target

Results 76 - 100 of 1054Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Nov 22, 2017
A user initiates the call and selects the source language, such as Spanish. (In this example, assume that the target language is set to English.) As the user is talking to the support representative, the audio is converted to text using the Speech to Text service. Then using Language Translator, the text is translated to English. English language text is then sent to the Text to Speech service as input. The output audio message is what the support representative hears. All of this happens in near real time. The text from Speech to Text and the Language Translator service also can be stored in a database for analytics. The same process is repeated in reverse for the audio message sent by support personnel.
Tags : 
source, language, english, spanish, speech to text, database, analytics, audio message, support
    
IBM APAC
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security, prevent cyber-attacks
    
Kaspersky Lab Australia and New Zealand
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
cybercrime, security, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : 
collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue, media promotions, measurable influence, maturity level
    
Collaborative Consulting
Published By: Acxiom Corporation     Published Date: Mar 12, 2014
In July 2013 Acxiom commissioned Forrester Consulting to evaluate how companies use the data they collect from their customers to make better decisions on their marketing campaigns by gauging their experiences and attitudes around their use of and future vision for using customer data across multiple marketing channels. In order to understand this topic, we conducted interviews with 11 executives representing a range of roles and perspectives, including consumer packaged goods companies, financial services organizations, and agencies.
Tags : 
acxiom, forrester, data, marketing, marketing campaigns, cross channel, customer data, market research, targeting, data analytics, life cycle management
    
Acxiom Corporation
Published By: Acxiom Corporation     Published Date: Mar 12, 2014
If you are responsible for online advertising, this report is going to change the way you look at your banner ads forever. It did for us. But, step one on the road to this transformation was deciding exactly what to measure. Download this whitepaper to learn about a new measurement approach that proves banner ads boost offline sales.
Tags : 
acxiom, marketing, measurement, banner ads, display advertising, targeting, marketing campaigns, marketing analytics, data analytics, online engagement
    
Acxiom Corporation
Published By: Websense     Published Date: Jan 25, 2013
“Is this email a phish or is it legitimate?” That’s the question that employees — and executives in particular - read this white paper to learn guidance on how to recognize advanced threats and protect yourself from them.
Tags : 
phishing, targeted attacks, websense, security, scams, defence, key topics, security guidance
    
Websense
Published By: HERE Technologies     Published Date: Jan 08, 2019
Every day we use location apps on smartphone devices to get us where we need to go, and to find services and products we’re looking for. However, smartphone location apps aren’t just helping individuals navigate their way around. Forward-thinking businesses are using these apps to help them get their messages straight to the right audience, at the right time, too. It’s why the connected car and in-map location marketing is a growing area of opportunity—helping companies to meet KPIs whilst transforming the landscape of marketing at the same time. This on-demand webinar with experts from HERE and eMarketer discusses how to improve location-based audience segmentation and build a more accurate consumer profiles, as well as how real-time location targeting enables hyper-targeted marketing campaigns.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Targeted threats are increasing at an alarming rate. Malicious actors are evolving their methodologies and are increasingly exploiting the domain name system (DNS) to launch cyberattacks. Learn more about how to proactively protect your company with an additional layer of cloud-based security.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer, including bridging the journeys between digital and physical worlds, you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. And with nearly all smartphones equipped with geolocation abilities, advertisements can be made location-aware with improved precision for targeting. Understanding location is key to gaining improved insights. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them to provide well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Dell EMC     Published Date: Aug 17, 2017
This report highlights a unique approach to enabling IT to succeed in the digital age—a fully engineered converged infrastructure with richly supported capabilities for management, updates and configuration, security, and overall resilience. In particular, this report targets Dell EMC’s distinctive leadership in converged/hyper-converged infrastructure, while highlighting the many compelling benefits achieved in two real-world deployments: an enterprise and a global service provider.
Tags : 
it transformation, digital transformation, converged infrastructure, hyper-converged infrastructure, deployments
    
Dell EMC
Published By: Akamai Technologies     Published Date: May 08, 2017
• Our survey of companies that currently offer, or plan to launch, so-called “direct to consumer,” or over-the-top (OTT), video services in the market suggests that the industry is maturing. Though 51 percent of those surveyed view their video service as a money-making venture, 49 percent see it as providing some other primary benefit to the company. Not only are the types of OTT video services offered to consumers becoming more diverse, but the marketing and distribution are also improving such that target audiences are more likely to find new services intended for them
Tags : 
video services, akamai, marketing, distribution, audience targeting, service optimization
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Sage People     Published Date: Jan 04, 2019
We are in the midst of a global productivity crisis. The IMF estimates that if productivity growth had followed its pre-2008 financial crisis trend, overall GDP in advanced economies would be about 5% higher today. However, to blame everything on the financial crisis is misleading. The overall trend in productivity growth is stagnant and has been on a downward trend for the last several years. This is costing the U.S. a staggering $450–$550 billion a year. In the U.K., concern is such that there have been calls for the government to set new targets and create an independent watchdog to monitor progress to improve national productivity. There is also a workforce engagement crisis. Most people are simply not engaged at work, with industry research showing that typically 66% of people are either partly or not engaged at all at work. This means that only 1 in 3 people at work are fully motivated and productive. Yet most companies are oblivious to this fact. Some run annual emplo
Tags : 
    
Sage People
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: