target

Results 76 - 100 of 1014Sort Results By: Published Date | Title | Company Name
Published By: Loop Commerce     Published Date: Mar 08, 2019
Loop Commerce invented the $600B G-Commerce industry by building the first digital solution that makes it simple to shop for others and partnering with retailers like Target, Uniqlo, and Neiman Marcus along the way. After an acquisition by Synchrony, their deep consumer financial services experience and strong retail partnerships makes this the most exciting innovation in an always changing industry. See how the top retailers on the planet are embracing the huge customer segment shopping for others and seeing spikes in revenue because of it.
Tags : 
    
Loop Commerce
Published By: ABB     Published Date: Feb 27, 2019
In recent years, Europe has seen a real boost in the building of renewable generation capacity. Germany is a notable example of a country with significant growth in renewables. As shown in Figure 1 below, since 2000, the average annual growth of installed capacity in Germany has been more than 15 percent, reaching 18-20 percent between 2009 and 2010. For the most part, favorable conditions for the development of renewables have been caused by support schemes, previously based on feed-in-tariffs and competitive auctions. Now the country has reached a point where renewables account for around 53 percent of installed capacity and around 36 percent share in total electricity demand, already exceeding the 2020 target of 35 percent. To find out more download this whitepaper today!
Tags : 
    
ABB
Published By: Smarp     Published Date: Feb 22, 2019
What is social recruiting Let’s face it, everybody’s on social media these days. Providing excellent targeting opportunities, social media channels are great channels for advertising jobs. Most of us are present on at least one social media channel, which makes them great places to search and find information about prospective candidates. Long story short, social recruiting is about leveraging social platforms in recruiting.
Tags : 
social recruiting, recruitment marketing, employee brand, employee advocacy
    
Smarp
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119
Published By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
    
Flexera
Published By: Unit4     Published Date: Feb 18, 2019
Want to help your project teams hit revenue and margin targets? And keep hitting them? The top five percent of professional services organizations (PSOs) are growing faster, earning more revenue, and reaping higher project profits than their competitors. All because of greater real-time visibility and control over their project plans, schedules, costs, and budgets. Download this eGuide to learn how to drive the efficiencies and repeatable processes market leaders rely on.
Tags : 
professional services organizations, erp, enterprise resource planning, projects
    
Unit4
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems
Published By: MobileIron     Published Date: Feb 12, 2019
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. This paper examines some current mobile threat defense approaches to help organizations understand where traditional solutions may fall short — and how machine learning-based threat defense can expand upon those capabilities by providing immediate, on-device protection against mobile attacks.
Tags : 
    
MobileIron
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : 
identity governance, iam, identity management, user-centric security
    
SailPoint Technologies
Published By: Location3     Published Date: Feb 07, 2019
Each Location3 partner receives this customized approach as we work through the Local Search Roadmap, resulting in hyper-local optimizations targeting local consumers and queries. These efforts combine to increase online customer conversions and on-offline customer visits to your business.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, local seo, local organic search, online visibility
    
Location3
Published By: FICO EMEA     Published Date: Jan 25, 2019
As telecom markets become more saturated and competitive, your customer decisions must become more precise. As regulatory oversight expands, they must be demonstrably fair to consumers and explainable to regulators. Across the credit lifecycle, these more targeted decisions should be aligned with regulatory requirements. Download the Product Sheet and help your company drive performance improvements by making predictably, consistently better decisions across your credit lifecycle.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA
Published By: Google     Published Date: Jan 24, 2019
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Progress     Published Date: Jan 22, 2019
While A/B testing has been around for years, many marketers haven’t tapped into the full potential of experimentation. Controlled experimentation removes assumptions and guesswork by truly measuring the impact of explicit changes. This empowers brands to conduct true data-driven marketing that is tailored specifically to their target audience.
Tags : 
    
Progress
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 21, 2019
With technology being at the center-stage of education today, educators are compelled to figure out how best to combine technology with teaching. There’s just one end-goal – student success! Ensuring that the right infrastructure is in place is an absolute priority. Without it, student learning goals and curriculum targets are at risk. Fujitsu has years of experience in education sectors around the world. We are passionate about every stage of the learning process, supporting educators in uncovering the potential that will help students move onto the next stage of education. As students, teachers and IT departments explore a new era of learning, Fujitsu is by your side – opening up a world of possibilities. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: HERE Technologies     Published Date: Jan 16, 2019
With content plentiful and audience attention hard to attract—let alone retain—advertising has to go beyond simple personalization. Discover how HERE is bridging the gap, adding context to our view of the consumer using location-based insights that span the digital and physical worlds. So, you can learn not only who the audience is, but precisely where they are—and why. Learn more in the HERE eBook.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jan 16, 2019
Audience segmentation is key for successful ad campaigns. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE Technologies shares insights and solutions to buying location data for better audience segmentation. Find out about the challenges and questions to ask when buying location data and download the Buyers Guide for Marketers.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: ALE     Published Date: Jan 10, 2019
Campus Cybersecurity is a perennial ‘top of mind’ topic for Higher Education. For the second time in three years, information security topped Educause’s annual Higher Ed CIO Top 10 IT Issues survey. This should come as no surprise according to the latest Verizon Data Breach Investigations Report (DBIR). The report, which shows cybercriminal activity trending upwards, identifies the three most targeted industries as Financial and Insurance, Healthcare, and Education. To find out more, download this whitepaper today.
Tags : 
    
ALE
Published By: Esker     Published Date: Jan 08, 2019
It’s not uncommon that customers are slow to adopt e-invoicing. Fortunately, we’ve got some tips on how your company can maximize the success of your AR automation project and persuade even the surliest of customers. In this guidebook, you’ll discover how to build a successful plan that: • Targets the right customers • Offers customers various payment options • Promotes & rewards e-invoicing adoption
Tags : 
    
Esker
Published By: HERE Technologies     Published Date: Jan 08, 2019
Every day we use location apps on smartphone devices to get us where we need to go, and to find services and products we’re looking for. However, smartphone location apps aren’t just helping individuals navigate their way around. Forward-thinking businesses are using these apps to help them get their messages straight to the right audience, at the right time, too. It’s why the connected car and in-map location marketing is a growing area of opportunity—helping companies to meet KPIs whilst transforming the landscape of marketing at the same time. This on-demand webinar with experts from HERE and eMarketer discusses how to improve location-based audience segmentation and build a more accurate consumer profiles, as well as how real-time location targeting enables hyper-targeted marketing campaigns.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Sage People     Published Date: Jan 04, 2019
We are in the midst of a global productivity crisis. The IMF estimates that if productivity growth had followed its pre-2008 financial crisis trend, overall GDP in advanced economies would be about 5% higher today. However, to blame everything on the financial crisis is misleading. The overall trend in productivity growth is stagnant and has been on a downward trend for the last several years. This is costing the U.S. a staggering $450–$550 billion a year. In the U.K., concern is such that there have been calls for the government to set new targets and create an independent watchdog to monitor progress to improve national productivity. There is also a workforce engagement crisis. Most people are simply not engaged at work, with industry research showing that typically 66% of people are either partly or not engaged at all at work. This means that only 1 in 3 people at work are fully motivated and productive. Yet most companies are oblivious to this fact. Some run annual emplo
Tags : 
    
Sage People
Published By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
    
Mimecast
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
    
Group M_IBM Q119
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.