Successful Social Networking SitesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Successful Social Networking Sites returned the following results.
RSS What is RSS?
Related Categories

 •   Social Networks and Community Management
 •   Collaborative Tools
 •   Data Security
 •   Enterprise Content Management (ECM)
 •   Customer Relationship Management (CRM)
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Customer Experience Management (CEM)
 •   Application Security
 •   Security Policies

Related Searches
 •   Conversion Successful
 •   Problem Successful
 •   Seminars Successful Social Networking
 •   Successful Guides
 •   Successful Information
 •   Successful Sheets
 •   Successful Social Networking Alaska
 •   Successful Social System
 •   Tutorial Successful Social Networking
 •   View Successful
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 18, 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

Social media analytics software going through growing pains by IBM

November 30, 2011 - (Free Research)
In this e-guide, you’ll find expert advice, news and best-practice tips to help you decide if social media analytics is right for your business. You’ll also learn about the maturity level of social media analytics software and the skills and cultural attributes that companies need to have for a successful social media analytics project. 
(EGUIDE) READ ABSTRACT |

McAfee Security Journal by McAfee, Inc.

December 2008 - (Free Research)
This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception. 
(WHITE PAPER) READ ABSTRACT |

Securing the Borderless Enterprise by Websense, Inc.

February 2010 - (Free Research)
A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Using Social Media to Win Over Customers by SearchCRM

March 2013 - (Free Research)
While many businesses are eager to join their customers at the social media party, doing so without the proper internal processes in place could spell disaster. In this brief expert e-book, you can learn how to create a successful social CRM initiative (and valuable customer relations) through implementing the right processes and technologies. 
(EBOOK) READ ABSTRACT |

Social Analytics & Intelligence: Getting to Actionable Insights by IBM

January 2014 - (Free Research)
Join Principal Analyst, Leslie Ament, in this on-demand webcast to gain a firsthand look at how to successfully manage social data. Uncover use cases of successful social intelligence and analytics, how to collaborate across multiple channels, and more. 
(WEBCAST) READ ABSTRACT |

The Eight Truths of Social Learning. Now. by SkillSoft Corporation

June 2011 - (Free Research)
This paper seeks to uncover the fundamental requirements for a successful social learning program. Based on early experience with our own social learning tool, this list of eight “truths” has been compiled to provide a foundation for learning professionals who are launching social learning in their organizations. 
(WHITE PAPER) READ ABSTRACT |

CIO Decisions Ezine Volume 5: Virtual Revolution by CIO Decisions

February 2009 - (Free Research)
Read this new volume of the CIO Decisions Midmarket Ezine to learn how server virtualization can save time, space and - perhaps most important - money. Experts and IT executives offer their insights and experience on the technology that's changing the data center. 
(EZINE)

A Framework for 2.0 Adoption in the Enterprise by NewsGator

May 2010 - (Free Research)
This report draws from the knowledge of full‐time practitioners who orchestrate enterprise‐wide rollouts in their organizations. We outline patterns of adoption and highlight practical insight that will help your company and your clients plan for the process and help set realistic expectations for a successful 2.0 rollout. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Collaboration Strategy: Tips for Success and Best Practices for Making the Business Case by Jive Software

March 2014 - (Free Research)
Access the following expert e-guide to join Dawn Lacallade, the director of social strategy and content programming at LiveWorld in San Jose, Calif., to explore the top 10 tips for enabling a successful enterprise collaboration strategy. 
(EGUIDE) READ ABSTRACT |

Email Marketing Goes Social by Silverpop Systems Inc.

November 2008 - (Free Research)
Read this paper to get tips about how to best implement a successful social email marketing campaign. 
(WHITE PAPER) READ ABSTRACT |

Web 2.0 Engaging Customer Passion by SDL Web Content Management Solutions Division

July 2010 - (Free Research)
This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy, marketing tactics and communication plan to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves. 
(WHITE PAPER) READ ABSTRACT |

SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions by SearchWinIT

October 2009 - (Free Research)
Having some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing. 
(EZINE) READ ABSTRACT |

The Social Sales Revolution by Salesforce.com

February 2012 - (Free Research)
This e-book examines how some of today’s most successful reps approach social sales. Among others, you’ll meet a wine salesman with almost a million Twitter followers, a global manufacturer who is taking orders on Facebook, and a storage saleswoman who used Twitter and other tools to exceed her quota by 200%. 
(EBOOK) READ ABSTRACT |

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk by Websense, Inc.

July 2011 - (Free Research)
Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security. 
(WHITE PAPER) READ ABSTRACT |

Three Must-Have’s to Securing the Social Web by Websense, Inc.

July 2011 - (Free Research)
Social Web has emerged as a valuable business tool for innovative organizations to engage with customers and stay competitive. But among the popularity comes great risk, as these networks can be targets for cybercriminals. View this paper to explore the 3 crucial measures to take in order to provide safe and productive use of this great resource. 
(WHITE PAPER) READ ABSTRACT |

Why Bringing Social to your Marketing Team is a Non-Negotiable by Jive Software

July 2013 - (Free Research)
Access this valuable resource to learn how improving cross-functional collaboration is the new marketing mandate, and social business is the enabler, allowing marketing teams to drive more leads, increase sales and cut operational costs. 
(WHITE PAPER) READ ABSTRACT |

WebSense Security Lab: Zero-Day in Critical Vulnerability by Websense, Inc.

September 2009 - (Free Research)
The Websense Security Labs Team provides a review of recent threats in this presentation transcript. Learn more about techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: 'Social Email' Drives 4th Generation Collaboration Solutions by Mainsoft Corporation

February 2011 - (Free Research)
How do we overcome the enterprise 2.0 adoption gap and get people to use document collaboration tools, social networks, and more? And, what can we do today to realize the so-called 4th generation workspace, especially when we have a mixed IT environment? Read this presentation transcript with the two leading experts on collaboration to find out. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security Predictions for 2012 by Websense, Inc.

November 2011 - (Free Research)
With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on Collaboration Threat Vectors by Websense, Inc.

October 2011 - (Free Research)
Techtarget's Security Media Group presents a comprehensive guide to securing collaboration technologies. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice communications via VoIP or Skype. 
(EBOOK)

Advanced Identity Tracking for Social Networking Sites by Hewlett-Packard Company

May 2012 - (Free Research)
This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Bringing the Power of Web 2.0 to the Enterprise by OpenText Corporation

May 2008 - (Free Research)
The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both. 
(WHITE PAPER) READ ABSTRACT |

Enabling Enterprise 2.0 by Websense, Inc.

August 2009 - (Free Research)
Read this whitepaper to learn ways that organizations can create a strategy that embraces Web 2.0 technologies securely and enables a successful transition to Enterprise 2.0. 
(WHITE PAPER) READ ABSTRACT |

Media Mobility Delivering Ultimate Video Experiences by Motorola, Inc.

December 2008 - (Free Research)
Media Mobility promises a sophisticated user experience that will enable operators to dramatically increase their multi-play service bundles that integrate voice, data and video offerings. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts