site visitors

Results 1 - 25 of 41Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 07, 2013
This quick tip guide discusses a definition of conversion optimisation, eight steps to attract, engage and convert more visitors and how to make better decisions based on data.
Tags : 
customer interactions, digital marketing, improving conversion rates, personalisation, customer engagement, emerging marketing
    
Adobe
Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Imperva’s WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Imperva’s sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web server’s IP
Tags : 
    
AWS
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. Each year, it attracts more than 8.2 million visitors on site and stages more than 2,000 performances attended by over 1.5 million people. Since opening its doors in 1973, the Opera House has become the symbol of modern Australia and the country’s premier tourist destination, with an iconic national-identity value that Deloitte Access Economics has estimated at $4.6 billion. On the Opera House’s 40th anniversary, it embarked on a Decade of Renewal, a series of projects to prepare the Opera House for future generations of artists, audiences, and visitors. Because renewal isn’t just about the building and the arts; it’s also about renewing technology and systems. This enabled the Opera House to engage VMtech and BlackBerry Cylance to modernize its IT server and network infrastructure, as well as information management, privacy, and cybersecurity.
Tags : 
    
BlackBerry Cylance
Published By: Chango     Published Date: Apr 17, 2012
To most marketers, 'retargeting' means placing display ads in front of people who have visited a website. This is a limited view: retargeting can be used for acquisition and prospecting, not just winning back lost visitors.
Tags : 
retargeting, remarketing, remessaging, re-targeting, search retargeting, site retargeting, behavioral targeting, chango
    
Chango
Published By: Clicktale     Published Date: Feb 25, 2016
As marketers, we rely on metrics as basic tools for assessing success and failure. But marketers are also website visitors who instantly recognize poor customer experiences when they occur. Perhaps you tried to purchase a sweater online, book an urgent flight or send a bouquet of flowers, but the website was not up to par.
Tags : 
marketing, business development, website development, sales, business practices
    
Clicktale
Published By: Clicktale     Published Date: Feb 25, 2016
Forms are the place where you and your website visitors get personal. Forms are where visitors agree to supply their most precious online commodities - facts about themselves and their hard-earned money.
Tags : 
website development, business practices, business optimization
    
Clicktale
Published By: Crowd Science     Published Date: Jul 14, 2011
This position paper has been developed to shed some light on the importance of creating a high quality survey questionnaire.
Tags : 
crowd science, scale, audience research, display advertising, targeting, demographics, website demographics, market research
    
Crowd Science
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: Ektron     Published Date: Feb 04, 2009
As Web sites move toward a richer user experience, rich internet applications (RIAs) are becoming the method of choice to dynamically engage site visitors. But even as sites are designed around RIAs built on Microsoft Silverlight and Adobe Flex, businesses and organizations are looking for the best possible ways to manage the data that these Web applications rely on.
Tags : 
ria, html, rich internet applications, multimedia, data management, silverlight, adobe flex
    
Ektron
Published By: Evergage, Inc.     Published Date: Nov 19, 2014
Are you responding in real time to your prospects and customers while they are engaged on your website or in your online application? The future of B2B Marketing is Personalization. With it, you can get to know what your visitors and users are doing and then deliver targeted and personalized content that will allow you to boost conversion rates and improve customer communication and retention. This FREE eBook will show you how Millard Brown Digital's SaaS application, Compete PRO got a 26% lift in retention with Real-Time Web Personalization.
Tags : 
web personalization, b2b, targeted content, visitor engagement, website development, emerging marketing, marketing research
    
Evergage, Inc.
Published By: GeoTrust     Published Date: Jan 21, 2016
Almost every website involves some exchange of information, whether it’s login details for an online application or contact details on a landing page, and visitors want to know that their information is secure. So deploying an SSL certificate from a trustworthy certificate authority (CA) like GeoTrust is a must for any site owner.
Tags : 
    
GeoTrust
Published By: Hallam     Published Date: Feb 28, 2011
The benefits of an effective International SEO campaign are self evident: Increasing visibility in the search engines results in more traffic to your website, which leads to more qualified visitors making enquiries or sales o
Tags : 
seo, international seo, search engine optimisation, global seo, internet marketing
    
Hallam
Published By: HP Inc.     Published Date: Feb 03, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
    
HP Inc.
Published By: HP Software     Published Date: Feb 02, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
security, bios, threat prevention, threat detection, malware, hacking
    
HP Software
Published By: IBM     Published Date: Aug 21, 2013
In many enterprises, marketing is a multichannel effort that includes a wide range of touch points. The touch points range from websites and email promotions to traditional print advertising, postal mail, and broadcast, and direct sales by phone and in-person sales teams. But too often, each channel works independently, accountable to its own objectives, unaware of the efforts and results made within other marketing channels. As a result, call centers speak to customers without knowing the offers the customers previously accepted or rejected. In addition, emails launch without reference to online promotions and websites present messages that disregard their visitors’ previous contact history.
Tags : 
cross channel marketing, customer communications, interactive marketing, multi-channel marketing, sales, multichannel, communications, email marketing
    
IBM
Published By: IBM     Published Date: Jul 07, 2014
To drive e-commerce sales, Performance Bicycle (PB) wanted to harness its employees’ cycling knowledge to attract and inspire customers. How could it deliver this knowledge to customers in an engaging way? PB created an interactive Learning Center seamlessly linked to its e-commerce site – enabling knowledgeable employees to share their tips, tricks and expertise with customers and visitors.The Learning Center attracted a 300 percent traffic increase by its fourth month online. By leading inspired visitors to the e-commerce site, the Center boosts conversion by up to 20 percent, driving sales.
Tags : 
ibm, case study, e-commerce, performance bike, interactive, learning center, conversion, emerging marketing
    
IBM
Published By: IBM     Published Date: Aug 14, 2014
IBM® Mobile Web Push allows marketers to influence and inform their mobile audience in innovative ways. Web push notifications are dynamically triggered for display on mobile websites based on the actions of your visitors. This personalization is possible without the complications of existing content management, advertisement servers or IT involvement.
Tags : 
ibm, mobile, web push, free notifications, marketing, emerging marketing
    
IBM
Published By: IBM     Published Date: Apr 15, 2015
Performance Bicycle created an interactive Learning Center seamlessly linked to its e-commerce site. By leading engaged, inspired visitors to the e-commerce site, the company boosts conversion, drives online sales and supports its growth objective.
Tags : 
e-commerce, content management, conversion
    
IBM
Published By: Intercom     Published Date: Apr 05, 2018
On average, website visitors who chat are more than 82% likely to convert to customers and pay up to 13% more than those who don't.
Tags : 
    
Intercom
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.