attention

Results 226 - 250 of 279Sort Results By: Published Date | Title | Company Name
Published By: TheMarketingScope     Published Date: Oct 28, 2015
You have to think holistically with a full funnel solution that can deliver content, drive real results and offer mutual value to your business and to customers at the same time.
Tags : 
linkedin, marketing funnel, content management, content strategy, customer engagement
    
TheMarketingScope
Published By: Marketo     Published Date: Oct 17, 2016
When you think about holiday marketing, perhaps one or two campaigns stick out to you, but because of the multitude of messages, it’s hard for most people to pick one out from the crowd. Marketers face the challenge of standing out from the crowd, and capturing consumers’ attention with fun, relevant, and personalized campaigns in order to drive revenue. This guide will walk you through eight steps that cover how to plan and run an effective holiday marketing campaign.
Tags : 
holiday marketing, personalization
    
Marketo
Published By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Marketo     Published Date: Mar 20, 2018
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders t
Tags : 
    
Marketo
Published By: Bronto     Published Date: Jan 02, 2014
Attention digital marketers, we are no longer in control. Whether they realize the true strength of their powers or not, consumers now have the upper hand of the digital marketing experience. Download this e-book to explore each phase of the customer lifecycle and detail programs to reach your customers across channels, devices and levels of engagement.By downloading now, you'll gain instant access to Chapter 1, Acquiring and Welcoming New Subscribers. Then, keep an eye on your inbox for the remaining 5 chapters over the next few weeks.
Tags : 
lifecycle marketing, customer engagement, e-commerce marketing, acquiring subscribers
    
Bronto
Published By: Symantec     Published Date: Nov 30, 2015
Noël approche. La dinde est bien dodue... mais attention à ne pas vous la faire plumer.
Tags : 
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps, software development
    
Symantec Corporation
Published By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
    
AlienVault
Published By: IBM     Published Date: Feb 18, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
ibm, release cycles, mobile testing, it management
    
IBM
Published By: IBM     Published Date: May 18, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
testing solutions, mobile testing, testing times, survey insights, release cycles, report analysis, analytical applications, virtualization, infrastructure, design and facilities, research
    
IBM
Published By: Jigsaw     Published Date: May 12, 2010
In sales and marketing - only two things matter: Getting people's attention, and what you tell them when you have it
Tags : 
jigsaw, value proposition, messages, sales, marketing, seo, google, adwords
    
Jigsaw
Published By: AdRoll     Published Date: Sep 06, 2016
According to VentureBeat, for the past 10 years, email has produced higher ROI than all other marketing channels. But email marketing requires thoughtful attention to detail in order to drive sales. Learn actionable 12 tips to supercharge your highest performing channel.
Tags : 
email, marketing, channel, roi, copy creation, programatic
    
AdRoll
Published By: NEC     Published Date: Aug 12, 2014
NEC has introduced the Express5800/A2000 Series Servers to accommodate enterprise application demands with peak server reliability, availability, and serviceability. The new server architecture and NEC engineering functionality align well with many of the most important IT priorities in 2014, including virtualization, big data and advanced data analytics. With the Express5800/A2000 Servers, NEC has the opportunity to educate application owners and work with system integrators to drive awareness and ultimately investment in its new server platform, which will help drive customer value. In this white paper, you will learn how these next-generation servers from NEC are ready to accommodate some of today’s demanding workloads.
Tags : 
servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, architecture, express, stress, data management
    
NEC
Published By: [x+1]     Published Date: Jan 24, 2007
Publishers spend millions generating content, designing user experiences, and promoting themselves as the destination of choice when people open up their browsers. In order to pay for the user's attention, they sell impressions. But who should publishers sell to? Be sure to consider the key points explained in this paper.
Tags : 
online ad sale, ad sales, online ad sales, ad serving, graphical/cpm, banner advertising, prestitials
    
[x+1]
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security, security
    
Quocirca
Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids, spam, spam filtering, security policies, gateway av, risk management, perimeter, perimeter esecurity
    
Perimeter
Published By: Asentria Corporation     Published Date: Sep 04, 2007
In the high-stakes battle of Internet providers, WiMAX represents the latest up-and-comer to challenge DSL and cable technologies. This new wireless technology is gaining attention for its ability to provide high-speed, high-throughput broadband connections over distances of up to 30 miles instead of a few hundred feet. Exhibiting a surprising amount of utility, WiMAX can be used for a number of different applications.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : 
passwords, password, password management, security management, good password, bad password, data protection, elcomsoft
    
ElcomSoft
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information is crucial in decision making. No wonder that protection of information is paid much attention. The most part of information is created and stored digitally (Microsoft Office documents, different databases, and financial data in Intuit Quicken etc). Thus software and hardware means of protecting information are the first to talk about.
Tags : 
password, password recovery, system recovery, elcomsoft
    
ElcomSoft
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
In most drilling applications encoders are used to provide position and speed feedback for proper control of equipment like top drives and pipe racking systems. However, these electronic devices require special attention when used in hazardous environments such as a drilling platform. In this paper, we discuss ways to make encoders suitable for hazardous duty.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output, electronics, manufacturing
    
Dynapar Corp.
Published By: TARGUSinfo.     Published Date: Jul 31, 2008
Consumers contact you through a growing number of channels. With this Yankee Group study, you'll learn how predictive analytics can help you instantly identify your best customers and prospects, match them to the best agents and give them more personalized attention - thus maximizing customer acquisition and cross-sell opportunities.
Tags : 
targusinfo, targus info, customer, analytics, customer behavior, behavior, customer insight, feedback, crm, customer relations, loyalty
    
TARGUSinfo.
Published By: Waymedia     Published Date: Oct 23, 2008
Millions of  handsets are sold around the world daily. Handsets are by far the preferred platform of communication there is.  People spend more time using their mobile phones than any other device or gadget, and they pay special attention to everything stored in those handsets. In a few words:  If brands want to have a presence in their consumers’ environment, and if they want their message to be heard and seen, then they imperatively need to put some value content on users mobile phones. Mobile marketing is typically understood as SMS Marketing, which is managed from a distant point and it impacts the user at random times.
Tags : 
waymedia, mobile marketing, sms
    
Waymedia
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept