behavior

Results 76 - 100 of 614Sort Results By: Published Date | Title | Company Name
Published By: blueconic     Published Date: Oct 14, 2014
Download this whitepaper to learn how your enterprise can leverage a powerful new technology to learn about each prospect from the first click on a website or ‘Like’ on a social media page.
Tags : 
blueconic, marketing, customer engagement, social media marketing, internet marketing, consumer behavior, market research, crm, crm strategy, profiling, real time engagement tracking
    
blueconic
Published By: Bluecore     Published Date: May 14, 2018
After decades in the limelight, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages. To better understand how retailers are using email, including the extent to which they have embraced individualized messaging opportunities and the effectiveness of those messages, Bluecore turned to the data. Our 2018 Retail Email Benchmark report provides a baseline understanding of these a
Tags : 
    
Bluecore
Published By: Bluecore     Published Date: Sep 27, 2018
Review a sampling of behavioral and catalog triggers as well as personalized batch sends used by a variety of retailers during the holiday season.
Tags : 
bluecore, email marketing, holiday shopping, holiday season
    
Bluecore
Published By: Bluecore     Published Date: Oct 23, 2018
AFTER DECADES IN THE LIMELIGHT, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages.
Tags : 
bluecore, retail, email, report, ecommerce, marketing
    
Bluecore
Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment
    
BlueHornet
Published By: BMC ESM     Published Date: Aug 19, 2009
Would you trust your network monitoring tools enough to know when something is truly halting a business service? While Mary Nugent won’t use this podcast to attempt to tell you technical details on the correct alarming thresholds, she will share some excellent stories about predicting a system’s behavior. Run Time: 11:30.
Tags : 
network, networking, monitoring, podcast, bmc, monitor, business service, business behavior, network, management, performance
    
BMC ESM
Published By: Boomtrain     Published Date: Mar 29, 2016
Learn how to get more value out of your traffic by turning nameless visitors into loyal, engaged subscribers.
Tags : 
audience development, user engagement, audience engagement, audience retention, user retention, content personalization, email personalization, web personalization, behavioral data, anonymous users
    
Boomtrain
Published By: Bronto     Published Date: Jul 16, 2012
Email marketers should be leveraging the use of Recency, Frequency, Monetary (RFM) analysis to uncover optimal segments and untapped opportunities within their email marketing program. Email marketing provides real time data about subscriber behavior, which is ideal for RFM analysis. In order to use each metric fully we will focus on the undeniable power of Recency first.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, customer
    
Bronto
Published By: Bronto     Published Date: Jan 03, 2013
This white paper will step through each phase of the customer lifecycle, outlining consumer behavior along the way and identifying revenue-generating programs that you can implement.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
Published By: Bronto     Published Date: Sep 09, 2013
Data about your buyers is extremely valuable. It can be used for targeted remarketing that drives repeat purchases and engaged, loyal customers. When it comes to collecting and using data related to purchases on your site, how do you compare?
Tags : 
purchase data, buyer data, buyer behavior
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their business and keep shoppers coming back for more. Are you ready to add a few to your tool box? To build or revamp your e-commerce program, you'll need tools to build subscriber lists in healthy ways, manage coupons, maximize transnational messages, and ping shoppers to remind them about whats waiting in their shopping cart. To stay ahead of the competition, you must also capture browse behavior and create triggered messages to nudge shoppers along in their buying journey, predict what a customer wants and recommend the right product. And, depending on your target audience, you may need to explore SMS.
Tags : 
    
Bronto
Published By: Bronto     Published Date: Jul 10, 2017
Canadian consumers have made shopping online an established behavior—80% did it last year—and many online retailers are interested in selling to them. That’s because they see opportunity. The product selection and retailer options Canadians ?nd online with merchants based in Canada trail their expectations, and that leads many to look at international shopping options. 67% of Canadian online shoppers purchased from a foreign e-retailer last year, according to PayPal Inc., making Canada the seventh-highest nation for cross-border online shopping among 29 surveyed.
Tags : 
e-commerce, canada, consumers, e-retailer, customer expectations
    
Bronto
Published By: Bronto     Published Date: Jul 19, 2017
With the exponential growth of internet marketing and online advertising, the customer's journey to making a purchase has grown longer, often including a mrylad of touch points along the way. Whether they begin with a direct search or visit a website via a paid advertisement, the modern shopper takes far more time to explore their options and do their research before buying. Lets take a closer look at three common stages of today's buying journey and solutions for effectively managing each one.
Tags : 
online advertising, internet marketing, online shopping, mobile shopping, customer loyalty, brand loyalty, loyalty program, shopping incentive, consumer behavior, retail
    
Bronto
Published By: Bronto     Published Date: Jul 19, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their businesses to keep shoppers coming back for more. Are you ready to add a few to your toolbox? In this e-book, we'll explore seven readily available commerce marketing tools and highlight the experiences of marketers using these tools to increase revenue and engagement.
Tags : 
commerce marketing, commerce marketers, ecommerce, subsribers, manage coupons, consumer behavior, message integration, roi, customer satisfaction
    
Bronto
Published By: Bronto     Published Date: Jul 19, 2017
In the age of the consumer, relationships determine success, as they are the last remaining source of competitive advantage. Create relevant marketing messages to connect with your consumer in meaningful ways via highly personalized campaigns. This info gram discusses different ways to influence and build positive consumer behaviors and relationships.
Tags : 
brand loyalty, ecommerce, consumer behaviors, loyalty programs, mobile engagement, customer loyalty, building brands, competitive advantage
    
Bronto
Published By: Bronto     Published Date: Feb 01, 2018
We surveyed thousands of consumers in the US, the UK, Australia, Canada and the Netherlands to see how they use mobile technology to interact with retailers. This report details how browsing, product research, comparison shopping and buying have all been transformed by mobile technology. What you'll learn: • Who’s buying via mobile. • How having children in the household affects mobile shopping. • Which customers are most likely to use their phones while shopping in-store.
Tags : 
mobile shopping, mobile, consumer behavior, retail
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
We surveyed consumers in the US and the UK to learn more about the changing trends in online versus in-store shopping. How frequently do they shop? Which channels do they use? What’s their motivation? This report details how everything from income to age to advances in technology have influenced the behaviors of consumers today. What you'll learn: • Do consumers prefer to shop in stores or online? • Which sources do they rely on to learn about new products? • Are they shopping for fun or out of necessity? • How does having children in the household affect shopping behavior?
Tags : 
shopping, consumers, customer, technology
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
We surveyed thousands of consumers in the US, the UK, Australia, Canada and the Netherlands to see how they use mobile technology to interact with retailers. This report details how browsing, product research, comparison shopping and buying have all been transformed by mobile technology. What you'll learn: • Who’s buying via mobile. • How having children in the household affects mobile shopping. • Which customers are most likely to use their phones while shopping in-store.
Tags : 
customer, consumer, mobile, technology
    
Bronto
Published By: BusinessOnLine     Published Date: Jun 19, 2015
As company buying behaviors evolve, it's imperative to evolve your marketing strategies to align with the new marketplace. Luckily, with customer data becoming more and more available, smart industrial marketers are armed with high-quality proof points to establish efficient and effective programs that prove and improve marketing ROI.
Tags : 
    
BusinessOnLine
Published By: CA Technologies     Published Date: Jun 03, 2015
"Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.