target

Results 76 - 100 of 1005Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: May 08, 2017
• Our survey of companies that currently offer, or plan to launch, so-called “direct to consumer,” or over-the-top (OTT), video services in the market suggests that the industry is maturing. Though 51 percent of those surveyed view their video service as a money-making venture, 49 percent see it as providing some other primary benefit to the company. Not only are the types of OTT video services offered to consumers becoming more diverse, but the marketing and distribution are also improving such that target audiences are more likely to find new services intended for them
Tags : 
video services, akamai, marketing, distribution, audience targeting, service optimization
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: LiveAction     Published Date: Apr 26, 2019
In March of 2019, Sirkin Research was commissioned by LiveAction to identify the driving forces of network transformation and how the rapidly evolving network environment is impacting network professionals. It is well recognized that network transformations, such as SD-WAN, WiFi, and multi-cloud, edge computing among other trends, are creating a host of new challenges and opportunities for network operations. This research is based on responses from over 163 network and IT professionals in predominantly in enterprise organizations with at least $1 billion in revenue Attached is also the target account list.
Tags : 
    
LiveAction
Published By: Sage People     Published Date: Jan 04, 2019
We are in the midst of a global productivity crisis. The IMF estimates that if productivity growth had followed its pre-2008 financial crisis trend, overall GDP in advanced economies would be about 5% higher today. However, to blame everything on the financial crisis is misleading. The overall trend in productivity growth is stagnant and has been on a downward trend for the last several years. This is costing the U.S. a staggering $450–$550 billion a year. In the U.K., concern is such that there have been calls for the government to set new targets and create an independent watchdog to monitor progress to improve national productivity. There is also a workforce engagement crisis. Most people are simply not engaged at work, with industry research showing that typically 66% of people are either partly or not engaged at all at work. This means that only 1 in 3 people at work are fully motivated and productive. Yet most companies are oblivious to this fact. Some run annual emplo
Tags : 
    
Sage People
Published By: Sage EMEA     Published Date: Dec 19, 2018
We are in the midst of a global productivity crisis. The IMF estimates that if productivity growth had followed its pre-2008 financial crisis trend, overall GDP in advanced economies would be about 5% higher today. However, to blame everything on the financial crisis is misleading. The overall trend in productivity growth is stagnant and has been on a downward trend for the last several years. This is costing the U.S. a staggering $450–$550 billion a year. In the U.K., concern is such that there have been calls for the government to set new targets and create an independent watchdog to monitor progress to improve national productivity. There is also a workforce engagement crisis. Most people are simply not engaged at work, with industry research showing that typically 66% of people are either partly or not engaged at all at work. This means that only 1 in 3 people at work are fully motivated and productive. Yet most companies are oblivious to this fact. Some run annual employee sa
Tags : 
    
Sage EMEA
Published By: Adobe     Published Date: Nov 07, 2013
One of the key objectives of Adobe’s current advertising campaign is to explode the myth that ‘managing websites is hell’. We believe that in this day and age, the idea that website management is a nightmare should be a thing of the past.
Tags : 
adobe, econsultancy, trends and innovation, content management, customer experience management, driving engagement, brand-building, web content management, wcm, adobe experience manager, adobe marketing cloud, the cloud, cloud computing, social community, econsultancy and adobe, driving sales, multichannel customer experience, digital intelligence, targeting, segmentation
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Today’s leading DMPs are ingesting a wide range of owned and licensed data streams for insights and segmentation and are pushing data into a growing number of external targeting platforms, helping marketers deliver more relevant and consistent marketing communications.
Tags : 
adobe, the forrester wave, forrester dmp wave, audience management, data management platforms, multi-touchpoint targeting, multi-touchpoint execution, dmp vendor offerings, seamless data ingestion, message delivery, strong vendors, product evaluations, selecting right partner, audience insights, coordinated targeting
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues, ad targeting, target audiences, social media audience, spend forecast, social media, internet marketing, social media marketing
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Honda uses Adobe Social to effectively engage European fans of cars, motorcycles, robots, jets, and other inventive products through a single, coordinated effort
Tags : 
adobe, honda motor, social media, brand governance, aodbe social, inventive products, coordinated effort, social communities, targeted experiences, using resources effectively, coordinate marketing campaigns, social media management platform, localized apps, international blockade, global campaign coordination, social analytics, local marketers, digital marketing, targeting publishing, social media quality
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Advanced management and tracking in Adobe Social helps Sky Bet drive revenue through timely delivery of targeted high-impact social campaigns.
Tags : 
adobe, skybet, success story, advanced management, adobe social, drive revenue, traditional digital marketing, drive new customers, content strategy, audience engagement, minimize cost, minimize complexity, social marketing initiatives, integrate data easily, effective customer bonds, streamline moderation, social properties, interaction data, gain traffic, social customer service
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Think targeting ticks customers off? Actually, it’s quite the opposite. Studies show that 41% of consumers would consider ending a brand relationship because of irrelevant messaging.1 That’s why targeted and personalized content is more important now than ever before.
Tags : 
adobe, testing and targeting, targeted content, personalized content, target segments, targeting tips, important target facts, targeted campaigns, noticeable page elements, segment preferences, alternate content, control content, testing organizations, optimal end conversion, dynamic banners, quick attraction, device usage, test designs, define segments, content management systems
    
