ebook

Results 151 - 175 of 1720Sort Results By: Published Date | Title | Company Name
Published By: Brainshark     Published Date: Aug 02, 2017
Coaching is a top priority for sales organizations – but most managers tasked with coaching admit they’re not sure how to develop or maintain an effective coaching program. Whether you’re starting a coaching initiative or making modifications to one, you won’t get far without the right buy-in, processes and resources. This exclusive eBook offers 11 must-haves for effective sales coaching. Inside you’ll find: • How to develop a comprehensive coaching plan • The difference between coaching and training (and why you need both) • Tips to make your current coaching program more effective Ready to see better coaching results? Download your free copy today. Download your free copy and start enabling your sales managers to reach their maximum coaching potential.
Tags : 
sales, sales coaching, coaching initiative, sales sucess
    
Brainshark
Published By: Brandwatch     Published Date: Jun 17, 2013
To demonstrate its prowess as an insight-driven agency, Waggener Edstrom used Brandwatch to monitor and analyze the social “buzz” around the 2012 London Olympic Games—and turned social conversations into meaningful insights for its client brands.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputatino monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch
Published By: Brandwatch     Published Date: Jun 17, 2013
An introduction to using social media in business, this eBook discusses the importance of setting social media goals and how to foster a positive brand experience, along with tips to become a thriving social enterprise.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputatino monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch
Published By: Brandwatch     Published Date: Jun 20, 2013
For Sky News Arabia, using social media monitoring & analytics to “sense-and-respond” to viewers is a critical component to increasing viewer-to-viewer engagement and gaining extended market reach in an established market.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputation monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch
Published By: Brandwatch     Published Date: Jun 20, 2013
In this report, we examined the online conversations around Fashion Week in New York, London, Paris and Milan to find out exactly what makes fashion enthusiasts and buyers tick—and reveal trends and insights to help make fashion brands smarter.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputation monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch
Published By: Breakout Solutions     Published Date: Sep 24, 2008
Breakout Solutions is pioneering the way in which organizations utilize Social Media to meet their online promotional objectives. Our proprietary video contest platform provides a turnkey solution for organizations that value interacting and communicating directly with their target market through social media. Web 2.0, has led to a more interactive and social landscape where content is no longer king, conversation is. Breakout Solutions can help your brand become a part of these conversations so that you have a better understanding of how others view your brand and utilize your products and services.
Tags : 
breakout solutions, promotional contest, branded promotion, videos, photos, audio, myspace, facebook, youtube, social networks, social media, web 2.0
    
Breakout Solutions
Published By: Bridgeline Digital     Published Date: Jan 25, 2013
Marketers everywhere should be considering how to revamp their digital marketing strategy to cope with the mobile takeover. Download our latest eBook and explor the advantages of taking your web presence into the mobile era.
Tags : 
web design, marketing strategy, mobile marketing, web strategy
    
Bridgeline Digital
Published By: Bridgeline Digital     Published Date: Oct 28, 2013
This eBook is for designers that are tired of creating the same bland emails, the content marketers who find themselves at a loss while coming up with the right words in their subject line, and, most of all, for the frustrated marketing teams that are sick of wondering why their campaigns fail to produce desired results.
Tags : 
email marketing, email marketing campaign, email marketing strategies, content marketing, maximizing customer engagement, email design, autoresponders, automated emails
    
Bridgeline Digital
Published By: Bright Horizons     Published Date: Jun 23, 2017
Big changes are coming to the healthcare industry. Nurses and doctors are retiring at a record pace, just as more women than ever are entering medical school. The shift will result in hospital workforces that will be younger and predominantly female, resulting in greater risk for conflicts between work and families. Download our eBook to learn how dependent care programs help top healthcare providers around the country avoid costly absences and support critical talent goals.
Tags : 
healthcare recruiting, retention, doctors, nurses, clinicians, dependent care, back-up care, child care
    
Bright Horizons
Published By: Bright Horizons     Published Date: Jul 24, 2017
A prefect storm is brewing for employees in the “Sandwich Generation.” It’s a critical juncture: child care needs colliding with elder care demands right when employees are in key professional roles – and so exceptionally valuable to employers. Download our eBook to learn how to reduce absenteeism and improve productivity for employees managing their careers and care for both their children and aging parents.
Tags : 
elder care, child care, employee retention, dependent care, back-up care, sandwich generation, work-life, absenteeism, presenteeism
    
