attention

Results 226 - 250 of 287Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 20, 2014
In this video, see how Greenwell Financial marketers use IBM's Digital Experience platform to make customers the center of attention to drive business value. This demo highlights IBM's latest capabilities including Site Wizard, Digital Data Connector, Marketing Center, Media Analytics and more.
Tags : 
ibm, digital experience, digital strategy, marketing, digital experience platform, social media analytics, customer engagement
    
IBM
Published By: Cornerstone OnDemand     Published Date: Jul 09, 2019
Here at Cornerstone, fresh thinking is one of the foundations of our approach. So, we’ve been giving brain change some serious thought. In a thought-provoking piece we’ve identified five ways our brains are evolving – from reduced attention spans to the need for more meditation and mindfulness. And we take a closer look at what that means for L&D, businesses and individuals. Download this thought-piece. We hope it gives you some food for thought… and an appetite to find out more.
Tags : 
    
Cornerstone OnDemand
Published By: SAS     Published Date: Oct 18, 2017
Are you thinking about adding artificial intelligence to your organization? It’s certainly a hot topic and worth the attention. This paper outlines the SAS approach to AI and explains key concepts. It also provides process and implementation tips if you are considering adding AI technologies to your business and analytical strategies.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
With all of the attention on machine learning, many are seeking a better understanding of this hot topic and the benefits that it could provide to their organizations. Machine learning – as well as deep learning, natural language processing and cognitive computing – are driving innovations in identifying images, personalizing marketing campaigns, genomics, and navigating the self-driving car. This e-book provides a primer on these innovative techniques as well as 10 best practices and a checklist for machine learning readiness.
Tags : 
    
SAS
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
Sponsorships can be more than a logo placement. In fact, they should be. Don’t just put a sponsor’s logo in your ads (and vice versa). Instead, give interested brands a way to really grab the audience’s attention. Still need proof social is the way to go? We’ll give you 1,700 reasons. That’s the number of banner ads consumers get served every month. On top of that, people are (over) exposed to more than 16,000 commercials annually – and struggle to recall any. It’s not an exaggeration to say consumer attention is fragmented. So how can you ensure the packages you sell create affinity between brands and the consumers they desperately covet? By giving everyone a chance to connect with each other. After all, your audience is probably already talking about your event on Facebook, Twitter and Instagram. Download here to learn more!
Tags : 
spredfast, social media, sponsorship, banner ads, earned media
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
The old adage, "you get what you pay for" may no longer be true when it comes to traditional paid media investments. Effectiveness of traditional advertising and paid media - TV, newspaper, print - is on the decline, so marketers are choosing to push their dollars to social advertisements. In fact, 62% of marketers expect to increase their spending on Facebook marketing, along with other social media sites, over the next year. Marketers now must focus their attention on getting more from their advertising efforts by making sure that their media strategies work together. This means their paid media must work with their owned media to get more consumers to engage and participate - thus driving more earned media and amplification for their brand. Download here to learn more!
Tags : 
spredfast, converged media, social media, social advertisements, earned media, consumer engagement
    
Spredfast, Inc.
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Storing, protecting, and analyzing greater amounts of digital content can strain already limited information technology (IT) resources and put heavy demands on business managers’ attention. Learn how to overcome these challenges, with scalable server technology that automates routine tasks and improves system performance with minimal supervision.
Tags : 
cloud, server, proliant gen8
    
Hewlett-Packard Company
Published By: Tableau Software     Published Date: Dec 12, 2014
Congratulations: you are part of a small but growing group that’s taking advantage of the power of visualization. However, bringing your visualizations from “good” to “great” takes time, patience, attention to detail, and some basic knowledge of visual analysis best practices.
Tags : 
tableau, visual analysis, visualization, best practices, data management
    
Tableau Software
Published By: TheMarketingScope     Published Date: Oct 28, 2015
You have to think holistically with a full funnel solution that can deliver content, drive real results and offer mutual value to your business and to customers at the same time.
Tags : 
linkedin, marketing funnel, content management, content strategy, customer engagement
    
TheMarketingScope
Published By: Marketo     Published Date: Oct 17, 2016
When you think about holiday marketing, perhaps one or two campaigns stick out to you, but because of the multitude of messages, it’s hard for most people to pick one out from the crowd. Marketers face the challenge of standing out from the crowd, and capturing consumers’ attention with fun, relevant, and personalized campaigns in order to drive revenue. This guide will walk you through eight steps that cover how to plan and run an effective holiday marketing campaign.
Tags : 
holiday marketing, personalization
    
Marketo
Published By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Marketo     Published Date: Mar 20, 2018
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders t
Tags : 
    
Marketo
Published By: Bronto     Published Date: Jan 02, 2014
Attention digital marketers, we are no longer in control. Whether they realize the true strength of their powers or not, consumers now have the upper hand of the digital marketing experience. Download this e-book to explore each phase of the customer lifecycle and detail programs to reach your customers across channels, devices and levels of engagement.By downloading now, you'll gain instant access to Chapter 1, Acquiring and Welcoming New Subscribers. Then, keep an eye on your inbox for the remaining 5 chapters over the next few weeks.
Tags : 
lifecycle marketing, customer engagement, e-commerce marketing, acquiring subscribers
    
Bronto
Published By: Symantec     Published Date: Nov 30, 2015
Noël approche. La dinde est bien dodue... mais attention à ne pas vous la faire plumer.
Tags : 
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps
    
Symantec Corporation
Published By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
    
AlienVault
Published By: IBM     Published Date: Feb 18, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
ibm, release cycles, mobile testing
    
IBM
Published By: IBM     Published Date: May 18, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
testing solutions, mobile testing, testing times, survey insights, release cycles, report analysis
    
IBM
Published By: Jigsaw     Published Date: May 12, 2010
In sales and marketing - only two things matter: Getting people's attention, and what you tell them when you have it
Tags : 
jigsaw, value proposition, messages, sales, marketing, seo, google, adwords
    
Jigsaw
Published By: AdRoll     Published Date: Sep 06, 2016
According to VentureBeat, for the past 10 years, email has produced higher ROI than all other marketing channels. But email marketing requires thoughtful attention to detail in order to drive sales. Learn actionable 12 tips to supercharge your highest performing channel.
Tags : 
email, marketing, channel, roi, copy creation, programatic
    
AdRoll
Published By: NEC     Published Date: Aug 12, 2014
NEC has introduced the Express5800/A2000 Series Servers to accommodate enterprise application demands with peak server reliability, availability, and serviceability. The new server architecture and NEC engineering functionality align well with many of the most important IT priorities in 2014, including virtualization, big data and advanced data analytics. With the Express5800/A2000 Servers, NEC has the opportunity to educate application owners and work with system integrators to drive awareness and ultimately investment in its new server platform, which will help drive customer value. In this white paper, you will learn how these next-generation servers from NEC are ready to accommodate some of today’s demanding workloads.
Tags : 
servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability
    
NEC
Published By: [x+1]     Published Date: Jan 24, 2007
Publishers spend millions generating content, designing user experiences, and promoting themselves as the destination of choice when people open up their browsers. In order to pay for the user's attention, they sell impressions. But who should publishers sell to? Be sure to consider the key points explained in this paper.
Tags : 
online ad sale, ad sales, online ad sales, ad serving, graphical/cpm, banner advertising, prestitials
    
[x+1]
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library