news

Results 276 - 300 of 310Sort Results By: Published Date | Title | Company Name
Published By: TailoredMail     Published Date: Nov 21, 2008
Learn how email service provider, TailoredMail, helped an automotive agency easily handle hundreds of dealer accounts yet effortlessly give each a personal touch.
Tags : 
tailored mail, email service provider, email marketing program, outsell, email newsletters
    
TailoredMail
Published By: TailoredMail     Published Date: Nov 21, 2008
Normal 0 false false false EN-US X-NONE X-NONE In tough economic times, when budgets are being cut, there is an advertising medium that you can turn to that delivers a high ROI without a steep price.
Tags : 
email marketing, tailored marketing, online marketing, email newsletters
    
TailoredMail
Published By: Clarity Quest Marketing     Published Date: Dec 22, 2008
When looking into sending out press releases for your business, you might be overwhelmed with the options. In addition to traditional wires, there are many new web-based services. Choosing the right one for your business sometimes requires trial and error. The following press release wire service websites for the most part all provide a similar service, but they all have differences in how they present information, and how helpful they actually are.
Tags : 
clarity quest marketing, pr newswire, businesswire, prweb, marketwire, emailwire
    
Clarity Quest Marketing
Published By: SAS     Published Date: Jul 25, 2011
Major provider of online hotel, plane and car reservations uses SAS Business Analytics to optimize online customer experiences, as well increase the lifetime value of each customer.
Tags : 
sas business analytics, sas, optimize, optimization, research, development, new product, services, internet, expedia inc, analytic, ecommerce, express warranty, news, article, story
    
SAS
Published By: SAS     Published Date: Jul 25, 2011
An analytic center of excellence demonstrates that an organization is committed to making better, fact-based decision and leveraging analytics to validate assumptions and identify root causes of business problems. This paper focuses on how to form an analytic center of excellence and the value the business will derive from it.
Tags : 
coe, cost of excellence, sas, optimize, optimization, research, development, new product, services, internet, expedia inc, analytic, ecommerce, express warranty, news, article, story
    
SAS
Published By: Suzy Feine     Published Date: Sep 30, 2010
Press releases are no longer just a means to announce business news. Learn the five reasons why press releases can have a dramatic effect on your company's marketing strategy.
Tags : 
marketing, seo, press release, media, editors
    
Suzy Feine
Published By: Benz Marketing Group     Published Date: Mar 07, 2011
Agency A-List Contender Benz Marketing Group opens several satellite Offices in the State of California, United States
Tags : 
advertising, marketing, business, economics, growth, public relations, management, california, news
    
Benz Marketing Group
Published By: Spredfast, Inc.     Published Date: Oct 03, 2013
10 Tips to Make your Facebook Content Newsfeed-Worthy
Tags : 
spredfast, marketing, facebook, social media, newsfeed-worthy, branding on facebook
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Mar 04, 2014
Here’s a social story about engaging communities nationwide from Gannett, a media company that owns USA Today and hundreds of local newspapers, TV stations and digital properties.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.
Published By: Bloomberg     Published Date: Dec 28, 2011
No other source puts so much data in one place, allowing you to be more efficient and effective in your job. Once you've experienced BGOV, you'll wonder how you ever worked without it.
Tags : 
bloomberg government insider, bgov, demo, free trial, policy analysis, data breakdowns, editorial expertise, news aggregator, policy research, government contract database, congressional staff database
    
Bloomberg
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security
    
Mimecast
Published By: Silverpop     Published Date: Feb 04, 2013
Silverpop asked some of its partners for their expert ideas on ways to solve four of the most common dilemmas in the digital marketing marketplace.
Tags : 
digital marketing, email marketing, engagement, newsletter, automation
    
Silverpop
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection, business technology
    
Arbor
Published By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Oracle
Published By: Lumension     Published Date: Jun 03, 2015
The IT news over the last year has been filled with story after story on data breaches, making the release of Lumensions’ 4th annual data protection maturity report all the more relevant. Review this report for a timely analysis of the threats, responses, policies, and technologies comprising today’s shifting data security landscape. It also reveals how organizations have made progress, the steps they plan to take to address data protection challenges in 2015—and where they may still be at risk.
Tags : 
data protection, data, security, cloud, storage
    
Lumension
Published By: Globalscape     Published Date: Mar 21, 2014
Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too!
Tags : 
file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, it management
    
Globalscape
Published By: PostUp     Published Date: Sep 25, 2014
Learn how to create an inspiring and exciting email program and see how 13 of the top industry B2C leaders have structured their campaigns.
Tags : 
postup, email creative, creative newsletter design, creative newsletter, creative email newsletters, email marketing solutions, email campaign, email marketing program, email marketing best practices
    
PostUp
Published By: VMware AirWatch     Published Date: May 19, 2016
In the cacophony of business headlines, news of data security breaches come through like a high-tempo drum beat. In fact, the number of incidents keeps growing at a rate of 66 percent CAGR, with a cost per breach of $5.9 million. And some of the world’s most recognized brands are sustaining bruises to their reputations and harmful hits to their bottom lines as they scramble to repair the damages. Enterprise IT organizations are facing an elusive enemy perpetrators who range from sophisticated cyber criminals and government-sponsored spies to hackers and script kiddies, and who have motives as diverse as money, politics, or simply youthful mischief.
Tags : 
data security, enterprise, data protection, mobile security, anti spyware
    
VMware AirWatch
Published By: Workterra     Published Date: Jan 27, 2016
It’s not news that the use of SaaS solutions for enterprise business is booming. Nor should you be surprised to know the trend will continue.
Tags : 
workterra, hcm, flexibility, workforce, saas, business technology
    
Workterra
Published By: DocuSign     Published Date: Oct 20, 2016
Jon Dee, the Sky News host, meets with Craig Cawood, Vice President General Counsel at McDonald's, to hear how their Australia legal office reduces paper waste with DocuSign.
Tags : 
    
DocuSign
Published By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
    
FICO
Published By: Oath     Published Date: Oct 31, 2017
Consumers are better than ever at differentiating between low-quality and premium content. For marketers, this means the placement of their ads is critically important. Brands can’t afford to risk appearing alongside questionable content, not with 75% of consumers holding brands accountable for their ad environments. When brands are shown adjacent to Oath’s trustworthy, premium content, they experience 5x greater favorability - a striking example of the power of positive associations and the importance of knowing your digital neighbors.
Tags : 
digital advertising, online advertising, ad placement, quality content, quality video content, online news, online video, offensive content, fake news, online consumer habits, brand boycotts, user generated content, trustworthy sources, premium content, premium video content, native advertising, auto advertising, auto dealership advertising, auto digital advertising, auto marketing
    
Oath
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.