awareness

Results 101 - 125 of 208Sort Results By: Published Date | Title | Company Name
Published By: Alert Logic     Published Date: Jun 12, 2014
While e-commerce remains a relatively small percentage of overall retail spending (rates vary by country, but are generally in the 5–10% range), it continues to grow. The ongoing growth of e-commerce suggests that one of the initial objections to online shopping—concerns about whether consumer personal information would be secure—has been largely overcome. Standards like PCI, and payment services like PayPal, along with a general increase in security awareness, have gone a long way to change the perception of online shopping. Learn more about Information Security in the E-commerce Sector.
Tags : 
cloud security, cloud e-commerce, cloud pci, e-commerce security, compliance
    
Alert Logic
Published By: Riverbed     Published Date: Feb 21, 2018
Amazon Web Services has transformed how we think of IT infrastructure. It takes minutes to set up elastic compute and storage. As you grow, turning up EC2 instances, VPCs, and AWS services is akin to acquiring more ninja weapons; practice is needed to gain proficiency. With legions of compute and capacity a button-push away, the need to hone your skills in connecting your workforce to the cloud becomes critical. At Riverbed, that’s what we do. We let you spawn a full-mesh VPN network between your VPCs and branches, deploy the latest in cloud architecture trends using transit-VPC designs, and even allow for the use of AWS DirectConnect and VPN connectivity simultaneously using our powerful SD-WAN technology. Ninja-like benefits of agility, speed, and awareness are effortlessly available to you. Watch Riverbed unveil the full power of a true software-defined WAN (SD-WAN) in the cloud with a detailed conversation and live demo. Join us to learn: How the Riverbed-AWS partnership suppor
Tags : 
    
Riverbed
Published By: EMC     Published Date: May 28, 2015
For this report, IDC conducted a survey of large enterprises around the globe to explore public, private, and hybrid cloud IT adoption trends.
Tags : 
emc, cloud computing, hybrid cloud, it cloud strategies, infrastructure
    
EMC
Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement
    
SAP
Published By: SAP     Published Date: Mar 24, 2011
The list of initiatives that are data-enabled-indeed, data-intensive-vary from company to company, from industry to industry. But the common denominator is an increasing awareness that these and other programs can't succeed without clean, meaningful, and available information. In this white paper, Baseline Consulting's Jill Dyché discusses how the data conversation is changing from philosophical questioning to hard-core tactics, from "What do we need?" to "Where do we start?" It covers the most common reasons for data governance failure, as well as the components of data governance that will inform the right strategy and give companies a means of determining where and how to begin their data governance journeys.
Tags : 
data governance, data governance failure, data governance initiative
    
SAP
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management
    
Qualys
Published By: Sysomos     Published Date: Oct 24, 2012
Getting the right people excited about your brand is a powerful way to increase brand awareness and make sales. But how do attract influencers and get them talking about you? Here are 6 tips from Sysomos.
Tags : 
social media monitoring tools, business intelligence, analysis, analytics, dashboard, tracking, trends, assessment, agency, marketers, business, enterprise, network, twitter, facebook, fans (24), influencers, fans, followers, evangelists
    
Sysomos
Published By: IBM     Published Date: Jul 27, 2015
Read this white paper for insight into the trends and factors driving the future of energy and utilities, and the resulting implications for the industry.
Tags : 
insights, trends, business models, iot, internet of things, situational awareness, big data cloud computing, viable substitutes, customer engagement
    
IBM
Published By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : 
blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Lotame     Published Date: Jun 01, 2010
Lotame's whitepaper presents the first ever study of brand equity measures (including brand awareness, favorability, ad recall, and purchase intent, and viewership intent) and their mathematical relationships to clicks, interaction rates, and time spent.
Tags : 
lotame, metrics, branding, brand awareness, clicks, interaction rates, clicks, romi, recall
    
Lotame
Published By: Intel Corp.     Published Date: Aug 08, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated storage and the discernment to send new data or not is performed within the production server instead of the backup server or deduplicated storage. Hence, network savings begin at the production server and backups are significantly faster since only changed data is transmitted from the production server to the storage solution.
Tags : 
dedupe, 2.0, store, once, enterprise, strategy, group, client, deduplication, dedupe, awareness, backup, server, storage, device, data, technology
    
Intel Corp.
Published By: SocialChorus     Published Date: Jan 07, 2014
Thanking advocates for their efforts is an important component to Advocate Marketing success. Whether your goal is to motivate advocates to create and share brand content or increase awareness, a comprehensive Thank You strategy is vital in keeping your employee, consumer and blogger advocates engaged and sharing.
Tags : 
advocates, advocate marketing, brand ambassadors, employee advocates, consumer advocates, bloggers
    
SocialChorus
Published By: SocialChorus     Published Date: Jun 06, 2014
Employee-shared content increases reach 10x and engagement 8x. That’s why leading brands are launching Employee Advocate Marketing programs to drive the marketing metrics they care about most, including increased awareness, social engagement and new customers. But what are the steps they took to launch and maintain a successful program? Download this guide and step-by-step checklist for everything you need to know to launch an employee Advocate Marketing program. Download the guide and checklist to learn: • The steps to launch an employee Advocate Marketing program • Proven best practices to grow your program • The recommended timeline and steps to ensure the program drives your goals
Tags : 
employee advocacy, employee advocates, employee advocate marketing, advocate marketing
    
