attention

Results 251 - 275 of 290Sort Results By: Published Date | Title | Company Name
Published By: Spredfast, Inc.     Published Date: Oct 22, 2014
During the busy holiday season, it takes exceptional marketing to stand out from the crowd. Make a statement with social integrations that place your customer at the heart of your campaign. It’s a timeless look. During the 2013 holiday season, luxury watch retailer Tourneau increased watch sales 57% by helping fans find the perfect gift with their omni-channel #TourneauKnows campaign. Just as in fashion, your brand should seek campaign inspiration further afield. Take a cue from tech sector giant, Cisco, who breathed new life into the banner ad by creating socially powered ad units. It was an arresting experience that aligned with readers of The Huffington Post, where the ads were displayed. If you are seeking new, innovative ways to capture your audience’s attention this holiday season—look no further—we’ve curated the top five social experiences for the holidays to inspire your efforts.
Tags : 
spredfast, holidays, social media, social experiences, creativity, instagram, daily deals, black friday
    
Spredfast, Inc.
Published By: Sprinklr     Published Date: Feb 28, 2018
"Complacency is kryptonite for customer care. It’s an evolving organism that requires speed and constant attention, and that’s why it’s imperative to stay up-to-date. Download for help with handling the complexities of social media, driving engagement, and increasing retention."
Tags : 
social customer care, customer care, customer care program, customer service, social customer service, social media customer service, social media, social
    
Sprinklr
Published By: Sprinklr     Published Date: Mar 13, 2018
"Complacency is kryptonite for customer care. It’s an evolving organism that requires speed and constant attention, and that’s why it’s imperative to stay up-to-date. Download for help with handling the complexities of social media, driving engagement, and increasing retention."
Tags : 
    
Sprinklr
Published By: Staples     Published Date: Jun 23, 2017
Every year, musculoskeletal disorders (MSDs) cost workplaces billions. See how attention to ergonomics can change that.
Tags : 
ergonomic, msd, improving productivity, musculoskeletal disorders
    
Staples
Published By: Stitch Labs     Published Date: Sep 05, 2014
From gathering data to building customer loyalty to closing a sale, more and more retailers are turning to free shipping. Find out what this attention-getting offer can do for your e-commerce site.
Tags : 
stitch labs, stitch labs guide, platform, tips, retail, warehouse, management, optimize
    
Stitch Labs
Published By: StoryDesk     Published Date: Jan 04, 2013
What makes for a winning iPad presentation app for sales teams? How can interactivity keep prospects' attention focused? How can you use technology to make your message more memorable? Learn the answers to these questions and more.
Tags : 
    
StoryDesk
Published By: Success Factors     Published Date: Jul 27, 2012
When it comes to evaluating software investment decisions, such as on- premise vs. cloud-based solutions, many factors must be considered. In particular, pay attention to four key areas: support for business strategy, operations, security, and cost.
Tags : 
success factors, sap, cio goals, cloud solutions, cloud applications, cloud application vendors, cio cloud goals, employee central
    
Success Factors
Published By: SundaySky     Published Date: Mar 06, 2018
Brands no longer hold all the cards in their relationships with consumers. This is the age of empowered customers. They are in control, and they will quickly disengage at the first sign of irrelevance. Regaining their attention once that has happened is difficult. That is why so many CMOs and marketers are searching for new ways to engage and transform consumer relationships. Providing value-rich video ad experiences can mean the difference between being remembered for all the right reasons, and getting lost in the cacophony of advertising chatter. These kinds of ads motivate consumers to take the next-best actions that drive customer behavior change and help brands achieve their business goals far more effectively than traditional formats.
Tags : 
    
SundaySky
Published By: Symantec     Published Date: Nov 30, 2015
Noël approche. La dinde est bien dodue... mais attention à ne pas vous la faire plumer.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps
    
Symantec Corporation
Published By: Tableau Software     Published Date: Dec 12, 2014
Congratulations: you are part of a small but growing group that’s taking advantage of the power of visualization. However, bringing your visualizations from “good” to “great” takes time, patience, attention to detail, and some basic knowledge of visual analysis best practices.
Tags : 
tableau, visual analysis, visualization, best practices, data management
    
Tableau Software
Published By: TARGUSinfo.     Published Date: Jul 31, 2008
Consumers contact you through a growing number of channels. With this Yankee Group study, you'll learn how predictive analytics can help you instantly identify your best customers and prospects, match them to the best agents and give them more personalized attention - thus maximizing customer acquisition and cross-sell opportunities.
Tags : 
targusinfo, targus info, customer, analytics, customer behavior, behavior, customer insight, feedback
    
TARGUSinfo.
Published By: Tealeaf     Published Date: Mar 31, 2011
Given the increasing importance of connected channels to nearly all businesses and government functions, it is no wonder that analysis of these channels is getting more attention.
Tags : 
tealeaf, advanced site optimization, web analytics, digital analysis application, analytics intelligence
    
Tealeaf
Published By: TheMarketingScope     Published Date: Oct 28, 2015
You have to think holistically with a full funnel solution that can deliver content, drive real results and offer mutual value to your business and to customers at the same time.
Tags : 
linkedin, marketing funnel, content management, content strategy, customer engagement
    
TheMarketingScope
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices
    
ThreatTrack Security
Published By: TIBCO Software     Published Date: Feb 27, 2019
Blockchain in Financial Services is receiving a lot of attention, especially for synchronizing financial agreements between institutions. But how can blockchain be used outside of this context? Can it apply to use cases such as identity, fraud, and AML? Watch this short webinar to hear how blockchain can be used to solve other key issues facing the industry, about research into consensus algorithms beyond proof of work, and about myths and truths that must be considered for a successful enterprise blockchain implementation. Speaker: Nelson Petracek, CTO, TIBCO Software
Tags : 
blockchain, financial services, fraud, aml
    
TIBCO Software
Published By: Trend Micro     Published Date: Oct 12, 2012
The consumerization and mobilization of enterprise IT is a real, irreversible, and unstoppable movement that needs immediate attention and innovative solutions.
Tags : 
information technology, security, trend micro
    
Trend Micro
Published By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the market’s (and Gartner’s) attention. Over the years, we’ve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. It’s clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
    
Trend Micro
Published By: Tripp Lite     Published Date: May 15, 2018
As organizations pursue improvements in reliability and energy efficiency, power design in data centers gets substantial attention—particularly from facilities and engineering personnel. At the same time, however, many IT professionals tend to spend little time or energy on the specific products they use to deliver and distribute electrical power. In?rack power is often considered less strategically important than which servers or databases to deploy, and it is often one of the last decisions to be made in the overall design of the data center. But choosing the right in-rack power solutions can save organizations from potentially crippling downtime and deliver significant up-front and ongoing savings through improved IT efficiency and data center infrastructure management.
Tags : 
    
Tripp Lite
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
    
Tripwire
Published By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : 
veracode, security, supply chain security, web applications, application security
    
Veracode
Published By: Verio     Published Date: Jun 20, 2012
Few innovations have captured the attention of the technology industry or the imagination of the broader business community faster than Cloud Computing.
Tags : 
cloud computing, cloud-based services, saas, paas, iaas, software-as-a-service, platform-as-a-service, infrastructure-as-a-service
    
Verio
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library