google

Results 101 - 125 of 416Sort Results By: Published Date | Title | Company Name
Published By: CPC Strategy     Published Date: May 21, 2012
CPC Strategy looked at 4,274,820 clicks, 82,845 orders, $1,158,604.41 in spend $7,867,575.91 in revenue to find the best converting shopping site for online retailers. Fill out the form below to download the free report.
Tags : 
comparison shopping, shopping site, marketing channel, data feed, product feed, shopping feed, cse, online marketing, ecommerce, retail, cpc, ppc, google shopping, google product search, pricegrabber, nextag, amazon, shopzilla, bizrate, product
    
CPC Strategy
Published By: CPC Strategy     Published Date: May 21, 2012
CPC Strategy looked at 4,274,820 clicks, 82,845 orders, $1,158,604.41 in spend $7,867,575.91 in revenue to find the highest converting shopping site for online retailers. Fill out the form below to download the free report.
Tags : 
comparison shopping, shopping site, marketing channel, data feed, product feed, shopping feed, cse, online marketing, ecommerce, retail, cpc, ppc, google shopping, google product search, pricegrabber, nextag, amazon, shopzilla, bizrate, product
    
CPC Strategy
Published By: CPC Strategy     Published Date: May 21, 2012
CPC Strategy looked at 4,274,820 clicks, 82,845 orders, $1,158,604.41 in spend $7,867,575.91 in revenue to find the highest converting shopping site for online retailers. Fill out the form below to download the free report.
Tags : 
comparison shopping, shopping site, marketing channel, data feed, product feed, shopping feed, cse, online marketing, ecommerce, retail, cpc, ppc, google shopping, google product search, pricegrabber, nextag, amazon, shopzilla, bizrate, product
    
CPC Strategy
Published By: CPC Strategy     Published Date: May 21, 2012
CPC Strategy looked at more than 110 online retailers, 4,274,820 clicks, 82,845 orders, $1,158,604.41 in spend $7,867,575.91 in revenue to find the best comparison shopping engine (CSE) online. Fill out the form below to download the free report.
Tags : 
comparison shopping, shopping site, marketing channel, data feed, product feed, shopping feed, cse, online marketing, ecommerce, retail, cpc, ppc, google shopping, google product search, pricegrabber, nextag, amazon, shopzilla, bizrate, product
    
CPC Strategy
Published By: CPC Strategy     Published Date: Jun 26, 2012
CPC Strategy is excited to release a it's 3rd Google Shopping ebook for business owners that talks about everything you need to know to take advantage of the new Google Shopping. It's an actionable guide on how to prepare your business for the change. Fill out the form to receive CPC Strategy's Ebook.
Tags : 
google, marketing, cpc strategy, ecommerce, online shopping, digital, customer experience/engagement, e-commerce solutions, trust and security, sales
    
CPC Strategy
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Cyphort     Published Date: Jun 28, 2016
Thanks to its convenience, online shopping has become a major trend over the last few years and lets face it, it’s here to stay. With the rise of online shopping, marketing experts capitalized on this new avenue to advertise their products. Now your friends nudge you on Facebook to buy a product they love and Google suggests a friendly place across the street where you can get your car fixed. It’s become hard to browse even a few pages without running into an ad and because of this increases, malware experts also saw a new avenue of attack - Malvertising.
Tags : 
downloads, best practices, network management, solutions, technology, advertising
    
Cyphort
Published By: Digital Bungalow     Published Date: Feb 09, 2015
Google Analytics is an excellent tool for gaining insights into user behavior and gathering data for site optimization.
Tags : 
google analytics, site optimization, customer acquisition, consumer behavior, advanced segments, emerging marketing, business intelligence, market research, data management/analytics
    
Digital Bungalow
Published By: Domo APAC     Published Date: Mar 04, 2019
Cisco’s marketing team has invested massively in technology over the past two years. This $50 million investment in software has put Cisco at the leading edge of B2B technology marketing. 40 new applications have been put in place, creating one of the most sophisticated marketing technology stacks in the industry, resembling the more consumeroriented Amazon, Google, and Facebook. This investment has earned Cisco’s marketing team plaudits and several industry awards View Domo’s privacy policy
Tags : 
    
Domo APAC
Published By: Dropbox for Business     Published Date: May 07, 2015
Dropbox is named the most popular Enterprise File Sync and Share Product over other vendors like Microsoft, Google Drive and Box.
Tags : 
efss, enterprise file sync and share, hybrid-cloud systems, data management, cloud migration, enterprise deployments, cloud computing
    
Dropbox for Business
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
best practices, storage, mobile workforce, technology, data, office 365, mobile device
    
Druva
Published By: Druva     Published Date: Aug 05, 2016
As employees use more devices and cloud apps like Box.com, Google and O365, responding to legal hold or eDiscovery requests becomes costlier and time consuming. Read how to take a proactive approach to eDiscovery data collection for data within and outside the firewall, thereby reducing the risks and costs of litigation.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva
Published By: EBSL Technologies Int'l     Published Date: Sep 26, 2010
This white paper provides an introduction to cloud computing.
Tags : 
cloud computing, service level agreements (slas), cloud computing security, virtualization, amazon cloud, google
    
EBSL Technologies Int'l
Published By: Ensight     Published Date: Dec 03, 2008
The online advertising industry is a billion-pound industry1, with hundreds of millions spent on online acquisition campaigns alone; from Pay-Per-Click (PPC) advertising on search engines like Google and Yahoo!, to banner ads, email campaigns, organic search, blogging and web PR.
Tags : 
ensight, emarketing campaigns, online advertising, acquisition campaigns, ecrm
    
Ensight
Published By: Ensighten     Published Date: Aug 02, 2012
Watch the playback on the hidden costs of website Javascript tagging in time, resources, page speed and stability. Hear the benefits of tag management systems and what to look for, plus hear how Sony increased web analytics ROI, while speeding page load.
Tags : 
tag management, digital marketing, web marketing, web analytics, digital advertising, online advertising, javascript tags, web page optimization, web page performance, page load times, ad pixels, conversion pixels, digital marketing applications, conversion tracking pixels, website tagging, google analytics, sitecatalyst, omniture, website visitor tracking, third-party cookies
    
Ensighten
Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate, b2b, application, browser, applications, saas, hack, web, website, sha-2, migration, implementation, ssl
    
Entrust Datacard
Published By: Equinix     Published Date: Sep 28, 2015
Interconnected Commerce: A Revolution in Value Creation, commissioned by Equinix and produced by Aite Group, discusses the state of the global payments ecosystem and its evolution into a core component of commerce enablement.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends, payment processers, payment ecosystem, disruptive payments, third party payments, location based advertising, credit cards, debit cards, apple pay, google pay, contactless payments, mobile payments, mobile wallets
    
Equinix
Published By: ESET     Published Date: Jun 20, 2011
Trusted experts in endpoint security solutions. Learn more today!
Tags : 
cloud computing, endpoint security, evolution, google, hype, information technology, microsoft, windows, attacks, apple, linux, mobile, operating systems, solutions, endpoint, protection
    
ESET
Published By: Fetchback     Published Date: Aug 28, 2009
Do you know what your Return Conversion Rate is? Do you even know what that metric measures? FetchBack brings you an insightful White Paper to educate you about this often overlooked metric, and how this one metric can change your entire company's culture and future.
Tags : 
return conversions, marketers, prospects, return, conversion, fetchback, analytics, retargeting, google, loyalty, retention, web analytics
    
Fetchback
Published By: ForeSee Results     Published Date: Feb 07, 2007
The world of e-business is continuing to evolve as the lines further blur between search engines, portals and content providers. Learn more about the competitive positions of Google, Yahoo!, AOL and more in this report.
Tags : 
e-business, e-commerce, google, yahoo, msn / live search, loyalty and retention, foresee, foresee results, market research, usability
    
ForeSee Results
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.