message

Results 326 - 350 of 413Sort Results By: Published Date | Title | Company Name
Published By: Marketo     Published Date: Oct 17, 2016
A great email helps you engage your customer and deliver your message, which can make a difference between a click-through and a direct route to your website or losing a customer’s interest and being sent to the spam folder. As consumers become increasingly savvy about all types of communications—from mobile to social to email—email, for example think about Gmail’s tabbed inbox where users can filter and organize their inboxes. It is becoming even more difficult to stay front and center. Download now to learn more!
Tags : 
email marketing, email blasts. electronic marketing
    
Marketo
Published By: VeriSign     Published Date: Jul 14, 2010
As consumers are constantly bombarded with messages that their online security is threatened, they can be hesitant to trust any kind of online transaction. If online transactions are your goal, the solution is to add trust signals to your Web site, such as those outlined in this white paper.
Tags : 
verisign, online retail, seo, customer confidence, security, ecommerce, shoppers, online purchasing
    
VeriSign
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: PostUp     Published Date: Dec 17, 2014
With the addition of mobile technologies, organization’s need to update their email programs to allow for these new technologies, however, deciding what design best practices to use can be a long and tedious process. Download this whitepaper to receive 8 great tips for mobile email design and make designing messages for a mobile audience a top priority for your organization.
Tags : 
postup, mobile responsive, mobile email, email marketing best practices, design mobile, designing for mobile, mobile email design, email marketing
    
PostUp
Published By: PostUp     Published Date: Dec 17, 2014
If you have been keeping up with email marketing trends, you know that personalization is a hot topic. Delivering personalized, timely messages allows you to stand out in the ever competitive inbox, but how is this executed? With a blended content strategy.
Tags : 
postup, email personalization, personalization, email content, email marketing strategies, behavioral marketing, email marketing trends, blended content strategy
    
PostUp
Published By: Jigsaw     Published Date: May 12, 2010
In sales and marketing - only two things matter: Getting people's attention, and what you tell them when you have it
Tags : 
jigsaw, value proposition, messages, sales, marketing, seo, google, adwords
    
Jigsaw
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific—like CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters—like marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, new technology, automation, business-to-business, personalized marketing
    
AdRoll
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific—like CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters—like marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, business-to-business, personalized marketing, automation
    
AdRoll
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific—like CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters—like marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, business-to-business, personalized marketing, automation
    
AdRoll
Published By: Silverpop     Published Date: Jan 20, 2007
In the early days of email, online marketers would happily shoot a thousand arrows in the hopes of hitting a lone bull’s eye. But in a channel long since overrun by spam and irrelevant marketing messages, marketers have turned to advanced techniques and technology to ensure their messages are delivered, anticipated and welcomed by recipients.
Tags : 
email vendors, vendors, email marketing, email management, vendor selection
    
Silverpop
Published By: Message Systems     Published Date: Jan 23, 2007
"Because of Message Systems, today we can intimately and accurately monitor our email. The second an issue arises, we make adjustments to correct it." Find out why Bluestreak's CTO is so pleased in this case study.
Tags : 
email marketing, deliverability, bluestreak, message systems, messagesystems, email deliverability, e-newsletters, newsletters
    
Message Systems
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag
    
VisiStat
Published By: Altova     Published Date: Aug 21, 2009
The ability to offer customers business content in multiple formats, such as Web pages, email messages, Word documents, PDF documents, etc., is vital for meeting customers' needs and expectations in today's hyper-competitive Internet economy.
Tags : 
xml, search engine, multiple format, multiple formats, customer service, content delivery, altova
    
Altova
Published By: PKWARE     Published Date: Oct 22, 2007
Text-messaging, or SMS, usage is on the rise while email usage is falling. Meanwhile many more mobile phones than personal computers are sold around the world. Long story short: Marketers who want to reach consumers with targeted campaigns had better put an SMS strategy in place. mobileStorm's new white paper, "SMS Or Die," explains why mobile marketing, particularly SMS marketing, is the ideal platform to reach consumers.
Tags : 
sms marketing, mobile marketing, email marketing, text messaging, text marketing, sms, sms, mobile
    
