behavior

Results 51 - 75 of 625Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Mar 21, 2017
Digital marketing technologies have transformed both anonymous and authenticated interactions. Online ads, websites, and search reach more anonymous consumers for less, with much better segmentation and measurement. They’ve also added entirely new capabilities like behavioral monitoring and predictive analytics.
Tags : 
     Adobe
By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"The success of your digital strategy requires bridging the gap between your core capabilities and what customers want. Watch this on demand webcast with Forrester’s Vice President and Principal Analyst, Ted Schadler, Michael Fasosin, Chief Strategy Officer, Spindrift & DigitasLBi OSG, and Oracle to learn: - Key trends in consumer online shopping behavior - How to develop a successful digital experience technology strategy and roadmap - The essential components of a modern digital experience platform - How to achieve quick-wins and long term investments simultaneously You will also see a short demonstration of how Oracle's CX Cloud solutions deliver personalized, unified experiences across channels. "
Tags : 
     Oracle Commerce Cloud
By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
" How Millennials and Baby Boomers are Shaping the Today and Tomorrow of Retail The Power and The Money - Get latest trends on global consumer shopping behavior across online, mobile and in-store channels - Read what differentiates millennials from baby boomers - Learn how to give every individual the experience they are looking for so nobody is left behind - Surveyed: 13,250 consumers, 12 countries - Australia, Brazil, China, France, Germany, Italy, India, Japan, Mexico, Russia, UK & USA "
Tags : 
     Oracle Commerce Cloud
By: Evariant     Published Date: Sep 07, 2016
The physician liaison position is a relatively new one for most health systems, but individuals hired as physician liaisons are being held accountable for facilitating impactful, fast change. Where marketing drives incremental revenues by targeting patients and consumers (non-patients), physician liaisons drive incremental revenues by cultivating relationships with physicians and improving referral behavior.
Tags : evariant, physician liaison, hospital, physician alignment
     Evariant
By: Evariant     Published Date: Nov 14, 2016
All parts of the health system can, and should, contribute to alignment success. Today’s health system C-suite executives are realizing they have the ability and the responsibility to contribute to physician alignment efforts. That means just making phone calls and visiting physicians to promote your services is not enough. To achieve both physician alignment and optimize patient care, you must have a view into physician activity and referrals. Understanding physician behavior provides the basis for more meaningful dialogue with physicians.
Tags : physician alignment, physician relationships, revenue growth
     Evariant
By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
As an IT organization becomes increasingly agile, both the IT organization and the supported business will see improved results. Read on to find out how you company could follow the same transformation. Intel Inside® per nuove, infinite possibilità.
Tags : it transformation, lob, agile, digital transformation
     DellEMC and  Intel® Xeon® processor
By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read on to find out how you company could follow the same transformation. Intel Inside®. Neue Möglichkeiten Outside.
Tags : it transformation, lob, agile, digital transformation
     DellEMC and  Intel® Xeon® processor
By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
     CA Technologies
By: Limelight Networks     Published Date: Jul 01, 2011
Create your own tablet-worthy site, and make your marketing work harder. This report shows you how to: . Take advantage of the tablet as a high-end media experience . Create experiences that support unique tablet behavior . Increase engagement by leveraging user-generated content
Tags : mobile marketing, tablet-worthy site, mobile website, ipad site, limelight networks, content delivery, content delivery network, cdn, cdn network, limelight website, limelight networks inc, content delivery networks, content delivery network services, cdn services
     Limelight Networks
By: Salesforce.com     Published Date: Jul 16, 2013
Sales managers have faced the same challenges since long before CRM applications were invented. However, new tools and technologies are making their jobs easier. The future of sales performance management is integrated with CRM and social collaboration. It helps managers provide real-time coaching and motivation in context to drive better sales behaviors and, ultimately, better sales results.
Tags : sales force automation, sales performance management, social performance management, crm applications, social collaboration
     Salesforce.com
By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : mobile devices, enterprise, best practices, management
     Microsoft
By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: Deluxe     Published Date: Mar 15, 2017
Best-in-class FI marketers have embraced the power of signals. Through their everyday actions, consumers and businesses continually create signals for marketers like you. A signal is an indication of intent or behavior. Examples of activities that produce signals include making a purchase, searching online for information about a financial product, clicking on an ad, applying for a loan, and paying off debt. Each signal can be tracked, monitored, and acted upon. Reaching customers at the critical moment, in the right channel with the right message, requires keen insights about the signals they’re producing. Signals aren’t new to marketing. In fact, you may already be using new mover lists or even search engine marketing. Today, though, there is so much more valuable data available — if you know where to look and what to do with it.
Tags : 
     Deluxe
By: CA Technologies EMEA     Published Date: Sep 07, 2018
Continuous testing is the practice of testing across every activity in the SDLC to uncover and fix unexpected behaviors as soon as they are injected. Continuous testing is the embedding of testing as a fundamental and ongoing aspect of every activity through the application lifecycle, from requirements through production, to ensure the business value is being achieved as expected. As the pace of business continues to quicken, companies are starting to recognize that to stay competitive the process of developing and releasing software needs to change. Release cadence has greatly accelerated. There is no occasion anymore for a six- to 18-month find-and-fix turnaround in which the customer will find the delay acceptable. Things need to move faster, and they need to be ready and perfect faster. Download this whitepaper to find out how CA Technologies can help with your Continuous Testing.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
     CA Technologies EMEA
By: Limelight Networks     Published Date: Feb 22, 2018
The State of Online Video is Limelight Networks’ latest in a series of surveys that explores consumer perceptions and behaviors around digital content.
Tags : 
     Limelight Networks
By: SambaSaftey     Published Date: Mar 15, 2019
Three myths about driver safety can cause business leaders to make dangerous decisions -- exposing their organizations to unnecessary risk. Our free white paper Driver Monitoring: Myth vs. Reality, will show you: • Why background checks, public records, and license checks are inadequate • Why pulling Motor Vehicle Records once or twice a year isn’t enough • How to go beyond telematics and GPS to create real behavioral insights • The four best practices for comprehensive driver monitoring
Tags : 
     SambaSaftey
By: SambaSaftey     Published Date: Mar 15, 2019
Today, it’s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That’s considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper it’s written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture –saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Here’s how.
Tags : 
     SambaSaftey
By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
     Intel
By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
     Intel
By: IBM     Published Date: Apr 14, 2016
Read this Stratecast white paper from Frost & Sullivan to learn about the challenges over-the-top (OTT) competitors such as Google, Hulu, Netflix, and Facebook are causing communications service providers (CSPs). Learn how CSPs can use customer behavior data to deliver personalized experiences and offers, and discover the solutions that can turn data into a competitive advantage.
Tags : ibm, behavior data, social media, csp, telecom, ott
     IBM
By: IBM     Published Date: Jan 18, 2017
Many companies can't predict which customer they will retain or which customers will increase their spend. With predictive analytics they can. This knowledge brief from Aberdeeon Group highlights research findings that show organizations which apply predictive analytics are able to: Establish timely and accurate insights into customer behavior. Empower employees to do their jobs more effectively. Encourage more repeat business and higher wallet share
Tags : predictive analytics, customer experience, customer relationships, customer retention, customer behavior, residual business
     IBM
By: Akamai     Published Date: Mar 08, 2017
In this whitepaper, we present data from the first ever large-scale scientific study that shows how video performance quality affects viewer behavior. The results help to shed light on important considerations that can help businesses craft a successful online video strategy – boosting their business bottom line and ultimately reaping the rewards of online video’s vast potential.
Tags : data, customer engagement, video, online video, online video strategy, viewer behaviour
     Akamai
By: Sitecore EMEA     Published Date: Jan 23, 2018
It’s no longer enough just to convert—to stay competitive, you need to turn prospects into lifelong fans of your brand. But with commerce channels and buying behavior changing so fast, we all know that’s easier said than done. What were once communications channels are now becoming commerce channels, with consumers making purchases on their TVs, on Twitter, and by text message. In the past, commerce and content data and experiences sat in their own silos. Those days are gone.
Tags : commerce, channels, content, customer, optimization, sitecore
     Sitecore EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com