- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
- 5 Strategies for Modern Data Protection
- Game Changer: Unlocking Employee Access to Information
- 7 Security Gaps in the Neglected 90% of Your Application
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk
October 2008- The paper discusses how Enterprise 2.0 has evolved from Web 2.0, providing examples of how social Web patterns and services can be used within companies to empower employees and ultimately improve efficiency. The case studies covered in this White Paper include premium drinks provider Diageo plc, Woolworths plc, global advertising agency Lowe and Partners Worldwide and Siminn (Iceland Telecom), all of which moved away from paper or email based processes and implemented web based applications where employees ...
October 2008- By embracing the power of social networks and collaboration tools, insurance companies are seeing a boost in customer loyalty and service levels. Discover five best practices for realizing the maximum benefit of these new tools. These new channels represent a new form of communication that, at first glance, would appear to be difficult to influence, much less control. However, as these social mediums have matured, the most progressive brand stewards have recognized that embracing social ...
When it comes to communications and collaboration, the IT industry, in large part, is taking its cue from
consumers. And Cisco® IT is no exception. Consumers who have been using Web 2.0 tools such as instant
messaging and discussion forums in the home for years are now the employees exerting significant influence in
what collaboration technologies should be adopted in the workplace.
The business drivers of collaboration are persuasive: productivity gains, real-time knowledge capture ...
April 2008- This white paper proposes 10 best practices to design, launch, measure, and manage viral marketing campaigns. The emphasis is put on a tool that can automate the process and use Social Networking Analysis (SNA) to identify key players in a social network willing and capable of spreading the word around.
Clupedia allows users to generate and retrieve clues from crowds. What are clues?
- Clues are opinions about anything - not just about products.
- Clues can be ratings, reviews, pros, cons, recommendations to consumers, and suggestions to manufacturers - not just reviews or just ratings.
- Clues can be expressed in audio or even video - not just text.
- Clues can be created in Clupedia or aggregated from other ...
April 2008- Clupedia allows users to generate and retrieve clues from crowds. Clues are opinions about anything - not just about products. Clues can be ratings, reviews, pros, cons, recommendations to consumers, and suggestions to manufacturers - not just reviews or just ratings. Clues can be expressed in audio or even video - not just text. Clues can be created in Clupedia or aggregated from other websites, reviews sites, e-commerce sites, and RSS feeds - not just ...
December 2007- Companies often approach the problem of getting the right information to and from the right people at the right time without thoroughly considering the entirety of what needs to be communicated or how it should be delivered. As related to internal and external Web technologies, resolving this problem requires the delivery of timely, relevant, and compelling information through Web content management solutions, the targeting of information to specific content consumers through portal applications, and the ...
January 2008- The Indianapolis Colts football team needed to engage and interact with fans over the Internet, and to use that relationship to drive incremental revenue. However, the teams old Web site wasnt up to the task. The Colts then used Microsoft software to build a comprehensive social networking site, through which the team is providing a fast, reliable, and engaging fan experience. The team also has the capabilities needed to profit from its Web ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services