digital target

Results 1 - 25 of 77Sort Results By: Published Date | Title | Company Name
By: HERE Technologies     Published Date: Apr 24, 2019
Find out how Locomizer, the award-winning global leader applying pattern-detection and spatial analytics, leveraged data from HERE Places in order to define a precise audience segment and the 10 best JCDecaux digital billboard locations that would ensure a successful ad campaign. Read the case study to discover: - which audience segment was targeted - why location was an important factor - how HERE Places data played an essential role in the campaign’s effectiveness
Tags : spatial analytics, leveraged data, digital billboard, locomizer, here
     HERE Technologies
By: Dell EMC     Published Date: Aug 17, 2017
This report highlights a unique approach to enabling IT to succeed in the digital age—a fully engineered converged infrastructure with richly supported capabilities for management, updates and configuration, security, and overall resilience. In particular, this report targets Dell EMC’s distinctive leadership in converged/hyper-converged infrastructure, while highlighting the many compelling benefits achieved in two real-world deployments: an enterprise and a global service provider.
Tags : it transformation, digital transformation, converged infrastructure, hyper-converged infrastructure, deployments
     Dell EMC
By: Adobe     Published Date: Nov 07, 2013
One of the key objectives of Adobe’s current advertising campaign is to explode the myth that ‘managing websites is hell’. We believe that in this day and age, the idea that website management is a nightmare should be a thing of the past.
Tags : adobe, econsultancy, trends and innovation, content management, customer experience management, driving engagement, brand-building, web content management, wcm, adobe experience manager, adobe marketing cloud, the cloud, cloud computing, social community, econsultancy and adobe, driving sales, multichannel customer experience, digital intelligence, targeting, segmentation
     Adobe
By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
     Akamai Technologies
By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
     Rubrik EMEA
By: Adobe     Published Date: Feb 03, 2015
The 2015 Digital Trends report, published by Econsultancy in partnership with Adobe explores different new digital trends such as customer experience, CX and content marketing, data-driven business, targeting and personalisation, mobile, cross-channel marketing and content optimisation.
Tags : digital trends, marketing digital and ecommerce trends, customer experience, content marketing, targeting and personalisation, mobile trends, marketing and content optimisation
     Adobe
By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : account security, data management, network security, secure systems, application security, network performance, network diagnostics
     Juniper Networks
By: VMware AirWatch     Published Date: Oct 27, 2016
Hear how leading hospitals are using the Digital Clinical Workspace as a platform for innovation to improve the patient and provider experience, and enable the right device at the right time for the right task. The session will cover new key technologies to help protect patient data and cover the recent announcement of Target Platform for Epic 2015.
Tags : 
     VMware AirWatch
By: TIBCO Software     Published Date: Aug 15, 2018
Produced in collaboration with INFOPRO Digital with participation from Capgemini MAINTENANCE MADE EASY WITH THE HELP OF DATA Predictive maintenance involves gathering targeted data for analysis, the results of which will help anticipate potential failures before they occur. Companies opt for this type of maintenance to avoid predictable incidents and repair equipment, assembly lines, or machinery with minimum impact on their operations.
Tags : 
     TIBCO Software
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, “because that’s where the money is.” While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes– that is, bots–can now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
     F5 Networks Singapore Pte Ltd
By: Oracle Marketing Cloud     Published Date: Oct 11, 2017
Successful email marketing, demand generation, and lead management processes hinge on a modern strategy aligned to buyer needs across all phases of the buying process — marketing automation. Using a wide spectrum of digital channels, today’s buyers employ an extensive network of tools and resources to make the most informed purchase decisions. The Modern Marketing era is driven by the self-educated buyer who marketers must engage to achieve a relevant, targeted, and value-based customer experience. Find marketing automation fundamentals here.
Tags : 
     Oracle Marketing Cloud
By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
     IBM
By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
     McAfee
By: PwC     Published Date: Jun 20, 2018
Digital Fitness Assessment 2.0 is here. The time to upskill is now. Let’s face it--every industry is being disrupted. To stay profitable and lead the way, it’s critical to be deliberate about making sure your employees have the skills they’ll need to take you there. The Digital Fitness Assessment will help your employees build their future through a custom experience that targets specific skills and behaviors to each employee. Get a demo here. [Please confirm link works and is tracked] What if you could give every employee a blueprint for tomorrow's most-needed skills? Your people know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here. [Please confirm link works and is
Tags : 
     PwC
By: Location3     Published Date: May 29, 2019
LOCALACT was created by Location3 to scale local digital marketing programs to drive positive business results for franchisees and local businesses, while providing complete transparency into local marketing performance for all users. LOCALACT helps business owners promote their locations with targeted paid advertising, manage their online presence, respond to reviews and clearly understand how their marketing dollars are driving actual business results. Franchisees and business owners enrolled with LOCALACT can access a variety of performance metrics by logging into their online dashboard at any time, including: • Paid Search & Paid Social Advertising • Listing Insights & Health • Customer Reviews & Responding • Site Traffic & Search Visibility
Tags : digital advertising, digital marketing, local marketing, marketing, franchise, frachisor, multi-location business, marketing platform, paid media, marketing dashboard, digital marketing dashboard
     Location3
By: Loop Commerce     Published Date: Mar 11, 2019
Loop Commerce invented the $600B G-Commerce industry by building the first digital solution that makes it simple to shop for others and partnering with retailers like Target, Uniqlo, and Neiman Marcus along the way. After an acquisition by Synchrony, their deep consumer financial services experience and strong retail partnerships makes this the most exciting innovation in an always changing industry. See how the top retailers on the planet are embracing the huge customer segment shopping for others and seeing spikes in revenue because of it.
Tags : 
     Loop Commerce
By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
     Juniper Networks
By: Brightcove     Published Date: Sep 17, 2014
Salesforce ExactTarget Marketing Cloud, a digital marketing company, adopted Brightcove’s Video Cloud to manage the development and publication of video content to its Web site through a custom video portal to increase user engagement and increase the amount of time users spend learning about the brand. Nucleus found that using Brightcove enabled ExactTarget Marketing Cloud to better leverage its online video presence to increase its engagement with users and more effectively manage its digital brand.
Tags : digital marketing, video content, online video presence, custom video portal
     Brightcove
By: Amazon Web Services and Intel     Published Date: Oct 07, 2015
In today’s highly digital ecosystem connecting with the right customers has become more challenging. With the explosion of web-connected devices, connecting with users through the method they prefer has become more demanding. Download this case study to see how the right cloud-based solution can successfully deliver highly targeted and relevant ads in order to help build ad revenue, enhance marketing and open up exciting new business opportunities.
Tags : cloud-based solution, relevant ads, ad revenue, new business opportunities, digital ecosystem, enterprise applications
     Amazon Web Services and Intel
By: Monotype     Published Date: Aug 24, 2016
The world of digital advertising is changing—HTML5 has replaced Flash as the industry standard for digital ads. Find out how this change benefits your workflow, branding, and—most importantly—your customers. In this eBook, you’ll learn what HTML5 is and how it differs from Flash, how you can use HTML5 to make better ads, and why you need to get on board with HTML5 now.
Tags : digital advertising, html5, flash, monotype, web fonts, internet marketing, targeting, branding, end of flash, user experience, marketing best practices, banner ads, marketing, emerging marketing, display advertising, design, creative, responsive ads, dynamic ads, mobile ads
     Monotype
By: Oracle OMC     Published Date: Nov 30, 2017
Executing a data-driven digital advertising campaign, with a clear understanding of your target, provides you with marketing that is accountable based on revenue. And this data-driven approach is better for your prospects and customers due to relevance. Relationships thrive when you’re communicating in context on a oneto- one basis. Marketing has the opportunity to reinvent itself as a core part of a company’s revenue engine.
Tags : 
     Oracle OMC
By: Oracle OMC     Published Date: Nov 30, 2017
Successful email marketing, demand generation, and lead management processes hinge on a modern strategy closely aligned to buyer needs and expectations across all phases of the buying process. Using a wide spectrum of digital channels, today’s buyers employ an extensive network of tools and resources to make the most informed purchase decisions. The Modern Marketing era is driven by the self-educated buyer who marketers must engage to achieve a relevant, targeted, and value-based customer experience. Marketers are increasingly enhancing their understanding of how data can fuel the delivery of meaningful interactions. This access to vast sources of information that marketers are applying to execute and achieve more refined marketing simply can’t be gleaned manually.
Tags : 
     Oracle OMC
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com