intent

Results 101 - 125 of 129Sort Results By: Published Date | Title | Company Name
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : 
ibm, fiberlink, maas360, mobile, malware, hackers, phishing, threat management
    
IBM MaaS360
Published By: inPowered     Published Date: Sep 20, 2013
Read this white paper from inPowered and Marketing Evolution to understand how major brand marketers are leveraging their earned media, written by trusted category experts, to drive serious lifts in brand favorability, advocacy, and purchase intent and achieve ROI 7-14x campaign investment levels.
Tags : 
forrester, inpowered, marketing, earned media, media, marketing automation
    
inPowered
Published By: IBM     Published Date: Mar 13, 2014
Learn how your e-business can improve its overall online customer experience by understanding why customers behave the way they do.
Tags : 
ibm, ibm enterprise marketing management, emm, ebusiness, ecommerce, internet marketing, online marketing, customer experience
    
IBM
Published By: Clicktale     Published Date: Sep 26, 2016
In this third paper of the Clicktale Psychology and Customer Experience Series, we examine how retailers can identify intentionality of shopper behavior and differentiate between goal-oriented buyers and casual browsers. Learn how to increase conversions by building diverse purchase paths for your diverse visitors.
Tags : 
clicktale, psychology, customer experience, shopper behavior, conversions, purchase paths
    
Clicktale
Published By: Clicktale     Published Date: Sep 26, 2016
In the fourth paper of the Clicktale Psychology and Customer Experience Series, we delve into the rational and emotional processes that impact shopper intent. We show how emotion-based learning can yield business results and provide concrete tips to help you identify emotional processes and respond to them most effectively.
Tags : 
clicktale, psychology, customer experience, emotion-based learning, shopper intent, business results
    
Clicktale
Published By: SurveyMonkey     Published Date: Aug 25, 2015
How do you use surveys to test concepts by taking the guesswork out of your big decisions?
Tags : 
ads, logos, packaging, surveymonkey, survey, key metrics, concept testing, relevance
    
SurveyMonkey
Published By: SurveyMonkey     Published Date: Aug 25, 2015
Learn how to use surveys to test marketing claims by taking the guesswork out of your big decisions.
Tags : 
apple watch, key metrics, data research, marketing claims, testing surveys, framework testing, data insights, brand management
    
SurveyMonkey
Published By: IBM     Published Date: Nov 22, 2013
Learn how your e-business can improve its overall online customer experience by understanding why customers behave the way they do.
Tags : 
ibm, ibm enterprise marketing management, emm, ebusiness, ecommerce, internet marketing, online marketing, customer experience
    
IBM
Published By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : 
damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
    
Damballa
Published By: Evergage, Inc.     Published Date: Apr 17, 2014
As marketers, we’ve come to depend on RFM – recency, frequency, and monetary value – as a factor in creating personalized engagements with customers. But while RFM can help you deliver personalized experiences, it rarely delivers on the increasingly critical promise of real-time marketing. RFM only provides marketers with a partial slice of the customer view. It only tells a portion of the story. At Evergage, we look beyond RFM and apply a different formula – RPI, or Relationship, Persona, and Intent. Together, these identifiers offer you a more immediately actionable view of the customer.
Tags : 
evergage, marketing technology, rpi, rfm, real time, real time marketing, customer experience, online marketing
    
Evergage, Inc.
Published By: Evergage, Inc.     Published Date: Jun 01, 2015
Every e-commerce website is different in terms of content, offerings, layout and navigation. And every shopper is unique with diverse intentions, tastes and purchase patterns. That’s why personalization is critical to help you meet your business and website goals.
Tags : 
evergage, web personalization, web personalization planning, real time web personalization, marketing strategy, personalization program, website marketing, website development
    
Evergage, Inc.
Published By: Evergage, Inc.     Published Date: Mar 10, 2016
Download this eBook TODAY and gain the insights necessary to support an effective intent-driven personalization strategy for your organization!
Tags : 
intent-based marketing, intent-driven personalization, behavioral analytics
    
Evergage, Inc.
Published By: HP     Published Date: Aug 22, 2014
IBM has announced its intention to exit the x86 server market - leaving you with an important decision to make. How do you choose the right strategic partner for your data center? This guide will help you get started down the right path.
Tags : 
bladesystem, economics, platform, service, delivery, converged, automated, federated
    
HP
Published By: IBM     Published Date: Jan 26, 2015
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
ibm, bluemix, big data, intent, iot, it management, knowledge management, enterprise applications
    
IBM
Published By: Symantec     Published Date: Apr 02, 2015
Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need to proceed with transactions.
Tags : 
online customer trust, sensitive data, data interception, malicious intent, security
    
Symantec
Published By: Oracle     Published Date: Sep 30, 2014
B2B transactions are no longer driven by sales. At least not during the first half of the engagement process. Research shows that more than half of the product and solution information gathering has been done online before a prospect even talks to someone in sales. To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Tags : 
digital, body, language, b2b, transaction, buyers cues, intentions, networking
    
Oracle
Published By: Powered Inc.     Published Date: Mar 26, 2009
Read this report to learn how to harness the power of managed online communities to increase ROI and build relationships with your customers. Unlike other marketing programs, online communities allow businesses to engage with customers through a combination of expert content and online community interactions. Throughout the Customer Lifecycle - from Awareness to Advocacy – clients achieve measureable results with real-time data and insights.
Tags : 
powered, social marketing, roi, benchmarking, customer satisfaction, brand affinity, brand loyalty, customer lifecycle
    
Powered Inc.
Published By: Business.com     Published Date: Jun 03, 2009
At a time when most businesses are facing lengthening sales cycles, reduced budgets and staff cut-backs, its imperative to keep leads flowing into the business and at a lower cost. In this study of over 27,000 B2B web sites, Business.com found 93% of B2B companies are in danger of having their best intentions come back to haunt them. Learn more today!
Tags : 
black box, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle
    
Business.com
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control
    
Netwrix
Published By: Facebook     Published Date: Jun 15, 2011
Nielsen and Facebook recently joined forces to develop effective, near-real time ad effectiveness solutions to determine consumer attitudes, brand perception and purchase intent from advertising, including aided awareness, ad recall, message association, brand favorability, and purchase consideration.
Tags : 
facebook, nielsen, advertising, social media impression, social networking, customer engagement, brand marketing, social advocacy
    
Facebook
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
The intent of this whitepaper is to explain the business requirement for physically auditing assets, to explore the bene?ts associated with conducting physical audits and to provide a step by step process for performing them.
Tags : 
real asset management, ram, physical audits, write-offs, data standards, manual, barcode, data consolidation
    
Real Asset Management Inc.
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management
    
IBM
Published By: IBM     Published Date: Nov 12, 2014
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this upcoming webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
cognitive internet, iot, iot apps, intent data, software development, it management, knowledge management, enterprise applications
    
IBM
Published By: Evergage, Inc.     Published Date: Apr 17, 2014
In this video, learn how Real-time web personalization can track and respond to user behavior in real-time, throughout the entire customer life cycle, to increase conversion rates and drive customer success.
Tags : 
evergage, marketing, marketing technology, online marketing, customer behavior, customer insights, intent, real time
    
Evergage, Inc.
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.