tech target

Results 51 - 75 of 145Sort Results By: Published Date | Title | Company Name
By: HERE Technologies     Published Date: Dec 06, 2018
adsquare offers brands insights into customer behaviors and footfall to underpin digital marketing campaigns. Using a detailed brief of the audience the brand wishes to reach, adsquare gathers data from a range of mobile, online and offline sources. This rich data gives a brand a stronger opportunity to create relevant campaigns for their audiences. It is critical to adsquare’s success that its data sources are reliable. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is building and sharing real-time location intelligence with adsquare which reveals patterns to show how and why customers make transactions in specific places.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: TIBCO Software     Published Date: Jul 22, 2019
FINANCIAL SERVICES’ HISTORY OF DISRUPTION Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Jul 22, 2019
FINANCIAL SERVICES’ HISTORY OF DISRUPTION Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
     TIBCO Software
By: Dyn     Published Date: Apr 27, 2016
Download the newest TechTarget whitepaper and learn how to: - Optimize infrastructure spend - Overcome foundational business challenges - Gain and retain new customers - Increase brand loyalty and partner relations...and more
Tags : dyn, internet, internet performance, customer relations, cloud, it efficiency
     Dyn
By: Adobe     Published Date: Sep 23, 2019
An excellent CMS solution provides your business with the flexibility to grow into a broad experience delivery platform. It should enable your business to scale and add new capabilities as it grows, and easily integrate with other marketing technologies. Why should the target audience care? Customer expectations have increased. They now expect their in-store experiences to be continuous and consistent extensions of the online journey. And the online journey provides fast, dynamic, and interactive experiences. If your business is not well informed on what is needed from a content management solution, it may come up short on customer experience. A successful and growing business will choose a solution that helps them future-proof for emerging channels and effectively manage mature ones. Supporting Concepts: Navigate your business through the noise. Apply these questions and insights to your selection process and avoid the pitfalls of costly and rigid content management systems.
Tags : 
     Adobe
By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
     Mimecast
By: Turn     Published Date: Mar 13, 2013
Tech for Cross-Channel Ad Targeting
Tags : cross-channel ad targeting, advertising strategy, real-time bidding, digital marketing
     Turn
By: Workterra     Published Date: Oct 25, 2017
Any number of characteristics put the mid-market employer in a league of its own, placing it somewhere between the niche-focused small businesses of Main Street, USA, and the complex enterprise-level organizations that conduct business on a global scale. HR technology is a shining example of this place in the middle. HR for mid-market employers must fulfill needs that can’t be met by benefits administration and core HR solutions designed to narrowly target either small businesses or enterprise organizations.
Tags : 
     Workterra
By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
     IBM
By: IBM     Published Date: Apr 13, 2015
IDC Retail Insights defines omni-channel merchandise optimization as the set of technologies, data assets, skills, processes, and management intent required to develop and maintain sets of targeted and localized offers that best satisfy important business objectives. These goals include customer satisfaction, customer lifetime value, and category, channel, and corporate performance. By "offers," IDC Retail Insights means the broad set of attributes that characterize assortments, products, services, prices, utility, and convenience that match customers' buying criteria and shopping behaviors. Targeted and localized offers present a compelling "choice set" that satisfies and delights consumers. Download this white paper to read the questions posed by IBM to Greg Girard, program director of Omni-Channel Analytics Strategies at IDC Retail Insights, on behalf of IBM's customers.
Tags : omni-channel merchandise, ibm, targeted offers, localized offers, customer satisfaction, corporate performance
     IBM
By: IBM     Published Date: Feb 25, 2008
Virtualization is no longer an “emerging” technology. Its potential to increase the efficiency of IT infrastructures has become widely recognized. But key questions are raised in the early stages of virtualization planning: should it be implemented only for new projects, or applied to existing infrastructures? Should opportunities be pursued on a case-by-case basis, or targeted as a broader goal of IT strategy?
Tags : server virtualization, servers, unix, linux, ibm
     IBM
By: Safari Books Online     Published Date: Jun 08, 2009
This white paper outlines some of the most salient challenges and demonstrates how technology managers can enable their development teams to streamline application development and troubleshooting, while keeping them current on emerging technology, new product versions, and changing market trends-allowing them to move right past the gotchas.
Tags : safari books, technology, development, streamline, product, branding, market trends, design, needs, developer, challenges, target, critical data, ruby, software development, it management
     Safari Books Online
By: LookingGlass Cyber Solutions     Published Date: Apr 26, 2016
The Internet of Things (IoT) is expanding in a dramatic way, bringing to question the issue of availability versus security, as security measures are having a difficult time keeping pace with the development of IoT devices. The introduction of more efficient semiconductors, coupled with revolutionary technology that allows semiconductors to store as well as process complex instructions, means that the IoT may be a more attractive target for hackers. IoT devices from healthcare and industrial systems (i.e., SCADA) could be the most at risk for significant service interruptions and may have secondary and/or tertiary effects on other industries.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     LookingGlass Cyber Solutions
By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, it management
     Cisco
By: IBM     Published Date: Oct 15, 2013
Cross-channel marketing is no longer an ideal to strive for, but a practical reality you can achieve. However, technology is never the whole answer.
Tags : isolation, integration, cross-channel customers, customer communication, ibm, right marketing technology, marketing approach, better targeting, increase efficiency, customer loyalty, click-throughs from emails, banner ads, ppc campaigns, adwords, online applications, enterprise applications
     IBM
By: IBM APAC     Published Date: May 18, 2017
Welcome to IT as a Service For Dummies, IBM Limited Edition. IT as a Service is the emerging technique that gives technology leaders the flexibility of providing the right set of services to the business. The world of IT is changing dramatically. Businesses are increasingly discovering that IT services are becoming the foundation for the customer experience. IT as a Service isn’t simply a new delivery model for applications. Instead, IT as a Service is a new approach to providing an array of modular services that are targeted to solve changing business problems. While services can be as straightforward as compute or storage in the cloud, they can also be used to complex solutions. Other services may include microservices or integration services that enable a business to quickly create new solutions to help service customers in a more creative and efficient manner.
Tags : service, dummies, ibm, cloud, mobile
     IBM APAC
By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : advanced threat defense, endpoint security, tech target research, security, it management
     Intel Security
By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
     Flexera
By: HERE Technologies     Published Date: Jul 19, 2018
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer – including bridging the journeys between digital and physical worlds – you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: HERE Technologies     Published Date: Dec 06, 2018
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer – including bridging the journeys between digital and physical worlds – you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: Here Technologies     Published Date: Mar 29, 2019
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer, including bridging the journeys between digital and physical worlds, you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : location data, ad tech, location targeting
     Here Technologies
By: Zebra Technologies     Published Date: Oct 01, 2018
Enterprise vendors providing indoor location services must offer multiple technologies to satisfy diverse use cases. I&O leaders should evaluate vendors based on their ability to meet end-user granularity requirements and address the usage scenarios across the entire targeted vertical market.
Tags : 
     Zebra Technologies
By: NetIQ     Published Date: Nov 05, 2012
The broad adoption of SIEM technology is driven by security and compliance needs. Targeted attack discovery requires effective user activity, data access and application activity monitoring. Vendors are testing demand for broader-scope solutions.
Tags : siem technology, threat management, security management, enterprise security, compliance, security
     NetIQ
By: HERE Technologies     Published Date: Jul 19, 2018
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : 
     HERE Technologies
By: Here Technologies     Published Date: Mar 29, 2019
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : location data, ad tech, location targeting
     Here Technologies
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com