PKWARE
Published By: Reactivity     Published Date: Aug 21, 2009
The vast majority of IT professionals and business people agree that security is the leading concern for SOA and XML messages and most quickly realize that SSL is limited by not providing content security, auditability or reliability. This paper will discuss how to extend SOA beyond the perimeter through high performance.
Tags : 
soa, web services, xml, service oriented architecture, service-oriented architecture, soa security, xml security, security performance
    
Reactivity
Published By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : 
security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention
    
Secure Computing
Published By: Symantec     Published Date: Nov 17, 2006
The latest release of Backup Exec allows you to eliminate backup windows and recover individual Exchange messages, folders, and mailboxes - without mailbox backups. Learn more about how Symantec Backup Exec™ 11d for Windows® Servers provides continuous, cost-effective, and high-performance disk-to-disk-to-tape backup and recovery for Windows server data.
Tags : 
disaster recovery, backup and recovery, storage management, network management, network performance, network performance management, business continuity, windows server
    
Symantec
Published By: Symantec     Published Date: Feb 09, 2007
Imagine being able to eliminate your backup windows and recovery individual Exchange messages, folders, and mailboxes - without mailbox backups. Read this document to find out how Backup Exec 11d for Windows Servers provides the gold standard in continuous, cost-effective, high-performance disk-to-disk-to-tape backup and recovery.
Tags : 
storage, backup and recovery, email archiving, windows server, symantec, backup plan, backup, back-up
    
Symantec
Published By: Quocirca     Published Date: Jul 03, 2008
Businesses of all sizes adopt technology to make them more productive, cost effective or flexible and help them compete. Over the years the adoption of tools such as mobile phones, wireless laptops, the internet and email have all been driven by such expectations. Small and mid-sized businesses (SMBs) are often at the forefront as these technologies can give them a lead on their larger competitors. What starts as a useful extra tool or 'competitive edge' soon becomes the accepted norm and a search for improved quality and utility then ensues.
Tags : 
convergence, mobile, wireless, communications, unified communications, quocirca
    
Quocirca
Published By: TriTuns Innovation     Published Date: Nov 21, 2008
Discover the tangible benefit of creating and delivering Customer Engagement Campaign emails that integrate corporate marketing with their sales team profiles (From address, their picture, a message from them - along with all the relevant corporate content), for a true 'connected' solution.
Tags : 
tailored mail, email marketing program, customer engagement campaign, email service provider, email campaigns
    
TriTuns Innovation
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam
    
GFI
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The proliferation of remote and unmanned facilities is exposing many enterprises to devastating events. The need is to not only detect a threatening condition, but to also get a precise message to the person who is prepared to do something about it.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Advantix Communications     Published Date: Oct 26, 2007
Today, most healthcare professionals carry mobile phones. These phones are capable of sending and receiving text messages; immediately, non-intrusively and cost effectively. Text messaging has opened up a revolutionary way for healthcare organizations to interact with their health care staff.  This document will help the reader to understand the costs associated with current staffing organizations' communications and identify a cost effective alternative.
Tags : 
nurse communications, sms for healthcare, sms for health care, text messaging communications, cell phone messaging, cellphone messaging, mobile phone messaging, health care text message
    
Advantix Communications
Published By: MessageLabs     Published Date: Jan 13, 2009
New spamming techniques are upon us -  419 spam, botnets, CAPTCHA cracking – what’s next from the 'bad guys'? Spam remains the biggest email-born threat to businesses. Learn how to protect your business.  FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, secure network, block spam, spamming techniques, spam, business threat
    
MessageLabs
Published By: MessageLabs     Published Date: Jan 13, 2009
Spam, viruses and other malware pose a serious threat to your business.  Is your email security accurate enough to protect you?Re-evaluate your solution FREE Email Security Buyer’s Guide (PDF/40KB)
Tags : 
messagelabs, email security, email security buyer’s guide, spam, viruses, malware
    
MessageLabs
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library