business internet

Results 176 - 200 of 260Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 13, 2014
Learn how your business can improve its customer service by providing a seamless multichannel experience across all channels.
Tags : 
ibm, ibm enterprise marketing management, emm, ebusiness, ecommerce, customer, customer experience, customer behavior, marketing, online, offline, integraton, channel, multichannel, internet marketing, customer experience/engagement, mobile marketing, social media marketing, branding
    
IBM
Published By: IBM     Published Date: Mar 13, 2014
Learn how your e-business can improve its overall online customer experience by understanding why customers behave the way they do.
Tags : 
ibm, ibm enterprise marketing management, emm, ebusiness, ecommerce, internet marketing, online marketing, customer experience, customer behavior, intent, customer experience optimization, website development, social media, e-commerce
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
Public cloud services and mobility are driving business needs where the Internet and MPLS play an equally important role for enterprise connectivity. Network planners must establish a unified WAN with strong integration between these two networks to avoid application performance problems.
Tags : 
cisco, cloud computing, public cloud, cloud services, enterprise, connectivity, application performance
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm.
Tags : 
cisco, akaamai, customer experience, digital customer experience, enterprise, wan, integrated solutions, optimization
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
Public cloud services and mobility are driving business needs where the Internet and MPLS play an equally important role for enterprise connectivity. Network planners must establish a unified WAN with strong integration between these two networks to avoid application performance problems.
Tags : 
applications, systems integration, cloud, platform, wan
    
Cisco
Published By: Dyn     Published Date: Oct 16, 2014
Web presence is now a required option for customers accessing a business’s products and services. But more than just an option, web pages have become the face of most companies to the public. Learn how can you take control of the Internet effect on your company’s web presence through Internet monitoring, analysis and planning.
Tags : 
dyn, internet visibility, web infrastructure, web presense, customer service, online business, internet performance, business technology
    
Dyn
Published By: Internap     Published Date: Dec 02, 2014
As organizations aim to increase business agility and streamline costs, demand for public cloud services continues to grow exponentially, with Gartner predicting it will become the majority of new IT spending by 2016. This evolving application ecosystem with its intensive performance demands is placing new pressures on traditional public cloud services. Amid this shift, Internap surveyed nearly 250 Internet infrastructure decision makers to gain insight into cloud adoption, requirements and challenges – including the differences in feedback between the cloud-wise, those using cloud services, and the cloud-wary, those with no near-term plans to use cloud services. The details of these findings are reflected in this Cloud Landscape Report.
Tags : 
internap, cloud landscape, application ecosystem, cloud adoption, cloud, internet infrastructure, it management, data center
    
Internap
Published By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: IBM     Published Date: Oct 07, 2014
A comprehensive study by Solitaire Interglobal Ltd. (SIL) on the business impact of security incursions in today's IT environment. This ground-breaking research, based on 64,200 client data points explores how the vulnerabilities in today's virtualized, internet-connected, cloud-oriented environment can affect your businesses.
Tags : 
ibm, security, cloud, cloud security, solitaire interglobal, it environment, cloud environment, security incursions, vulnerabilities, it management
    
IBM
Published By: ComCorp     Published Date: Oct 08, 2009
In earlier years, most companies didn't know the first thing about search engine marketing, and as a result, almost all of them outsourced their Internet marketing campaigns to dedicated firms. However, as search engine marketing has grown in prominence in the business community -- and more information about search engine marketing has become available online -- more people have become knowledgeable about the basic SEM principles and strategies, and more companies are attempting to run their own Internet marketing campaigns in-house.
Tags : 
seo, search engine, sem, search marketing, search engine marketing, meta, meta tags, natural search, keywords, traffic generation, site traffic, web traffic, comcorp
    
ComCorp
Published By: Business.com     Published Date: Oct 09, 2012
Social media has come very far in the last few years, and one of the best ways for a business to interact with customers is now over the internet.
Tags : 
web design, business, web site, e-commerce, designer
    
Business.com
Published By: Symantec     Published Date: Jan 10, 2013
This paper explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers. It begins with Secure Sockets Layer (SSL) encryption that address problems.
Tags : 
security and trust of doing business, business, trust, consumer confidence, consumer trust, it management, business technology
    
Symantec
Published By: IBM     Published Date: Nov 22, 2013
Learn how your e-business can improve its overall online customer experience by understanding why customers behave the way they do.
Tags : 
ibm, ibm enterprise marketing management, emm, ebusiness, ecommerce, internet marketing, online marketing, customer experience, customer behavior, intent, customer experience optimization
    
IBM
Published By: Netviewer     Published Date: Jul 10, 2009
Business travel is coming under closer scrutiny: In Germany alone, companies spend approximately 50 billion euros on business travel every year. To partially offset this expense, many companies are replacing business trips with online meetings. With this technology, customers and partners are able to communicate with images and audio over the Internet, while special presentation functions reinforce the personal aspects of a meeting. Software licenses, Webcams, and headsets are worth the investments. Companies that use Web meetings discover new methods of collaboration and reduce their own output of greenhouse gases.
Tags : 
netviewer, vdr, german travel management, online meetings, roi, business travel, greener, webcams
    
Netviewer
Published By: Focus VoIP     Published Date: Aug 04, 2011
Learn how to put the power of hosted VoIP to work for your SMB. Download our FREE SMB Phone Systems Comparison Guide today.
Tags : 
focus voip, smb, small medium business, phone systems comparison guide, voice over internet protocol
    
Focus VoIP
Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality, it management, knowledge management, data management
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 03, 2015
You just got news of yet another issue that just happened in your business that now you need to deal with – it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. Especially in cases of data theft, fraud, embezzlement, etc., having detail on everything the employee did leading up to the purported “bad deed” will be critical in determining whether something improper occurred or not.
Tags : 
sexual harrassment, embezzlement, employee investigations
    
SpectorSoft
Published By: Cisco     Published Date: Jan 15, 2015
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. The Cisco Virtual Networking Index™ (Cisco VNI™) predicts that over 50 billion devices will be connected over these networks by 2020. The network effects of the Internet of Things, LTE mobility, and mobile video are just beginning to be understood. In a world where mobile device network additions are growing four times faster than the population, and machine-to-machine (M2M) device network additions are growing five times faster than mobile device additions, this problem is clearly becoming highly important and requires a good solution.
Tags : 
cloud, growth, traffic, projection, account, network, it management
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm. Businesses that embraced the Internet in its early days gained a significant advantage over their competitors; those that did not became irrelevant very quickly.
Tags : 
digital experience, internet, perfect storm, transformative effects, technology, computers, revolution, browsers, broadband, it management
    
Cisco
Published By: Riverbed     Published Date: Apr 20, 2015
Applications are the life of any enterprise and key enablers of workforce productivity and business agility. But, the application landscape is changing rapidly - the number and type of applications is increasing, the move to cloud and SaaS for application delivery is growing, bandwidth costs are decreasing and the reliability of the Internet has improved. Inevitably, there are also changes in network and infrastructure topologies. The hybrid enterprise has become a reality. The hybrid enterprise has become a standard.
Tags : 
riverbed, qualcomm, applications, workforce
    
Riverbed
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: MessageLabs     Published Date: Jul 16, 2009
What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of computers and the interconnections of the network against innocent businesses to make money. Learn more today!
Tags : 
messagelabs, email security, web security, virus, spam, spyware, phishing
    
MessageLabs
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
    
MessageLabs Ltd.
Published By: Symantec     Published Date: Apr 02, 2015
The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers’ sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.
Tags : 
security solution, ssl, e-commerce environments, malicious activity, safeguard information, ssl-based security
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.