B information delivery tools: Online video, Social networks and Wikis. 
(PODCAST) READ ABSTRACT |

Emerging Media Series: Online Video, Social Networks and Wikis by KnowledgeStorm, Inc (E-mail this company)

November 2006 - (Free Research)
This report, the third in a series of studies examining the impact that emerging online media have on B2B technology marketing, shows how three mainstays of the Web 2.0 culture are evolving into B2B information delivery tools: Online video, Social networks and Wikis. 
(ANALYST REPORT) READ ABSTRACT |

Solution Brief: The Top Four Business Risks of Social Media by BlueCoat

September 2011 - (Free Research)
Social networks are changing the way people interact, communicate, form opinions, and purchase. And businesses must support social media to drive their business. However, this medium can also pose new security risks. View now to explore the top four risks of social networking and discover various ways to protect against and mitigate these risks. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Social Tools Need UC Integration to Thrive by SearchSecurity.com

April 2013 - (Free Research)
This expert E-Guide from SearchUnifiedCommunications.com explores why enterprise social networking tools need to be integrated with your everyday unified communications (UC) tools to be successful and unveils the benefits such an effort can provide. 
(EGUIDE) READ ABSTRACT |

Readying your Portals for Social Business by IBM

August 2011 - (Free Research)
Social networking, high-speed mobility and smarter devices are changing the way we do business. Read this paper now to learn how you can create value for your business through building robust social and real-time collaboration capabilities into portals. 
(WHITE PAPER) READ ABSTRACT |

CW Buyer's Guide: Customer Relations (CRM) by ComputerWeekly.com

October 2011 - (Free Research)
This nine-page Buyer's Guide to Customer Relationsip Management (CRM) analyses the factors CIOs and senior IT professionals will need to consider as they plan their CRM strategies. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts