intent

Results 101 - 120 of 120Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 22, 2013
Learn how your e-business can improve its overall online customer experience by understanding why customers behave the way they do.
Tags : 
ibm, ibm enterprise marketing management, emm, ebusiness, ecommerce, internet marketing, online marketing, customer experience, customer behavior, intent, customer experience optimization
    
IBM
Published By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : 
damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
    
Damballa
Published By: Evergage, Inc.     Published Date: Apr 17, 2014
As marketers, we’ve come to depend on RFM – recency, frequency, and monetary value – as a factor in creating personalized engagements with customers. But while RFM can help you deliver personalized experiences, it rarely delivers on the increasingly critical promise of real-time marketing. RFM only provides marketers with a partial slice of the customer view. It only tells a portion of the story. At Evergage, we look beyond RFM and apply a different formula – RPI, or Relationship, Persona, and Intent. Together, these identifiers offer you a more immediately actionable view of the customer.
Tags : 
evergage, marketing technology, rpi, rfm, real time, real time marketing, customer experience, online marketing
    
Evergage, Inc.
Published By: Evergage, Inc.     Published Date: Jun 01, 2015
Every e-commerce website is different in terms of content, offerings, layout and navigation. And every shopper is unique with diverse intentions, tastes and purchase patterns. That’s why personalization is critical to help you meet your business and website goals.
Tags : 
evergage, web personalization, web personalization planning, real time web personalization, marketing strategy, personalization program, website marketing, website development, customer engagement
    
Evergage, Inc.
Published By: Evergage, Inc.     Published Date: Mar 10, 2016
Download this eBook TODAY and gain the insights necessary to support an effective intent-driven personalization strategy for your organization!
Tags : 
intent-based marketing, intent-driven personalization, behavioral analytics
    
Evergage, Inc.
Published By: HP     Published Date: Aug 22, 2014
IBM has announced its intention to exit the x86 server market - leaving you with an important decision to make. How do you choose the right strategic partner for your data center? This guide will help you get started down the right path.
Tags : 
bladesystem, economics, platform, service, delivery, converged, automated, federated, infographic, data center
    
HP
Published By: IBM     Published Date: Jan 26, 2015
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
ibm, bluemix, big data, intent, iot
    
IBM
Published By: Symantec     Published Date: Apr 02, 2015
Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need to proceed with transactions.
Tags : 
online customer trust, sensitive data, data interception, malicious intent, security
    
Symantec
Published By: Oracle     Published Date: Sep 30, 2014
B2B transactions are no longer driven by sales. At least not during the first half of the engagement process. Research shows that more than half of the product and solution information gathering has been done online before a prospect even talks to someone in sales. To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Tags : 
digital, body, language, b2b, transaction, buyers cues, intentions, networking
    
Oracle
Published By: Powered Inc.     Published Date: Mar 26, 2009
Read this report to learn how to harness the power of managed online communities to increase ROI and build relationships with your customers. Unlike other marketing programs, online communities allow businesses to engage with customers through a combination of expert content and online community interactions. Throughout the Customer Lifecycle - from Awareness to Advocacy – clients achieve measureable results with real-time data and insights.
Tags : 
powered, social marketing, roi, benchmarking, customer satisfaction, brand affinity, brand loyalty, customer lifecycle, purchase intent, persuasive communications, advocacy, word of mouth, managed online communities
    
Powered Inc.
Published By: Business.com     Published Date: Jun 03, 2009
At a time when most businesses are facing lengthening sales cycles, reduced budgets and staff cut-backs, its imperative to keep leads flowing into the business and at a lower cost. In this study of over 27,000 B2B web sites, Business.com found 93% of B2B companies are in danger of having their best intentions come back to haunt them. Learn more today!
Tags : 
black box, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control, security
    
Netwrix
Published By: Facebook     Published Date: Jun 15, 2011
Nielsen and Facebook recently joined forces to develop effective, near-real time ad effectiveness solutions to determine consumer attitudes, brand perception and purchase intent from advertising, including aided awareness, ad recall, message association, brand favorability, and purchase consideration.
Tags : 
facebook, nielsen, advertising, social media impression, social networking, customer engagement, brand marketing, social advocacy, earned media, media analytics
    
Facebook
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
The intent of this whitepaper is to explain the business requirement for physically auditing assets, to explore the bene?ts associated with conducting physical audits and to provide a step by step process for performing them.
Tags : 
real asset management, ram, physical audits, write-offs, data standards, manual, barcode, data consolidation, formal policies, accurate reporting, proper coverage
    
Real Asset Management Inc.
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks, security
    
IBM
Published By: IBM     Published Date: Nov 12, 2014
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this upcoming webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
cognitive internet, iot, iot apps, intent data
    
IBM
Published By: Evergage, Inc.     Published Date: Apr 17, 2014
In this video, learn how Real-time web personalization can track and respond to user behavior in real-time, throughout the entire customer life cycle, to increase conversion rates and drive customer success.
Tags : 
evergage, marketing, marketing technology, online marketing, customer behavior, customer insights, intent, real time, real time personalization, conversion rate, customer life cycle, customer engagement
    
Evergage, Inc.
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: IBM     Published Date: Jul 20, 2016
Attracting today’s savvy candidate requires much more than a creative job description and a flattering email message. The transparency provided by web sites such as Glassdoor combined with a millennial desire for meaningful work and corporate responsibility have the upped the ante when it comes to employer brand and candidate experience. While many firms have good intentions when it comes to employer brand, these intentions aren’t always translated to action, leaving many candidates feeling frustrated as they move through the process. New hires need confirmation that everything they were told in the interview processes is not only accurate, but even better than expected. When the onboarding process falls short of those expectations, candidates immediately question their decision to accept the offer and retention efforts in jeopardy. Join this webcast to learn how to avoid costly new-hire attrition in your organization.
Tags : 
ibm, ibm smarter workforce, work trends, employee acquisition, recruiting, recruiters, candidate experience
    
IBM
Start   Previous    1 2 3 4 5     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.