Adobe
Published By: Pega     Published Date: Apr 04, 2016
As the marketing landscape continues to shift and evolve, marketers are being tasked with a multitude of responsibilities, not the least of which involves adopting new platforms and strategies to operate in a real-time world and provide relevant content across every conceivable delivery platform. This has opened a whole new world of challenges—and opportunities—for marketers as personalization has been brought to the forefront of the strategy for many organizations. These requirements are making it all the more imperative for organizations to be able to craft robust experiences that are targeted to the needs and desires of all of their customers. In a world where customers have a multitude of options for nearly everything they are looking to purchase—and where new contenders are willing to offer almost anything to gain their business and loyalty if given the opportunity—the demand to know and effectively engage customers has never been greater. Download this whitepaper and discover how
Tags : 
    
Pega
Published By: VMware     Published Date: Oct 05, 2015
Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a “Zero Trust” network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower — until now, that is. Download this use case from VMware and Carahsoft® now to learn why.
Tags : 
vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft
    
VMware
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Global Payments     Published Date: May 02, 2019
The economic face of the APAC region is changing. While the East has long been considered a source of competitively priced raw materials and manufacturing services, the spending power of its inhabitants - and their increased fondness for international travel - has transformed it into a force to be reckoned with. It’s estimated that, over the next five years, 88% of the growth in the global middle class will be in the Asia Pacific region.1 If multinational companies hope to take advantage of this vast new target market, they will need to adapt their expansion strategies and offer APAC customers a tailored retail experience.
Tags : 
apac growth, global payments, luxury brands, trusted payments, localized purchasing, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments, alternative payment methods, chinese wallets, international payment solutions
    
Global Payments
Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Nov 22, 2018
It is easy to get overwhelmed by the plethora acronyms (RTBs, DMPs,DSPs, SSPs, 1PD, 2PD, 3PD) and knowing when each of them come into play. Driven by data, Programmatic empowers modern marketers with the intelligence required to serve highly personalized ads. By bringing together First, Second and Third Party data at scale, you can target with increased precision and optimize campaigns in real-time. With tech platforms consistently pushing the boundaries of what’s possible in digital advertising, the time for marketers to lean into programmatic is now. Watch this 20 minute webinar with Mandar Dadegaonkar, an award-winning digital marketer and learn from his experience-based advise on: • how to get started and use programmatic tactics that work • insider secrets to boost ROI and improve campaigns • potential pitfalls to watch out for • guidelines for measurement and analytics
Tags : 
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: FireEye     Published Date: Nov 27, 2012
How to Protect Against the Next Generation of Cyber Attacks
Tags : 
fireeye, cyber attacks, firewalls, ips, protect
    
FireEye
Published By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : 
fireeye, spear phishing attacks, cybercriminals, malware, malicious activities
    
FireEye
Published By: Red Hat     Published Date: Dec 09, 2013
Linux has proven to be a key element for successful datacenter modernization. Red Hat Enterprise Linux delivers cross-architecture standardization to a single operating system (OS) and provides a target platform for migrating mission critical workloads. For more information on Red Hat Enterprise Linux datacenter modernization watch the webinar here.
Tags : 
idc, red hat, informationweek, industry solutions, webinar, standardization, cloud computing, virtualization, os dynamics, technology reset, datacenters, market trends, it infrastructure, demarcation line, al gillen, webinars & web conferencing, data management/analytics
    
Red Hat
Published By: Oracle     Published Date: Aug 08, 2013
Oracle Sales Cloud is Smarter SFA that helps Managers know more. Hit your target with no surprises. Act on opportunities and threats faster. Manage more effectively anywhere, using any device.
Tags : 
oracle sales cloud, oracle, cloud, sales, sfa, crm
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.