SocialChorus
Published By: Dyn     Published Date: Jan 14, 2015
Whether your business is establishing brand awareness, driving online sales or executing a digital advertising strategy the fact of the matter is, your website performance matters.
Tags : 
network latency, website performance, latency, dns network, business intelligence
    
Dyn
Published By: Adobe     Published Date: Nov 05, 2014
When mobile is done right, businesses reap the benefits. Companies using mobile analytics see an 11.2% increase in marketing ROI compared to a 15.9% decrease for companies that don’t. The Aberdeen Group report, Mobile Analytics: Precision Marketing across Mobile Touch-Points, provides insights into better mobile strategies. Read the report to see how incorporating analytics into your mobile marketing strategy will: • Increase brand awareness • Raise your return on marketing investments • Boost average order value • Improve time-to-market of products and services
Tags : 
mobile analytics, precision marketing, mobile touch-points, mobile analytics
    
Adobe
Published By: IHS GlobalSpec     Published Date: Jul 09, 2014
Industrial customers use content to research and make purchasing decisions. Are you giving them the info they need? Developed by IHS GlobalSpec, this white paper explains the growing importance of using content to attract, acquire and engage engineers and technical professionals. Content marketing positions your company as an expert, builds trust and introduces new products and services to a wider audience via webinars, technical articles, social media and more. Find out which content appeals most to technical professionals. Learn how to provide information that fulfills their needs at specific points in the buying cycle. And see examples of how and where industrial suppliers effectively use content marketing to deliver information that can help turn shoppers into buyers. Content Marketing for Industrial Marketers also explores the challenges of producing enough of the right content, repurposing it across multiple channels and budgeting for it. Plus, it provides the steps to start dev
Tags : 
ihs globalspec, influence buying decisions, content marketing, purchasing decision makers, content marketing strategy, building brand awareness, content marketing vehicles, engagement opportunities, user-generated content, improve engagement, engaging content, social media engagement, re-using content, b2b content marketing, content assets, content marketing budgets, curating information, content marketing measurement, industrial marketers
    
IHS GlobalSpec
Published By: Campaigner     Published Date: Apr 30, 2015
This report is about working with a Campaigner SMTP Relay to increase message deliverability, improve customer service, enhance your brand and drive more revenue.
Tags : 
email marketing, message deliverability, smtp relay, brand awareness, customer engagement, customer relationships, transactional emails
    
Campaigner
Published By: CrowdTwist     Published Date: Dec 02, 2015
This e-book offers 41 loyalty marketing ideas to help you keep customers engaged with your brand beyond transactions and develop more rewarding relationships.
Tags : 
crowdtwist, customer loyalty, social media marketing, brand awareness, mobile marketing, customer experience
    
CrowdTwist
Published By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : 
security, data security, networks, branding, attacks, security, security breach, safeguarding, infastructure, risk, risk tolerance, security attacks
    
IBM
Published By: IBM     Published Date: Apr 13, 2015
To understand why customers make the purchase choices they do, it may be helpful to look rigorously at all the moments that have an influence on their final actions. This reasoning is the basis of concepts variously called “purchase funnel,” or the “path to purchase” or “moments of truth” by product marketers. It implies a rather linear progression from general awareness to preference to decision to acquisition of a specific product. The end game is customer success. It’s what we all want to happen. Along the way we’ll do our best to illuminate: • How did the customer arrive at the best possible purchase outcome? • What decision moments can the retailer influence along the way? • What tools can the retailer use exert these influences? • What actions can the retailer take to bring them there?
Tags : 
ibm, purchasing, purchase funnel, acquisition, customer influence, retail
    
IBM
Published By: Polycom     Published Date: Nov 09, 2015
This study, sponsored by Polycom, is intended to raise awareness of the value and importance of these misunderstood, mismanaged, and often under-appreciated meeting spaces.
Tags : 
polycom, meeting, wainhouse, end-user, research, collaboration
    
Polycom
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco
Published By: Semphonic     Published Date: Jun 11, 2009
A Microsite is an independent, focused website subsidiary to a larger, parent website. Its marketing, branding, and Search/Viral potential has been increasingly recognized by marketing and website managers, but measurement and analysis of a Microsite’s effectiveness requires analytical strategies and approaches that differ from the analysis of the parent website. Learn more today!
Tags : 
microsite, microsites, semphonic, independence, integration, saturation, directionality, lifetime contribution, branding awareness, keyword concentration, sourcing velocity, seo, kpi, conversion, saturation, sourcing
    
Semphonic
Published By: VMS     Published Date: Jul 31, 2009
One of the big challenges with massive PR initiatives is the difficulty in measuring the outcomes as it pertains to your brand and business objectives set. Read this guide for a five step process that will help you determine the impact of your PR initiatives and compare it to the organizational goals they were aimed to accomplish.
Tags : 
awareness, preferences, share, share of discussion, brand equity, cgm/wom, goals, economy, measurement strategies, budget, pr objective, objective, smart media, share, radio monitoring, proof of performance, realtime monitoring, artificial intelligence, human analysis, opportunities to see
    
VMS
Published By: VMS     Published Date: Jul 31, 2009
In the times of increased awareness and integrated communication across channels, it is crucial to understand correlation between the advertising spend and the PR that surrounds your brand. This report sheds new light on the impact of earned and paid media on the effectiveness of paid advertising.
Tags : 
vms, economy, measurement strategies, budget, pr objective, objective, smart media, share, radio monitoring, proof of performance, realtime monitoring, artificial intelligence, human analysis, opportunities to see, ots, metrics, benchmark, proof of performance, communications, vantage
    
VMS
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library