ComputerWeekly.com Research Library

Powered by Bitpipe.com

Social Networking Research

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    Sponsored by: ESET

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • Presentation Transcript: Challenges of Securing a Smarter Planet

    Sponsored by: IBM

    In this presentation transcript of the webcast “Challenges of Securing a Smarter Planet,” IBM Rational's Worldwide Security Executive, Jack Danahy, discusses the changing security landscape and offers guidance to teams looking for the right place to start, and missteps to avoid.

  • Top 10 Tips to Keep Your Small Business Safe

    Sponsored by: Trend Micro, Inc.

    Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.

  • Your Small Business Security Questions Answered: SocialNetworks, SensitiveData, Business Banking

    Sponsored by: AVG Technologies USA, Inc.

    This white paper answers your most critical small business security questions. Social networks, sensitive data, and business banking are all topics covered in this security guide. Read this paper now to learn more.

  • E-Book: Next Steps and Trends in Enterprise Content Management Technology

    Sponsored by: SpringCM

    ECM is a long-established market, but ECM technology is changing, evolving and taking on increased importance to organizations as they look to gain more value and insight from documents, emails, blogs etc. Through this e-book you will obtain an expert overview of ECM and an in-depth look at where this market is headed.

  • Threat Containment for Facebook

    Sponsored by: BlueCoat

    This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.

  • E-Book: Leveraging Web 2.0 and Social Media in CRM Programs

    Sponsored by: SAP America, Inc.

    You’ve heard the buzz about Web 2.0 and social CRM, but where to start? In this eBook, find out more about Web 2.0 and social media in the context of CRM. Learn more about using Web 2.0 to build customer loyalty and get expert insight into the role that social CRM may play in the future.

  • E-Book: Leveraging CRM to Increase Sales Effectiveness in a Challenging Economy

    Sponsored by: SugarCRM

    This e-book will explore the methods for optimizing sales efforts and working smarter to meet business needs in today’s economy. Continue reading to learn methodologies for increasing sales effectiveness and making this year a successful one for your organization.

  • Your September Issue of Information Security Magazine– Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.

  • IT Connects Customers to Brands

    Sponsored by: Cisco Systems, Inc.

    Paul Gillin, author of three social media marketing books, reveals how CIOs are becoming the designated guardians of intellectual property. As the use of social media tools grows, Gillen recommends how a CIO can stay in front of the widespread access and create enhanced customer experiences.

  • The Impact of Business Analytics on Performance and Profitability

    Sponsored by: SAS

    Let it be stated plainly: Business analytics are the key to achieving these challenging objectives. Our world generated more data in 2009 than in the previous recorded history of mankind. A good deal of this data can be converted into useful information and competitive advantage – by applying the right analytics.

  • The Application Usage and Risk Report

    Sponsored by: Palo Alto Networks

    The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.

  • Web 2.0 @ Work: How CIOs Can Help Drive Business Returns by Improving Organizational Effectiveness

    Sponsored by: IBM

    Without access to historical information, organizations today would be severely limited in their ability to make informed, appropriate decisions regarding even the most basic aspects of their business. This whitepaper outlines the four keys to success and discusses the ROI of Web 2.0.

  • eBook: Building a Business Case for Social CRM and Customer Communities

    Sponsored by: Sirius Computer Solutions

    Learn how to build a business case for social media outlets affecting customer relations and customer communities including Facebook and Twitter, as well as what social media means for CRM, best practices for managing online customer communities, and expert advice on implementing social media programs successfully.

  • BlackBerry® Client for IBM® Lotus® Connections or BlackBerry® Client for IBM® Lotus® Quickr™

    Sponsored by: BlackBerry

    Help mobile workers access the information and expertise needed to remain productive while on the go. 

  • Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking

    Sponsored by: AVG Technologies USA, Inc.

    This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more.

  • Top Tips to Securing your Business Reputation

    Sponsored by: AVG Technologies USA, Inc.

    Reputation is everything in the world of a small business. It often takes years to establish a good reputation, but unfortunately it can take far less time lose one. Read this paper to learn tips that will help you keep your reputation secure.

  • Zynga Grows to #1 Social Gaming Site with RightScale

    Sponsored by: RightScale

    With the skyrocketing popularity of Zynga games such as FarmVille – which is now the largest single application on Facebook – Zynga’s technology strategy has to be as savvy as its business model. Find out why Zynga now relies on cloud services to manage its precipitous growth, maintain high availability, and keep costs in check.

  • Expanding Information Access Initiatives with Embedded Enterprise Search

    Sponsored by: Vivisimo, Inc.

    This paper focuses specifically on what application developers—specifically, ISVs and solution integrators—need to do in order to satiate this emerging market demand. Read on to learn some of Vivisimo's capabilities and how ISVs and solution integrators can leverage them to address evolving search challenges within their respective applications.

  • Using Social Search to Drive Innovation through Collaboration

    Sponsored by: Vivisimo, Inc.

    This paper, will try to help you strike a balance between solid business thinking and explosive enthusiasm for any new technology option with 2.0 in the description. Our goal is to give you a new way of looking at old challenges.

  • Leveraging Social Media to Drive Retail Sales and Enhance Customer Experience

    Sponsored by: Wipro

    Read this article for an examination of three considerations for social media: social media driving revenue, customer experience and tracking and using social media measurement tools.

  • SUN SYSTEMS FOR ENTERPRISE 2.0 WITH ORACLE

    Sponsored by: Sun Microsystems, Inc.

    Enterprises today are seeking new communication technologies, such as wikis, blogs, and forums, to improve communication and collaboration and increase employee productivity.

  • Preparing for the 2.0 World: How Enterprises Need to Think About Emergent Social Technologies

    Sponsored by: Sun Microsystems, Inc.

    Social technologies, commonly called Web 2.0, were originally used to describe consumer technologies that enable groups to organize and share information and media. But enterprises quickly caught on to the value of these easy-to-use tools for capturing and sharing ad hoc information that may otherwise not be documented.

  • SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions

    Sponsored by: TechTarget Search Windows Server

    Having some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing.

  • Microsoft Office SharePoint Server 2007

    Sponsored by: Microsoft

    Microsoft® Office SharePoint® Server 2007 is an integrated suite of server capabilities that can help improve organizational effectiveness by providing comprehensive content management and enterprise search, accelerating shared business processes, and facilitating information sharing across boundaries for better business insight.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.