news

Results 1 - 25 of 306Sort Results By: Published Date | Title | Company Name
By: Ability Commerce     Published Date: May 18, 2009
The Pro's and Con's of Frequency for online retailers. There is a happy medium for the frequency of an email newsletter or special promotions. The more you mail in the short term, the more revenue you will see, but what are the long term effects?
Tags : ability commerce, seo, email frequency, roi, pci, ecommerce, e-commerce, order management
     Ability Commerce
By: AcquireWeb     Published Date: Jan 22, 2007
This article addresses one of the biggest challenges associated with e-mail marketing programs – establishing meaningful contact with customer targets in order to increase sales, while protecting and enhancing your brand. It illustrates that successful e-mail marketing designed to drive sales and build brands requires adopting a methodology that includes more precise prospect targeting, better permission-based models, a better overall consumer experience and better quality lists.
Tags : email marketing, best practices, permission marketing, brand management, direct marketing, newsletter design, acquireweb, integrated marketing
     AcquireWeb
By: AcquireWeb     Published Date: Apr 07, 2008
This case study, published by DM News in July 2007, explores how email helped top-ranked ad agency Radarworks succeed in a changing market in developing a marketing campaign using a mixture of media channels with a set budget to maximize brand and event awareness and drive participation, and be able to measure the ROI from each marketing channel.
Tags : acquireweb, complete campaign, complete, multi-faceted, multichannel, multi-channel, integrated marketing, e-mail
     AcquireWeb
By: AcquireWeb     Published Date: Apr 07, 2008
This opinion piece, published by DM News in November 2007, addresses a common but less talked about problem with email marketing – over-mailing to positively effect otherwise mediocre results; which is likely the result of an acquisition email provider using a compiled response file, and guaranteeing high open and click rates in addition to a positive ROI. This article provides insight on what the marketer, broker or agency can do to ensure they are maximizing the ROI from a given campaign, while disincentivizing over-sending behavior.
Tags : email, conversion, conversion testing, email marketing, frequency, overdelivery, over-delivery, acquireweb
     AcquireWeb
By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by DM News in June 2006, begins, “As sure as the spring is followed by summer and succeeded by fall, online marketing options, Search, Lead Generation and Email, seem to enjoy a cyclic season in vogue.” This article describes how for many, the use of email cost effectively has driven sales and built brand awareness; however, for the majority, email has not delivered on the promise.
Tags : acquireweb, search, online marketing, lead generation, integrated marketing, e-mail, acquisition e-mail, lead generation
     AcquireWeb
By: Act-On     Published Date: Jan 08, 2015
Learn Facebook’s Rules of Engagement so you can make your content more sharable and searchable – and avoid violating the terms of service. This eBook will give you a thorough understanding of Facebook principles, and the general rules that apply to content and behavior.
Tags : act-on, facebook, social, media, rules, engagement, b2b, marketing
     Act-On
By: Adobe     Published Date: May 16, 2012
Recently, Adobe gathered a panel of executives from Condé Nast, National Geographic, Newsday, and other publishers to discuss their organizations' efforts to create a new breed of e-publications based on the mobile computing power of the tablet.
Tags : cs5.5, creative suite, adobe, adobe creative suite, 5.5 master collection, pulitzer, print, broadcast
     Adobe
By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 12, 2017
The modern digital experience is very much a visual experience. It's through images that we tell our stories, market our products, impart news, and entertain — and forge an emotional connection with our customers. However, delivering today's increasingly image-rich experiences is fraught with complexity. It requires dozens of renditions to optimize an image for all the devices that customers are using, not to mention their current network connection. Without an automated system, it's a daunting task. Dynamic imaging technology is the solution.
Tags : digital experience, imaging, imaging solution, system automation, customer experience
     Akamai Technologies
By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : internet, security, cryptocurrency, data, breaches, botnet
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : dns< security breach, cyber security
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
     Akamai Technologies
By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
     Arbor
By: Arbor Networks     Published Date: Sep 29, 2012
This newsletter is intended to educate and inform enterprise network and data center operators about the problem of distributed denial of service (DDoS).
Tags : ddos, distributed denial of service, data center, malware, security threats, database servers, dns
     Arbor Networks
By: Arial Software     Published Date: Aug 22, 2007
Email marketing should be considered a key component of a company’s overall marketing strategy. In the past many companies treated email marketing as an afterthought, failing to devote the talent and resources needed to affect an appreciable return on investment. To get the most out of an ongoing email marketing campaign, a quality team of knowledgeable professionals must be assembled.
Tags : staffing, hiring, marketing, marketing manager, email marketing, email marketing manager, marketing director, staff
     Arial Software
By: Artemis Health     Published Date: Feb 05, 2019
Artemis Health teamed up with Employee Benefit News to research the current “benefits landscape.” We surveyed self-insured employers to find useful trends, interesting stats, and info on what leaders like you are doing to improve their benefits strategy. In this whitepaper, you'll discover: • Regional differences in benefits offerings and priorities • What benefit leaders believe they can accomplish with benefits data analytics • The features and functionality your peers are looking for when they evaluate a data solution
Tags : 
     Artemis Health
By: Artemis Health     Published Date: Aug 08, 2019
Artemis Health teamed up with Employee Benefit News to research the current “benefits landscape.” We surveyed self-insured employers to find useful trends, interesting stats, and info on what leaders like you are doing to improve their benefits strategy. In this whitepaper, you'll discover: • Regional differences in benefits offerings and priorities • What benefit leaders believe they can accomplish with benefits data analytics • The features and functionality your peers are looking for when they evaluate a data solution
Tags : 
     Artemis Health
By: Aspect Software     Published Date: Nov 06, 2014
Download Aspect’s newsletter, “Serving and Engaging the Digital Consumer - from Self-Service to Agent-Assisted” for insights on how the cloud, omni-channel communications and mobility are revitalizing customer self-service. Included is a complete copy of the latest Gartner Marketscope for IVR Systems and Enterprise Voice Portals, which provides insights on the state of the market and top vendors. Download to learn more!
Tags : aspect, digital consumer, self service, voice response market, it leads, ivr investments, omni channel, omnichannel
     Aspect Software
By: athenahealth     Published Date: Jul 22, 2019
Medicare Advantage is expanding coverage for what it considers “primarily health related supplemental benefits.” That’s good news, not just for treating illness and injury, but for helping high-risk patients maintain their health and prevent avoidable utilization. This article discloses the new list of services to be covered under Medicare Advantage, including transportation and in-home support.
Tags : 
     athenahealth
By: Avalara     Published Date: Jan 28, 2014
Sales tax is in the news more than ever today with national legislation being debated in Congress, and many states struggling to gain a hold on internet sales and the related tax liabilities. The current controversies between a certain internet seller and a number of state revenue officials certainly made the front page in 2011. Sales tax policy is a fascinating subject and the internet revolution is pushing discussion of sales taxes to the public center. These developments indicate the high level of concern held by business leaders, politicians and bureaucrats in the sales tax field. The current focus on sales tax policy will hopefully produce a more rational sales tax compliance environment.
Tags : sales tax, tax liability, internet sales tax, best practices
     Avalara
By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
     AWS
By: Benz Marketing Group     Published Date: Mar 07, 2011
Agency A-List Contender Benz Marketing Group opens several satellite Offices in the State of California, United States
Tags : advertising, marketing, business, economics, growth, public relations, management, california
     Benz Marketing Group
By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : ransomware, threats, cyber, security, data
     BlackBerry Cylance
By: Bloomberg     Published Date: Dec 28, 2011
No other source puts so much data in one place, allowing you to be more efficient and effective in your job. Once you've experienced BGOV, you'll wonder how you ever worked without it.
Tags : bloomberg government insider, bgov, demo, free trial, policy analysis, data breakdowns, editorial expertise, news aggregator
     Bloomberg
By: Bloomberg     Published Date: Jun 11, 2012
Bloomberg Government (BGOV) is a unique online service that helps business and government leaders understand the business impact of government actions through a combination of in-depth analysis, best-in-class data, analytical tools, and award winning journalism, enabling better decisions. bgov.com
Tags : bloomberg government insider, bgov, demo, free trial, policy analysis, data breakdowns, editorial expertise, news aggregator
     Bloomberg
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com