Business of Information Technology  >   Business Processes  >   Marketing  >   Online Marketing  >   Email Marketing  >  

Opt-In/Opt-Out

RSS Feed    Add to Google    Add to My Yahoo!
Opt-In/Opt-Out Reports
 
European IT Law Briefing: Taking action on misuse of social media by employees
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when taking action against employees who misuse social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

European IT Law Briefing: Monitoring employees' use of social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

European IT Law Briefing:  Practical steps for companies using social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms offer practical advice for companies using social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Consensual Fax: Strategies for Happy Customers and FCC Compliance
sponsored by FaxBack, Inc.
WHITE PAPER: Provides a brief introduction to the July 2003 updated FCC regulations regarding fax and discusses tools to help companies fax responsibly.
Posted: 18 Sep 2003 | Published: 01 May 2004

FaxBack, Inc.

Who's Driving Your Brand? Navigating Today's Confusing Customer Pathways and Arriving with Your Brand Intact
sponsored by Teradata
EBOOK: This ebook will cover how marketers can gain competitive advantage by leveraging social media and loosening the reins on your brand.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Teradata

Infographic - Power Systems: Architecture any way you choose to scale
sponsored by IBM
RESOURCE: Access this concise resource to learn more about an IBM business architecture that can help you scale to fit the needs of your business to be more efficient and more powerful.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

IBM

Network Surveillance You Can Count On
sponsored by Extreme Networks
RESOURCE: This resource explains the failings of traditional video surveillance systems and suggests an alternate solution.
Posted: 12 Feb 2015 | Published: 11 Dec 2013

Extreme Networks

The CloudHealth Platform in Action
sponsored by CloudHealth Technologies
CASE STUDY: Fiksu's AWS cloud infrastructure grew along with their customer success, leading to complexity. It needed to process huge amounts of data and use it to analyze performance, utilization and cost within the AWS infrastructure. This case study explains which combination of cloud platform and IT automation system Fiksu implemented to gain improvements.
Posted: 10 Feb 2015 | Published: 06 Nov 2014

CloudHealth Technologies

Blueworks Live Demo Series Part 3: Analyzing Business Processes
sponsored by IBM
VIDEO: The following videocast is the third installment of 4 brief videos dedicated to demonstrating and providing a step by step guide on how businesses can use IBM Blueworks Live to help engage users to actively participate in business process improvement. This video covers analyzing business processes.
Posted: 03 Feb 2015 | Premiered: 03 Feb 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement