behavior

Results 351 - 375 of 650Sort Results By: Published Date | Title | Company Name
By: Urban Airship     Published Date: Apr 17, 2014
In our latest Good Push Index data study (examining more than 2,400 apps and 500 million push notifications), we reveal how push messaging influences mobile app users’ behavior, measuring both engagement and retention over a six-month period.
Tags : urban airship, gpi, good push index, mobile marketing, mobile, mobile app, push notifications, customer engagement, smartphone, app engagement, mobile strategy
     Urban Airship
By: Adobe     Published Date: Apr 17, 2014
Download our 2014 Digital Trends report, created in partnership with eConsultancy, to discover the trends that are driving exceptional customer experiences — and the tools you need to gain a competitive edge.
Tags : adobe, customer experience, customer engagement, digital intelligence, digital marketing, marketing, customer behavior, mobile, customer insights, mobile marketing, content marketing
     Adobe
By: IBM     Published Date: Jun 20, 2013
The global financial crisis of 2008 still reverberates today. Sluggish economic growth, stricter regulatory requirements and rapidly changing consumer behavior are placing unprecedented demands on the banking industry. In recent years, banks – particularly those with substantial retail operations – have relied on the lethargy of their customers to maintain their business. Customer loyalty has been based more on proximity of local branches and convenience of ATM networks than the quality of customer care or products and services priced and tailored to a bank’s best customers. In response to the financial crisis, banks have focused on wringing complexity and costs from their systems – exacerbated by mergers and acquisitions – while dealing with new and tighter regulations. Yet, their traditional “one-size-fits-all” mass-marketing approach to customers has remained constant.
Tags : customer-centric, increase revenue, relationships, operations
     IBM
By: Oracle     Published Date: Jan 21, 2014
Because the majority of B2B buying decisions are made before a sales person even gets involved, the role of marketing has changed. This evolution in buying behavior demands a radical shift in how companies are aligning marketing and sales to maximize conversion rates.
Tags : conversion, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
     Oracle
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : user protection, security, cloud, endpoint, application, network, networking, it management
     CDW-Trend Micro
By: QuickPivot     Published Date: Jan 28, 2016
How do marketers appropriately identify, score, and employ behavior breadcrumbs when ever-growing complex digital paths, intentions, channels, and devices fragment our view of the customer?
Tags : quickpivot, cross-channel, consumer behavior, marketing attribution, marketing solutions
     QuickPivot
By: Intercom     Published Date: Oct 08, 2015
An effective messaging strategy means targeting the right users with the right message at the right time and place. Failing to do so leads to customers mentally, or literally, unsubscribing from you. From the makers of Intercom, a customer communications platform, this book teaches you how to increase customer engagement in three ways: 1. Define the audience for your message by segmenting users according to behavior and action. 2. Craft a message for maximum impact; what voice, tone, format, and language to use. 3. Discern the right way and the right time for a message and know what you can do to ensure it is received in the most appropriate setting and in the most appropriate context.
Tags : customer onboarding software, user engagement, in-product communication, in-product messaging, onboarding software, customer engagement software
     Intercom
By: Optimizely     Published Date: Dec 01, 2015
In Optimizely’s independent survey of digital channel owners with Dimensional Research, we observed an emerging set of behaviors that indicate sophisticated optimization being done by teams actively running A/B and multivariate experiments. These teams are doubling down on the people and processes needed to accelerate the development of their optimization programs. The result? Faster business benefits and in greater orders of magnitude.
Tags : a/b testing, customer experience, sophisticated optimization, optimization programs, enterprise applications
     Optimizely
By: LogRhythm     Published Date: Apr 04, 2017
The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven technology decisions.
Tags : 
     LogRhythm
By: Comcast Business     Published Date: Feb 06, 2019
Retail has been transformed by technology in multiple ways, from the way customers interact with retailers to how products are offered and acquired. Indeed, the entire shopping experience has been redefined and expanded to enable customers to purchase products anytime, anywhere, with any device, from any number of retailers. Consumers’ changing shopping behaviors and their reliance on technology enables retailers to reach a wider swath of potential buyers, moving well beyond the borders of their physical store locations to new geographies and populations. That said, retailers must understand how to use technology effectively to draw in customers and entice them to purchase, as well as help them improve their operations and enable new, innovative ways to keep customers coming back.
Tags : retail, shopping, retailers, wifi, retail technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking
     Comcast Business
By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organization’s progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victims’ networks. Download the Cyber Intrusion Casebook to learn: • The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments • Key takeaways — based on the CrowdStrike Services team’s extensive experience
Tags : 
     CrowdStrike
By: McAfee     Published Date: Mar 31, 2017
UEBA provides added visibility within SIEM for compliance and user monitoring, improving security alerts, and more insightful investigations. Today’s most advanced security operations use the technologies together to maximize each tool’s strengths.
Tags : ueba, uba, siem, analytics, secops, soc, threat hunting, correlation, incident response
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Fragmented and siloed security infrastructure is not sustainable against today’s threats. Adopt an optimized approach that encourages collaboration and visibility across the enterprise.
Tags : secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Infographic to accompany the "Sustainable Security Operations" white paper. It demonstrates how sustainable security operations overcomes major inhibitors.
Tags : secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
     McAfee
By: Unica     Published Date: Nov 06, 2009
This white paper helps marketers improve returns by identifying the specific pieces of data to mine for, and apply them to increase marketing returns at every stage of the customer life cycle, both online and offline.
Tags : unica, customer analytics, data personal, lifecycle, customer analytics, web behavior, marketing, online marketing
     Unica
By: Unica     Published Date: Sep 23, 2010
If you knew more about your customers, wouldn't you tailor their experience to their unique profile and online behavioral history? Download Three Key Integrations for Interactive Marketing Success and learn how to integrate online data into your interactive marketing strategy.
Tags : unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, aberdeen
     Unica
By: Unica     Published Date: Sep 08, 2010
Good marketers are going where their customers are - that means social media. According to a recent Unica global survey of marketers, 47% of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58%. Yet, for all the rush, many marketers are wondering, "where's the gold?" Download the white paper, "From Social Media Hype to Social Media Marketing" and learn how to build a stronger customer relationship."
Tags : unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, customer relationships, social media, crm
     Unica
By: Eloqua     Published Date: Sep 28, 2011
Use this guide as a checklist to compare your current email marketing technology against four core areas where marketing automation extends the power of email - audience targeting, automating marketing tactics, enabling sales and measuring results.
Tags : email marketing, marketing white paper, marketing automation, behavioral targeting, marketing data, email marketing technology, marketing automation, marketing tactics automation, audience targeting
     Eloqua
By: CradlePoint     Published Date: May 17, 2016
Always-on Connections for Store Networks and Powering Intelligent Systems In the fast-paced world of retail, network reliability is everything—but so are security, agility, and cost-effectiveness. Retailers want it all, and they depend on their IT administrators to balance these needs. Whether it’s ensuring an always-on connection for store networks, powering intelligent systems aimed at swaying buyer behavior, or transmitting real-time analytics to inform marketing and inventory decisions, the bedrock of successful retailing is a network that can support the growing list of mission-critical applications dependent on secure Internet connectivity. In the past, finding a solution to balance these demands has been difficult at best. Less expensive wired options like DSL mean hours of downtime each month. Alternatives like T1 connections deliver more uptime but carry a price tag that usually puts large-scale distributed deployments out of reach.
Tags : 
     CradlePoint
By: Sitecore     Published Date: Mar 03, 2016
Studies show mobile consumers look at their phones an average of 1,500 times each week and spend 177 minutes on their phone each day. With every swipe, tap, and zoom, iCustomers are learning to expect that every business look, feel, and act just like their favorite mobile app. What’s a marketer to do? Access this eBook, written by Brian Solis, globally recognized as one of the most prominent thought leaders in business innovation, to delve into mobile consumer behavior and how it requires a different approach.
Tags : 
     Sitecore
By: Sitecore     Published Date: Oct 18, 2016
In a market where 78% of consumers abandon a transaction or purchase because of poor service, businesses need to personalize and customize their interactions with customers to remain competitive. A truly personalized customer experience, framed in the context of the consumer’s previous buying patterns and behaviors as well as their current interactions, can mean the difference between engaged, loyal customers or lost business for your company. Download this white paper now to learn more!
Tags : 
     Sitecore
By: Cornerstone OnDemand     Published Date: May 15, 2015
Leveraging econometric analysis of a dataset of approximately 63,000 hired employees spanning approximately 250,000 observations, this report looks not only at the measurable costs of toxic behavior such as sexual harassment, theft and fraud, but also other, equally damaging and harder-to-measure costs. The report examines these indirect costs closely, looking particularly at the toll toxic employees take on co-workers, and concludes that these costs create an even larger financial burden on businesses than the direct impact of an employee’s misbehavior
Tags : hidden costs, sexual harassment, toxic employees, employee behavior
     Cornerstone OnDemand
By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
     Mimecast
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com