Sort results by: Published date | Company name

Yammer Secures Facebook-, Twitter-Style Communication In Enterprises [ Source: TechWeb ]
December 2010- Yammer Vice President of Marketing Steve Apfelberg gives TechWeb's David Berlind a demonstration of the most recent version of Yammer at the Enterprise 2.0 Conference (2010) in Santa Clara, Calif. Yammer is an enterprise social network in the style of Facebook and Twitter.

[VIDEO]
Read Abstract | Go to Video

How To Scale Apps The Facebook Way [ Source: TechWeb ]
October 2009- Scaling applications is always a challenge. Now magnify that across a distributed network (the Internet) and add billions of data queries -- that's the challenge that Facebook has, and they discuss how they are dealing with it.

[VIDEO]
Read Abstract | Go to Video

Making Sense Of Search Positions [ Source: Ambergreen ]
June 2009- What does monitoring your Google organic search positions mean to you? Grant Whiteside, technical director of Ambergreen, looks at the new developments that mean you can now work out exactly what the value of each organic search query was worth to you.

[WHITE PAPER]
Read Abstract | Go to White Paper

Curtailing Online Distribution of Counterfeit and Gray Market Goods [ Source: MarkMonitor ]
September 2007- Counterfeiting and gray market activity are major problems for brand owners. They pose serious financial and non-financial consequences for corporations, distribution partners and customers. Although these problems have existed for centuries, they are only exacerbated by the global reach, low cost and anonymity of the Internet. This renders the online channel a vast unknown element, over which brand owners may feel they have no visibility or control. To effectively manage this “vast unknown,” brand owners ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Mindtouch: A Wiki-cum-CMS-cum-Mashup Platform, On Steroids [ Source: TechWeb ]
April 2009- Although Mindtouch CEO Aaron Fulkerson does a good job listing the major points that his company's namesake product (available as a service too) touches on in this reviewcam, it's also one of those products that's difficult to describe.

[VIDEO]
Read Abstract | Go to Video

Code-Signing Certificates: What are they? How are they used? [ Source: VeriSign ]
January 2009- Code-signing certificates can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks. Learn about the many ways in which code-signing certificates are being used.

[WHITE PAPER]
Read Abstract | Go to White Paper

Capture Market Share in a Down Economy: Invest in Your Online Customers [ Source: Tealeaf ]
March 2009-
Find out what 350 top eBusiness leaders are doing now to make their online channel not just survive, but thrive in this trying economy

Topics Include:
• Insights on eBusiness executive priorities and strategies for the online channel in 2009 and beyond
• eBusiness knowledge gaps — surprising misperceptions and blind spots that many executives have of their online customers and strategies for bridging these gaps
• Critical steps that eBusinesses are taking today to ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Communications Challenges And Web Collaboration In Organizations [ Source: Wipro Technologies ]
March 2009- Recent mergers, acquisitions, and alliances in organizations drive a stronger roadmap for a stable and sophisticated enterprisewide Web-based collaboration, in the face of various factors like short supply, demand for reduction in duplication, and inefficiency.

[WHITE PAPER]
Read Abstract | Go to White Paper

Google Insights: A Social Baraometer For The Digital Age [ Source: Ambergreen ]
March 2009- Ambergreen search guru Grant Whiteside looks at Google Insights for Search tool and how it can give you a pictorial breakdown of the social barometer.

[WHITE PAPER]
Read Abstract | Go to White Paper

IronPort 2008 Internet Malware Trends Report [ Source: IronPort Systems ]
November 2008- In 2007, Storm burst onto the scene and rapidly spread. A new form of malware that propagated using a combination of email and websites, it proved extraordinarily sophisticated. Storm and newer malware botnets that build on Storm’s strengths continue to affect and threaten Internet communication. To help explain the spread of Storm and current and future threats posed by similar malware, this report offers an examination of Storm and its history.

[WHITE PAPER]
Read Abstract | Go to White Paper