devices

Results 1551 - 1575 of 1805Sort Results By: Published Date | Title | Company Name
Published By: Bronto     Published Date: Jan 02, 2014
Attention digital marketers, we are no longer in control. Whether they realize the true strength of their powers or not, consumers now have the upper hand of the digital marketing experience. Download this e-book to explore each phase of the customer lifecycle and detail programs to reach your customers across channels, devices and levels of engagement.By downloading now, you'll gain instant access to Chapter 1, Acquiring and Welcoming New Subscribers. Then, keep an eye on your inbox for the remaining 5 chapters over the next few weeks.
Tags : 
lifecycle marketing, customer engagement, e-commerce marketing, acquiring subscribers
    
Bronto
Published By: Bronto     Published Date: Dec 03, 2015
Bronto has teamed up with Apparel Magazine to shed some light on Millennials and how they are using mobile devices. Download our new infogram and learn!
Tags : 
bronto, mobile, millenial, mobile device, social media, crm & customer care, e-commerce
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices
    
Bronto
Published By: Symantec     Published Date: Nov 30, 2015
Two trends make code signing more important than ever: the explosion of consumer applications for mobile and desktop devices and the proliferation of malware.
Tags : 
    
Symantec
Published By: Oracle     Published Date: Sep 30, 2014
On average, about 40 percent of e-mail opens come from mobile devices and tablets. Mobile subscribers are less engaged because they are being forced through an experience that is not optimized to help them take the action marketers are asking them to. As a marketer, it's daunting figuring out how to address this growing challenge. This guide walks you through where to begin and provides some design strategies to help you capture those clicks.
Tags : 
oracle, marketing, cloud, connected, customer, modern, mobile, email
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
"Consumers worldwide have nearly 5 billion active mobile subscriptions- that’s almost a billion and a half more active mobile subscriptions than toothbrushes sold. With more than five times more mobile devices than PCs on the planet today, as a marketer, chances are your messages are being consumed in the mobile channel. If you’re not aligning your strategies with this new reality, you may find your business headed the way of the landline."
Tags : 
oracle, marketing, cloud, connected, customer, modern, growing, mobile
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
Mobile devices are transforming how we interact with each other and the world. Tapping mobile potential doesn’t have to take sorcery. Don’t let your efforts to keep up create a fragmented customer experience. You need an orchestrated way to plan, respond, and thrive in the new mobile marketing world. Read how.
Tags : 
oracle, marketing, cloud, connected, customer, modern, crm & customer care
    
Oracle
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale
    
Symantec Corporation
Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
When you're starting service with a customer, setting the tone early on is very important. That's why we've created a checklist to help you stay organized from the start and implement smart process around your Managed Security Service Provider (MSSP) service. Feel free to use it but most importantly modify it. Use this checklist to help you document: • Network information • Logging devices • Contact information • Priority escalation contacts • Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault
Published By: IBM     Published Date: Mar 10, 2015
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, systems development, product development, traceability, customer lifecycle
    
IBM
Published By: Lazar_Rocket Fuel     Published Date: May 05, 2016
As the number of devices multiplies at a rate that far outpaces growth in the number of actual consumers, marketers must now realize that they have to market to people, not devices. The question is: how do you do that in the most tech-savvy and cost-effective way possible? Let’s take a step-by-step approach to that challenge.
Tags : 
rocketfuel, internet of things, iot, devices, marketing, fragmented marketing, internet enabled devices, emerging marketing
    
Lazar_Rocket Fuel
Published By: Act-On     Published Date: Jan 08, 2015
Ready to move past the basics of email marketing and learn new techniques to optimize your email results? This guide will give you five tips for more successful - and more profitable - email campaigns, including: How to increase engagement with responsive design, tips for better email personalization, ideas for effective trigger emails, effective ways to integrate with social media, and so much more!
Tags : 
act-on, email guide, email campaigns, mobile emails, mobile devices, personalization, personal content, email marketing
    
Act-On
Published By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : 
wlan, wireless security, wireless freeloaders, wireless rogue, rogue, rogues, wireless infrastructure, monitoring
    
AirDefense
Published By: TDI Transistor Devices     Published Date: Feb 06, 2009
Uninterruptible Power Solutions are often solved at the facility level with unnecessarily large, inefficient, expensive and complex AC UPS systems. While this provides an easy demarcation line between the facility and end equipment, with each focusing on a different part of the problem, it also results in overall operating efficiency and total cost of ownership being difficult to ascertain and optimize.
Tags : 
tdi, transistor devices, data processing, uninterruptible power solutions, ups, operating efficiency
    
TDI Transistor Devices
Published By: TDI Transistor Devices     Published Date: Feb 06, 2009
Modern Electronic Systems are quite often powered from a three-phase power source. While utilizing power modules that operate directly from three-phase power might seem to provide optimal simplicity and flexibility, the added complexity required to realize three-phase power factor corrected circuitry usually negates any potential savings.
Tags : 
tdi, transistor devices, electronic power systems, single phase power, three phase power, power transfer maximization, component count, three phase circuits
    
TDI Transistor Devices
Published By: Special Counsel     Published Date: May 14, 2015
In this white paper, we examine how smarter and more connected personal devices are spreading connectivity outward, eventually marrying personal data and services with information from the wider world.
Tags : 
personal devices, personal data, information, connectivity, innovation, internet of things
    
Special Counsel
Published By: Informatica     Published Date: Jul 07, 2011
Explore how retailers can generate a single view of customers who engage across multiple channels-online, in stores, and via call centers, on social media, and mobile devices.
Tags : 
informatica, competitive edge, customer information management mdm, master data management, multichannel retail environment, social media, single view, customer activity
    
Informatica
Published By: Absolute Software     Published Date: Dec 20, 2012
David Johnson, Senior Analyst at Forrester has a look forward to the reality of supporting Apple devices in a post-BYOD world.
Tags : 
byod, network security, mobile, security, policy, apple, end user, device
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.
Tags : 
apple, devices, patch management, ios, support, end user
    
Absolute Software
Published By: Alacritech     Published Date: Aug 21, 2009
Customers are increasingly constrained by large transfers of data backup, long backup times to storage devices, and less efficient use of server resources as a result. System and database availability is heavily impacted during backup periods, and with the rapid growth of storage and the need to archive customer data, IT managers are actively seeking solutions for their backup problems.
Tags : 
data backup, backup and recovery, storage, database availability, backup, recovery, servers, backup server
    
Alacritech
Published By: Schneider Electric     Published Date: Feb 12, 2018
Technology is infiltrating K-12 classrooms at a rapid clip as educators find new ways to employ computing devices and online resources to improve education and learning. Overall, the global market for education-related technology, services and content is expected to grow from $193 billion in 2016 to $586 billion in 2021, a compound annual growth rate of nearly 25%, according to the market research firm Research and Markets.
Tags : 
    
Schneider Electric
Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing
    
AppSense
Start   Previous    56 57 58 59 60 61 62 63 64 65 66 67 68 69 70    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: