message

Results 251 - 275 of 405Sort Results By: Published Date | Title | Company Name
Published By: Neustar     Published Date: Sep 15, 2010
How Nonprofit Organizations can use SMS to mobilize Millions of Volunteers, Dollars, and Supporters.
Tags : 
neustar, sms, mobile networks, text message, call to action, mobile marketing, government, non profit, csc
    
Neustar
Published By: Resonate Insights     Published Date: Sep 05, 2014
Direct targeting of consumers based on their motivations increased message relevance.
Tags : 
direct targeting, purchase motivations, campaign performance
    
Resonate Insights
Published By: Motorola Solutions     Published Date: Apr 26, 2019
We live in an always on, instantly connected world. Just text, email, IM, or direct message to communicate with anyone, anywhere.
Tags : 
    
Motorola Solutions
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
Online marketing needs to be coordinated and consistent with marketing communication and business objectives. To compete in today's marketplace, marketing professionals need a solution that allows them to react to changing market conditions cost effectively: coordinated marketing communication at a lower cost.
Tags : 
sdl tridion, a/b, multi-channel marketing, branding, crm, ecm, rss, xml, wcm, dam, wcm, web content management, multisite functionality
    
SDL Web Content Management Solutions
Published By: Bronto     Published Date: Sep 26, 2011
One Click has shown what can be done when retailers develop smart strategies and leverage the commerce-focused Bronto Marketing Platform. Their overall result? A year-over-year revenue increase of 142% in the first year on the Bronto platform. To gain insight on how you may employ some of the same tactics, read the full case study. Answer these short questions then click the Download now button.
Tags : 
remailing, triggered emails, list growth, list, email marketing, case study, e-store, e-commerce, targeted, automation, shopping cart, transactional messages, bronto, bronto software, bronto marketing platform
    
Bronto
Published By: Ifbyphone, Inc.     Published Date: Sep 24, 2013
Voice broadcasting is more than a simple recorded phone message; Download this white paper to learn how marketing and sales professionals are using intelligence voice broadcasting to cut costs, save time and generate leads and revenue.
Tags : 
intelligent voice broadcasting, voice broadcasting, voice-based marketing automation
    
Ifbyphone, Inc.
Published By: Symantec.cloud     Published Date: Sep 01, 2010
This white paper gives best practices for creating security policies and includes a set of recommended policy components.
Tags : 
messagelabs us, data protection, security policies, social networking, information security, policy management
    
Symantec.cloud
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.
Tags : 
messagelabs symantec, security safeguard, email spam, malware
    
MessageLabs Ltd.
Published By: MessageLabs     Published Date: Aug 29, 2008
Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.
Tags : 
messagelabs, compliance, email policies, policy, enforce policy
    
MessageLabs
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : 
messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity
    
Symantec.cloud
Published By: Oracle     Published Date: Jan 15, 2014
Oracle focuses its Higher Education Message on Future Proofing
Tags : 
oracle, education, higher education, campus solutions, oracle openworld 2013, it management
    
Oracle
Published By: Bronto     Published Date: Sep 26, 2011
With the Bronto Marketing Platform, the welcome series are easy to set up and they run automatically. Gander Mountain uses Bronto's automation functionality to easily test different options - on pricing or special offers - and employs Bronto's analytics to see what is providing the best results. To gain insight on how you may employ some of the same tactics, read the full case study. Answer these short questions then click the Download now button.
Tags : 
best practices, email marketing, automation, e-commerce, welcome emails, shopping cart, transactional messages, case study, bronto software, bronto, bronto marketing platform
    
Bronto
Published By: WatchGuard     Published Date: Oct 16, 2012
Email makes communication simple. Unencrypted email messages are sent in clear text or some other easily readable format regardless of the email program used. Read this white paper to learn more about how interoperability makes email vulnerable.
Tags : 
watchguard, email encryption, security, data management, internet security, business technology
    
WatchGuard
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
    
GFI
Published By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : 
email marketing, triggered emails, audience segmentation, email capture
    
Bluecore
Published By: SVnetwork     Published Date: Nov 03, 2010
This white paper shows how performance brand advertising engages a mass audience in digital media
Tags : 
social media, advertising, brand advertising, performance, social games, social networking, paid media, earned media
    
SVnetwork
Published By: mindSHIFT     Published Date: Nov 29, 2007
Unlike email, instant messages (IMs) do not allow group communication; nor do they persist -- you can't hold on to them for as long as you wish. Persistent group chat, however, allows businesses to organize persistent dialogue around business-critical topics, and keep them for easy retrieval later.
Tags : 
collaboration, communication, project management, instant message, instant messaging, collaborate, discussion, communicate, mindshift
    
mindSHIFT
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security, networking
    
Cyveillance
Published By: Port25 Solutions     Published Date: Mar 09, 2012
The end result of using PowerMTA is an improved return on investment and a greater confidence in your outbound email initiatives.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management, data management
    
Port25 Solutions
Published By: Port25 Solutions     Published Date: Mar 23, 2012
Using PowerMTA's VirtualMTA technology, Pure360 was in a position to easily provide dedicated IPs for their clients. and adhere to ReturnPath's certified sender requirements to maintain high inbox placement rates.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management, data management
    
Port25 Solutions
Published By: MuleSoft     Published Date: Jul 06, 2017
In a microservice architecture a query or command will, by the very nature of the architecture’s functional decomposition, result in chains of API calls and messages across multiple microservice instances. Regardless of where a particular microservice sits in the chain, we must not lose sight of the user at the front end.
Tags : 
microservice architecture, chains of api, user
    
MuleSoft
Published By: Bronto     Published Date: Jul 16, 2012
Transactional messages are the most opened among message types. Find out the keys that will let you take advantage of this and drive more revenue from your transactional messages.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, customer
    
Bronto
Published By: Adobe     Published Date: Feb 08, 2016
Your customers are constantly overwhelmed with marketing messages, advertisements, and offers. To stand out, you need to deliver relevant content that increases conversion and engages your customers.
Tags : 
adobe, email, marketing, contextual, conversion, engagement, business technology
    
Adobe
Published By: Zendesk     Published Date: Jan 03, 2019
To successfully meet customer demands for more immediate, personalized attention, companies are leveraging new technologies that go beyond traditional voice and email. By implementing such channels as live chat, social media, mobile apps, SMS/text messages, self-help solutions, and more, companies can now be ready wherever and however the customer wants. The following report, sponsored by Zendesk, is based on an online survey of 1,044 U.S. consumers who have received online or phone customer service. The research goal was to better understand present customer expectations and to quantify the impact of customer service on business results. Questions were asked about past experiences with customer service, as well as preferences and opinions. Certain questions were repeated from a similar 2013 survey to enable trend analysis.
Tags : 
    
Zendesk
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.