CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

social email

Results 1 - 25 of 90Sort Results By: Published Date | Title | Company Name
Published By: Silverpop     Published Date: Sep 19, 2011
To gain a better understanding of how today's marketers are using-and plan to use-various mocial mediums to communicate with customers, Silverpop polled more than 500 online marketers regarding their use of social, email, mobile and local forms of communication.
Tags : 
silverpop, marketing, customer communication, social media
    
Silverpop
Published By: Vocus     Published Date: Mar 13, 2013
With this guide, you'll learn which specific metrics you should be measuring in Search, Social, Email, and Publicity.
Tags : 
vocus, search, social, email, publicity, 2013 marketing success, marketing strategy
    
Vocus
Published By: Silverpop     Published Date: Jun 15, 2012
If your contact base doesn't continue to grow, how can you expect your business to grow? Learn how you can help expand your company's marketing database with ideas for collecting data on-site, tapping social media, driving opt-ins via transactional emails and more.
Tags : 
marketing database, silverpop, marketing, marketing campaigns, reach, customers, sales
    
Silverpop
Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
Published By: StrongMail     Published Date: Mar 15, 2010
Email marketing is continually evolving with the introduction of new technologies, regulations and consumer behavior. As an email marketer, you're charged with keeping track of these changes and making the appropriate adjustments to maximize the ROI of your email programs.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking
    
StrongMail
Published By: Social Text     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : 
social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging
    
Social Text
Published By: Social Text.     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : 
social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging
    
Social Text.
Published By: Social Text     Published Date: Jul 21, 2009
Read this paper to learn 5 biggest blunders people tend to make when choosing a collaboration solution, and how to avoid them.
Tags : 
blunders, social text, collaboration solution, collaboration, tco, total cost of ownership, social networking, blogs
    
Social Text
Published By: Social Text.     Published Date: Jul 21, 2009
Read this paper to learn 5 biggest blunders people tend to make when choosing a collaboration solution, and how to avoid them.
Tags : 
blunders, social text, collaboration solution, collaboration, tco, total cost of ownership, social networking, blogs
    
Social Text.
Published By: Cision     Published Date: May 02, 2016
Social. Emails. Blogs. Brands have more ways than ever to reach customers, yet your brand, your competitors, mom-and-pop shops and Fortune 500s fiercely compete for media coverage. What gives?
Tags : 
cision, media coverage, public relations, brands, emerging marketing, marketing research, traditional marketing
    
Cision
Published By: Cision     Published Date: Jul 08, 2016
Social. Emails. Blogs. Brands have more ways than ever to reach customers, yet your brand, your competitors, mom-and-pop shops and Fortune 500s fiercely compete for media coverage. What gives?
Tags : 
cision, media coverage, public relations, brands, emerging marketing, social media, internet marketing, marketing research
    
Cision
Published By: Adobe     Published Date: Oct 22, 2014
Sometimes email is the forgotten marketing channel. It’s not as new or topical as social or mobile, but it’s as reliable and profitable as ever. A study from the Direct Marketing Association says that email provides a $39.40 return on every dollar invested into it. We’ve produced a marketer’s guide that discusses the next frontier of email marketing. Learn the advantages of triggered and retargeted emails, and get real-world insights into smart email marketing from C Spire Wireless and others.
Tags : 
marketing channels, marketing guide, triggered emails, re-targeted emails, emerging marketing, internet marketing, marketing research
    
Adobe
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection
    
Sophos
Published By: Act-On     Published Date: Jan 08, 2015
It’s all about the leads. It’s true. B2B marketers spend their day focused on generating enough of them to fill their sales funnel. But that’s not always an easy task. So how do today’s marketers fill the funnel? They use content marketing. Learn essential ways to use content to generate top-of-funnel leads.
Tags : 
act-on, content marketing, social media marketing, email marketing, search marketing, generate leads, ebook, online marketing
    
Act-On
Published By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
By exploiting popular places on the Internet, such as search engines, social networking and email, malnets have become very adept at infecting many users with little added investment.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: G/O Digital     Published Date: Nov 13, 2014
Marketing to customers is not as simple as it was 20 years ago. Retailers can no longer rely solely on commercials, catalogs, and newspaper ads to get customers to notice, and buy, their products. Today’s typical customers now follow a much more complicated path to their purchase using search engines, social media, and online reviews. Download this whitepaper to learn today’s retail marketing trends.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
    
G/O Digital
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
    
Mimecast
Published By: Oracle     Published Date: Sep 30, 2019
Email deliverability and privacy matters now more than ever. New and existing laws up the stakes for companies that don’t comply with standards and regulations. And today’s email marketers find it increasingly difficult to be heard. You need to master deliverability and privacy to tackle the noise generated by social media, other email marketers, and even word-of-mouth marketing. Your reputation as an email sender impacts your potential reach as a marketer. Here are some factors that can earn you a poor deliverability score and prevent emails from reaching your desired target: f Lack of adherence to an email privacy policy f Poor list management f Frequency and relevancy of sends f Complaints from recipients f Number of blocks f Spam trap hits f How people are engaging Getting your message delivered is vital to revenue performance. A slight increase at the top of the funnel can make a huge difference to your bottom line.
Tags : 
    
Oracle
Published By: Teradata     Published Date: Feb 04, 2015
The Enterprise Priorities in Digital Marketing report, produced by Econsultancy in partnership with Teradata, provides guidance for the future through specific benchmarks from digital marketing leaders at enterprise organizations. The report focuses on the technology priorities of the world's largest companies, the strategies they support and the marketing budgets with which they're aligned. The report is based on an international survey of 402 senior marketers (director and above) from global enterprises. Respondents were from companies with more than $500 million in revenue, with 56% having revenues over $3 billion.
Tags : 
teradata, marketing, strategic direction, attribution, cloud, application, audience, management
    
Teradata
Published By: Knowledge Marketing     Published Date: Sep 27, 2010
How to successfully integrate existing social media campaigns with email marketing strategies
Tags : 
integration, email, social media, email marketing, campaign, campaign management
    
Knowledge Marketing
Published By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking
    
StrongMail
Published By: Iterable     Published Date: Sep 07, 2018
Email marketing continues to be the best digital channel for ROI, so delivering dynamic, personalized messaging to the inboxes of your customers is of the utmost importance. In fact, for 77 percent of consumers, email is the preferred messaging channel, dwarfing demand for SMS, push notifications and social media communications. When you are determining the right email marketing strategy for your business, it’s natural to wonder how the industry leaders are conducting their campaigns. A¬er all, if they’re on top, then they must be doing everything right...right? To glean best practices, we analyzed the email marketing strategies adopted by the top 100 e-retailers in the United States to study how they engage with their customers. These companies represent industries ranging from apparel and electronics, to auto parts and pet supplies, but all have the single goal of getting their users to go from inbox to checkout. We note what companies are doing across the board, as well as what spec
Tags : 
    
Iterable
Published By: IBM Unica     Published Date: Sep 08, 2011
According to Unica team, this ebook teaches how the right Interactive Marketing solution can help marketers engage their customers.
Tags : 
ibm, unica, marketing ebook, interactive, social media, cross-channel, integration, email deliverability
    
IBM Unica
Published By: Movable Ink     Published Date: Oct 04, 2016
Financial Times showcased user-generated content with a live social feed in their emails. Check out our new eBook here and learn how contextual marketing can benefit your company with our top tips and tactics.
Tags : 
contextual marketing, email marketing, financial services marketing, contextual email, real-time marketing, finance, internet marketing
    
Movable Ink
Start   Previous   1 2 3 4    Next    End
Search