Bright Horizons
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this whitepaper for an overview of how BrightEdge and Facebook are working together to target the "Social SEO" opportunity. This paper outlines simple and highly effective ways to address the Social SEO opportunity.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment, seo platform, seo platform software, seo software, seo success stories, seo white paper, seo white papers, seo case study, seo case studies, seo technology, seo tool, seo tools, seo tracking
    
BrightEdge
Published By: Brightidea     Published Date: Feb 05, 2016
What’s in the eBook? We all know it is critical to innovate before competitors – and the race is on to do so! This ebook should help you do just that — harness innovation at your company and build a marquis innovation program. It can be much harder than anticipated so our systematic, programmatic approach described in this ebook will help. Please download our ebook and learn about: - Six steps to improve (and establish) enterprise innovation - Success stories from Fortune 500 companies - The future of innovation, innovation programs and how you can prepare for it
Tags : 
    
Brightidea
Published By: Brightidea     Published Date: Feb 05, 2016
What’s in the eBook? Get this ebook The Secrets To A Successful Innovation Program to find insights from over 100 Brightidea customers and exceptional innovators, including heavyweights BT Group, Cisco, GE, Motorola and more, sharing responses to key questions most enterprises ask – and stats that back up the narrative, like: -Humana experiencing $6.2 million in cost savings from a single innovation challenge campaign. - More than 75% of Nielsen’s innovation challenges resulting in an idea that was implemented. - 95% of Global 500 companies saw improvement in their innovation program. Take a look by filling out the form to download the eBook – and then reach out and let us know if you’d like to be the next success story!
Tags : 
    
Brightidea
Published By: Broadsoft     Published Date: May 25, 2017
This eBook is for contact center management and business executives looking for ways to increase the efficiency and productivity of their contact center. • If yours is an existing contact center with infrastructure that has been built up over the years, this eBook provides best practice steps to break down the resulting application silos, unify them, and improve the operational efficiency of your contact center. • If yours is a new contact center and you have the opportunity to build your infrastructure from the ground up using modern technologies, this eBook will provide best practices to prevent building application silos.
Tags : 
    
Broadsoft
Published By: Bronto     Published Date: Mar 30, 2012
With consumers practically attached to mobile devices and beginning to accept marketing messages on Facebook and Twitter, marketing efforts are less about driving to a specific channel and more about having a promotional presence in all of them and keeping the person engaged throughout the customer lifecycle. The reasons for disengaging from a purchase decision are nearly infinite, and the means to disengage are just a few taps away on a smartphone.
Tags : 
bronto, marketing, emerging marketing, digital marketing, online, digital, e-commerce
    
Bronto
Published By: Bronto     Published Date: Jan 02, 2014
Attention digital marketers, we are no longer in control. Whether they realize the true strength of their powers or not, consumers now have the upper hand of the digital marketing experience. Download this e-book to explore each phase of the customer lifecycle and detail programs to reach your customers across channels, devices and levels of engagement.By downloading now, you'll gain instant access to Chapter 1, Acquiring and Welcoming New Subscribers. Then, keep an eye on your inbox for the remaining 5 chapters over the next few weeks.
Tags : 
lifecycle marketing, customer engagement, e-commerce marketing, acquiring subscribers
    
Bronto
Published By: BzzAgent     Published Date: Nov 12, 2010
If you don't think social media ROI can be measured, you need to learn the truth. Social media and word of mouth are more influential than any type of advertising, but many companies are not measuring its impact on sales. Marketers approaching social media with a direct marketing mindset and organizing their programs with the right methodology can clearly determine its impact on sales and ROI.
Tags : 
bzzagent, social media, roi, ebook, direct marketing, twitter, facebook, branding, marketing
    
BzzAgent
Published By: CA Service Assurance     Published Date: Jul 29, 2011
Many organizations are breaking down on the traditional IT silos to look at applications, infrastructure, and management as one organization working together to provide a real-time model of what is happening across the enterprise. Read this eBook from a recent IT executive panel to learn how industry experts are addressing these challenges.
Tags : 
application lifecycle, cloud, cloud computing, application management, application delivery, critical services, virtualized, virtualization.
    
CA Service Assurance
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.