target

Results 151 - 175 of 1030Sort Results By: Published Date | Title | Company Name
Published By: Bronto     Published Date: Sep 26, 2011
One Click has shown what can be done when retailers develop smart strategies and leverage the commerce-focused Bronto Marketing Platform. Their overall result? A year-over-year revenue increase of 142% in the first year on the Bronto platform. To gain insight on how you may employ some of the same tactics, read the full case study. Answer these short questions then click the Download now button.
Tags : 
remailing, triggered emails, list growth, list, email marketing, case study, e-store, e-commerce, targeted, automation, shopping cart, transactional messages, bronto, bronto software, bronto marketing platform, customer experience/engagement, e-commerce solutions, email marketing services/software, pay per click (ppc)
    
Bronto
Published By: Bronto     Published Date: Jul 16, 2012
Acquiring addresses is as essential as creating a targeted message. Learn where the best places are to start and how you can continue to grow strong lists over time. Download this whitepaper to learn more.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, list management, customer, customer experience/engagement, market research, email marketing services/software
    
Bronto
Published By: Bronto     Published Date: Jan 03, 2013
With the proliferation of SPAM and other unwanted email, getting your message to the inbox and opened has become a significant challenge.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software, advertising agencies, interactive marketing, crm & customer care, e-commerce solutions
    
Bronto
Published By: Bronto     Published Date: Jan 03, 2013
Shar Music targeted personalized offers based on past order history, preferred product category and towards top customers. Using this targeted communication, response and conversion rates increased.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software, interactive marketing, marketing software, e-commerce solutions
    
Bronto
Published By: Bronto     Published Date: Sep 09, 2013
Data about your buyers is extremely valuable. It can be used for targeted remarketing that drives repeat purchases and engaged, loyal customers. When it comes to collecting and using data related to purchases on your site, how do you compare?
Tags : 
purchase data, buyer data, buyer behavior, data management/analytics
    
Bronto
Published By: Bronto     Published Date: Feb 21, 2014
How will you maximize sales this year? What new strategies and automation tactics should you implement? With the constant evolution of commerce marketing, online retailers need to find new ways to reach customers and keep them engaged. This white paper offers interviews with Bronto’s marketing strategists as they provide insight on how to create personalized campaigns
Tags : 
bronto, marketing, ecommerce, online marketing, trends, marketing strategy, mobile marketing, purchasing, online shopping, content delivery, multichannel, email marketing, retargeting, display, impressions, revenue, emerging marketing, social media, internet marketing, marketing research
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their business and keep shoppers coming back for more. Are you ready to add a few to your tool box? To build or revamp your e-commerce program, you'll need tools to build subscriber lists in healthy ways, manage coupons, maximize transnational messages, and ping shoppers to remind them about whats waiting in their shopping cart. To stay ahead of the competition, you must also capture browse behavior and create triggered messages to nudge shoppers along in their buying journey, predict what a customer wants and recommend the right product. And, depending on your target audience, you may need to explore SMS.
Tags : 
    
Bronto
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
If you’re under increasing pressure to be as efficient as possible with your marketing spend, you need to avoid wasting resources on strategies and messages targeted at the wrong audience. This white paper is a step-by-step guide on creating buyer personas to help focus your marketing efforts.
Tags : 
audience, bds, bulldog solutions, client list, pain points, motivators, validation, map, mapping, audience development, resources, buyer personas, sales development, sales leads, in-person environment, audience segmentation, promotion planning, audience, b2b, btob
    
Bulldog Solutions
Published By: Burst Media     Published Date: Mar 23, 2009
In the advertising world, marketers need to make sure that their message is heard, seen, and engaged with by as much of their target audience as possible. More reach to the target audience means more visibility. More visibility means more sales. With all of this pressure from the marketing world, how does a publisher continue to provide the relevance and reach needed to appeal to advertisers? Read this whitepaper and find out how building Instant Networks will help you grow your revenue.
Tags : 
burst media, instant networks, adconductor, ad spending, quality content, extended network of publishers, sellable groupings, grow scale, scalability, grow networks, ad exchange, media buying services, publisher network, transparent inventory, adconductor, inventory exchange, add in strategic media buying, crm, interactive marketing
    
Burst Media
Published By: Business Software     Published Date: May 28, 2013
Professional Services Automation Software: What’s the Value for Your Business? Why Professional Services Automation Software? Your service business is highly competitive,regulated, and fast. Your project teams operate in multiple time zones and currencies. You have to deal with complex revenue recognition and cost accounting rules while at the same time meeting lofty utilization targets. You need dependable utilization and demand forecasts so you can staff and train your teams accordingly. At the same time, you have to deal with multiple billing scenarios since your projects range from fixed bid, milestone driven, or time and material. Not to mention keeping a good handle on your resource pool, both full time staff, part timers, and your consultants, the skills they have acquired, their experience, general interests and preferences, and availability.
Tags : 
professional services, psa, top 10 psa vendors, business software.com
    
Business Software
Published By: Business.com     Published Date: Jun 03, 2009
Learn the 9 keys to improving the quality of your leads from your B2B search marketing efforts - simply and effectively - with this Business.com whitepaper. Download to learn more today!
Tags : 
business.com, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: Business.com     Published Date: Jun 03, 2009
Download B2B search marketing tips from over 140 top B2B search marketing agencies and the experts at Business.com. This whitepaper offers key insights and tips to help B2B marketing professionals quickly deliver better search marketing ROI.
Tags : 
business.com, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: Business.com     Published Date: Jun 03, 2009
At a time when most businesses are facing lengthening sales cycles, reduced budgets and staff cut-backs, its imperative to keep leads flowing into the business and at a lower cost. In this study of over 27,000 B2B web sites, Business.com found 93% of B2B companies are in danger of having their best intentions come back to haunt them. Learn more today!
Tags : 
black box, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA Project & Portfolio Management is a comprehensive solution for ensuring your business strategy is on target through planning, execution, and insights. CA PPM enables your organization to plan and prioritize investments in alignment with business strategies, track project execution, and shift funding and resources to ensure success and meet changing priorities.
Tags : 
project, portfolio, management, calculator, execution
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
In too many organizations today, innovation isn’t happening fast enough. Within these businesses, skills are siloed and resources are misaligned. As businesses seek to speed innovation and meet their growth and revenue targets, they have to get maximum utility out of all their investments—including in the areas of IT infrastructure, product development and human resources. This buyer’s guide is intended to help those decision makers tasked with making this critical buying decision—focusing on the characteristics that help enterprises address both their immediate and long term needs. This guide shows how leveraging a PPM platform that delivers both top-down, strategic portfolio management, as well as bottom-up project management capabilities, helps organizations maximize their ROI over the long term.
Tags : 
    
CA Technologies EMEA
Published By: Cadence9     Published Date: Jan 25, 2013
Content marketing is a marketing strategy fueled by the creation and sharing of content in order to attract, acquire and engage clearly defined target audiences.
Tags : 
    
Cadence9
Published By: Campaigner     Published Date: Jun 05, 2007
Targeted and personal, no medium today is as effective at empowering marketers with the ability to reach out and connect with their customers on a real 1-to-1 level more than Email Marketing. This insightful White Paper provides 5 simple but powerful email tactics that will keep your customers coming back for more.
Tags : 
email marketing, crm, customer relationship management, customer experience management, customer satisfaction, email, got, got corp, gotcorp, got corporation, email marketing services/software
    
Campaigner
Published By: Campaigner     Published Date: Jun 05, 2007
Targeted and personal, no medium today is as effective at empowering marketers with the ability to reach out and connect with their customers on a real 1-to-1 level more than Email Marketing. This insightful White Paper provides 5 simple but powerful email tactics that will keep your customers coming back for more. 
Tags : 
email marketing, crm, customer relationship management, customer experience management, customer satisfaction, email, got, got corp, gotcorp, got corporation
    
Campaigner
Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
Published By: Carbonite     Published Date: Aug 02, 2017
As concerns over cloud security fade, they’ve been replaced by a new fear: the pain of migration.1 Failed migrations are forcing businesses to second-guess moving to the cloud. But the ability to migrate to new platforms is essential for businesses seeking agility in competitive markets. Here are five common mistakes you should avoid to ensure successful, non-disruptive migration from any source to any target
Tags : 
cloud migration, non-disruptive migration, cloud
    
Carbonite
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: Carbonite     Published Date: Oct 04, 2017
As concerns over cloud security fade, they’ve been replaced by a new fear: the pain of migration. Failed migrations are forcing businesses to second-guess moving to the cloud. But the ability to migrate to new platforms is essential for businesses seeking agility in competitive markets. Here are five common mistakes you should avoid to ensure successful, non-disruptive migration from any source to any target.
Tags : 
migration mistakes, operations, dependencies, expectation setting, contingency planning
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses.
Tags : 
ransomware, malware, cybercrime, lockscreen, encryption
    
Carbonite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.