online data

Results 1 - 25 of 267Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: Unica     Published Date: Sep 23, 2010
If you knew more about your customers, wouldn't you tailor their experience to their unique profile and online behavioral history? Download Three Key Integrations for Interactive Marketing Success and learn how to integrate online data into your interactive marketing strategy.
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, aberdeen, content management systems, web analytics, email marketing services/software
    
Unica
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: Mirror Image Internet     Published Date: Jun 07, 2012
This white paper discusses 5 sure-fire ways you can make your advertising technologies perform better to deliver significant business value.
Tags : 
advertising, ad ops, ad tech, display advertising, online advertising, targeting, data, mobile advertising, dsp, rtb, ad networks, ad exchanges, iab, banner ads, clickthrough, pixel, pixel tracking, mobile device detection, video advertising, interactive advertising
    
Mirror Image Internet
Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales, advertising, marketing campaign, ad tracking, generate leads, sales leads, online sales, sales tool, small business, ecommerce, search engine ranking, seo, keywords
    
VisiStat
Published By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
    
Adverity
Published By: GoToWebinar     Published Date: Aug 02, 2011
This Webinar Success white paper provides guidelines on how to produce and manage successful Webinars - from the first (and most important) step of defining purpose and expectations to quantifying results after the event.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: Clustrix     Published Date: Sep 04, 2013
Online advertising is a highly competitive and innovative market being driven to new levels by the rise of ad exchanges, real-time bidding alongside traditional ad networks. With advertisers increasingly buying one impression at a time, advertising market growth is soaring. If your database is the bottleneck limiting the growth of your advertising business, this is the white paper for you. Find out how Clustrix will give you access to functionality, such as ad segmentation and targeting based on up-to-the minute campaign performance, as well as instant access to smart data, so your clients can make the right buy decisions. This free whitepaper considers the technical challenges this rise presents for the database, and discusses the unique technology that enables Clustrix to solve these challenges and give your advertising business a competitive advantage.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics
    
Clustrix
Published By: Data Guard Systems     Published Date: Aug 21, 2009
Making the sale just doesn't do it anymore for success in the cellular retail business. Constantly, retailers are forced to create new streams of revenue. This document addresses the key points and benefits that cellular retailers need to know about accepting bill payments using CellularManager's All-in-One Bill Pay Suite.
Tags : 
collaborative commerce, cellular retailer, business management, ebusiness, sales & marketing software, online bill pay, telecom, telecommunications, cell phone, cellular manager, ecommerce, ebusiness, data guard, data guard systems
    
Data Guard Systems
Published By: Adobe     Published Date: Mar 03, 2017
Applying for and opening financial services accounts online is on the rise. And FSI marketers are feeling the pressure to make these new accounts higher quality. The Adobe guide, Acquisition Evolved, will give you three actionable ways to improve your ability to identify and convert high-value customers. Read the guide to learn: • The DNA of customer digital behavior • How to create unified customer segments with existing data • How to adopt onsite messaging to match offsite ads
Tags : 
fsi, adobe, customer behavior, customer segments, data
    
Adobe
Published By: Clustrix     Published Date: Sep 04, 2013
Find out how AdScience has been able to increase their revenue potential by five times using Clustrix to optimize bidding for their online ad broker agency. AdScience runs complicated algorithms to process bids for ad space based on click history. It's critical for AdScience to have instant access to smart data.
Tags : 
adscience, revenue, technology, clustrix, algorithms, case study, best practices
    
Clustrix
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Cities are changing at a pace never before possible, bringing smart features online daily. But smart features don’t equal smart cities. That’s why aspiring smart cities are shifting from siloes of smart features to a more holistic approach that connects and makes sense of all people and things. This shift demands technology solutions that are edge-centric, cloud-enabled and data-driven, able to deliver citizen-centric outcomes now and into the future.
Tags : 
    
Hewlett Packard Enterprise
Published By: Thawte     Published Date: Oct 05, 2015
As online attacks become more frequent and easier to execute, organisations around the world are under increasing scrutiny to ensure all online transactions involving confidential data are secure. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL that helps protect the entire user experience from start to finish, making it safer to search, share and shop online. Discover more about this best practice protection by downloading our new reference guide now.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: Thawte     Published Date: Oct 05, 2015
L’heure est à la sécurisation intégrale de votre site. Face à des attaques de plus en plus fréquentes et faciles à exécuter, les internautes sont plus que jamais attentifs à la capacité des sites à sécuriser leurs données confidentielles. Pour les entreprises intraitables sur les questions de réputation et de protection de leurs clients, Always-On SSL s’impose comme une priorité absolue. Sa mission : protéger les internautes tout au long de leur parcours sur votre site – des recherches aux achats, en passant par le partage d’informations. Pour en savoir plus sur ce dispositif de renforcement de la protection en ligne, téléchargez notre nouveau guide de référence.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: Thawte     Published Date: Oct 05, 2015
Es ist an der Zeit, sich für durchgängige Website-Sicherheit zu entscheiden. Da Online-Angriffe immer häufiger und einfacher werden, sind Unternehmen in aller Welt zunehmend auf dem Prüfstand und müssen zeigen, dass alle Online-Transaktionen mit vertraulichen Daten sicher sind. Unternehmen, die den Schutz ihrer Kunden und ihrer Marke ernst nehmen, implementieren Always-On SSL, um die Suche, den Meinungsaustausch und das Einkaufen im Internet sicherer zu machen. Mit Always-On SSL sind alle Kundeninteraktionen vom ersten bis zum letzten Klick geschützt. Informieren Sie sich ausführlich über diesen Schutz in unserem Leitfaden.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: Schneider Electric     Published Date: Oct 17, 2016
In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
    
Schneider Electric
Published By: CDW     Published Date: Apr 04, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management
    
CDW
Published By: CDW - APC     Published Date: Apr 07, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management
    
CDW - APC
Published By: Adobe     Published Date: Sep 12, 2017
Blend online and offline data to create a vibrant marketing world. Learn how to deliver uniquely experiences customers expect and to delight them with the ones they didn't see coming.
Tags : 
    
Adobe
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection
    
Cisco
Published By: SEPATON     Published Date: Mar 11, 2008
Today’s enterprise faces a convergence of data protection challenges. Addressing them means extending online data retention, enabling deduplication, and simplifying operations. This report outlines how ContentAware VTL and deduplication solutions from SEPATON uniquely address these challenges.
Tags : 
sepaton, backup, data protection, virtual tape library, vtl
    
SEPATON
Published By: Janrain, Inc.     Published Date: Jan 07, 2013
This paper covers establishing best practices in implementing user registration, and strategies for collecting more and better user data without sacrificing conversion rates. Topics include social login, progressive profiling, CAPTCHA, SSL, and more.
Tags : 
online registration, data management, unified data, data validation, ssl, progressive profiling, social media, marketing research, social media marketing
    
Janrain, Inc.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.