behavior

Results 326 - 350 of 613Sort Results By: Published Date | Title | Company Name
Published By: SmartFocus     Published Date: Mar 09, 2015
Successful marketers are waking up to the power of context. Contextualization enables marketers to better understand their customer and their journey – in any moment – and instantly engage them with personal, relevant messages that drive sales and responses.
Tags : 
personalization, contextualization, customer journey, customer behavior, customer experience, customer engagement, customer relationships, marketing strategy, campaigns
    
SmartFocus
Published By: SmartFocus     Published Date: Mar 09, 2015
84% of customers said they would no longer buy from a business that didn't take into account their preferences and purchase history. Therefore crowd recommendations and ‘best sellers’ just don’t cut it anymore. Looking at the behavior of all customers to discover popular and trending products is not enough. You need to provide a unique storefront for every customer. That’s why getting personalization right, is key to ensuring your customer has a seamless experience, increases purchase opportunities and ultimately ensures your business stands out from the crowd.
Tags : 
personalization, contextualization, customer journey, customer behavior, customer experience, customer engagement, customer relationships, marketing strategy, campaigns
    
SmartFocus
Published By: Riverbed     Published Date: Feb 26, 2015
The goal of understanding and managing service behavior remains elusive. Failure to adopt operational practices such as service portfolio management, process refinement, consolidation of tools, and consolidation of the organizational entities themselves explain most of the trouble.
Tags : 
service management, application visibility, operational practices, infrastructure, application monitoring, database monitoring, cloud performance management
    
Riverbed
Published By: Oracle     Published Date: Feb 24, 2015
To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Tags : 
oracle, digital marketing, b2b, rfp, feedback, signals, data, behavior, prospect interest, intent, analytics, buying process, sales, online, efficiency, business technology
    
Oracle
Published By: Quantcast     Published Date: Feb 13, 2015
Over the last decade, Mobile has driven an unprecedented behavioral and cultural shift, providing information and connectivity at our fingertips. Mobile is increasingly becoming the main screen accessed throughout the day and in turn, Mobile marketing has developed into a sophisticated, personalised marketing channel to reach Mobile consumers. In this paper, we explore the Mobile landscape and identify opportunities and solutions for advertisers.
Tags : 
mobile advertising, advertising solutions, mobile consumers, personalized marketing channels
    
Quantcast
Published By: Quantcast     Published Date: Feb 13, 2015
New ad targeting capabilities from Twitter give brands a way to use their own data to create more niche targeting and deliver even more tailored advertising across Twitter's platform. Known as tailored audiences, this new targeting capability presents an opportunity for marketers to create a custom audience of new prospects and customers and reach them on Twitter. Download this guide to learn how you can drive better engagement and reach new prospects based on web-wide browsing behavior and interests.
Tags : 
twitter, real-time advertiser, custom audience, quantcast, ad targeting
    
Quantcast
Published By: Jive     Published Date: Feb 12, 2015
Enabling a "digital business" is becoming an increasing priority for organizations; the transition to enabling a digital interaction model inside an organization is twofold. There are technologies that underpin interactions as well as the cultural and behavioral changes that support this transition. Enterprise social networks (ESNs), and more broadly, social workflow, can play a significant role in this particularly when thought of as both a platform and a social workflow embedded in business systems where users are getting work done. This study identifies several key areas of market opportunity and provides criteria by which vendors can be judged now and over the next 5 years.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
    
Jive
Published By: IBM     Published Date: Feb 11, 2015
This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent solutions from IBM can detect and help prevent threats - from the network perimeter to remote endpoints.
Tags : 
behavior-based protection strategies, remote endpoints, ibm, network perimeter, vulnerability decodes
    
IBM
Published By: Digital Bungalow     Published Date: Feb 09, 2015
Google Analytics is an excellent tool for gaining insights into user behavior and gathering data for site optimization.
Tags : 
google analytics, site optimization, customer acquisition, consumer behavior, advanced segments
    
Digital Bungalow
Published By: IBM     Published Date: Feb 04, 2015
Telerx reveals new insights into consumer behavior with speech-to-text analytics.
Tags : 
consumer behavior, speech-to-text analytics, telerx, consumer intelligence, consumer research
    
IBM
Published By: newrow_     Published Date: Jan 29, 2015
Corporate training programs must be modified to resonate with Millennials, and the first step in doing so is understanding how technology has changed this generation’s behaviors. To better engage, onboard, attract and retain Millennial talent, here are three ways companies can structure their training initiatives to meet our future workforce’s unique learning and working style.
Tags : 
emloyee retention, employee engagement, employee training, best practices, employee training programs
    
newrow_
Published By: Oracle     Published Date: Jan 28, 2015
In the not-too-distant past, a retailer simply had store-level sales data, from which virtually all planning decisions were made. Today, retailers—from grocery to fashion—are bombarded with data that, with the right tools, can help them gain actionable insight into shoppers’ behavior across channels. In this white paper Oracle Retail explains how retailers can accurately measure consumer interest in specific merchandise and apply that knowledge from one channel to the next, thoroughly understand the implications of promotions on specific customers and customer segments, price on product performance, plan channel-specific assortments accordingly, and coordinate the supply chain processes to ensure execution of the cross channel plan.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jan 28, 2015
Retailers continue to collect this data and many have made good use of it, segmenting and targeting customers and rewarding loyal behavior with discounts and offers. Still, many sense that there’s untapped potential. They’re right. With the cost of data storage plummeting and the capabilities of analytical tools on the rise, this data’s value is set to skyrocket. John Bible, Senior Director of Retail Data Science and Insight at Oracle Retail shares his view on how insights from these vast data storehouses can scientifically inform retailers’ decision-making in critical strategic, tactical and operational areas, including category management, shelf space allocation and new product introductions.
Tags : 
    
Oracle
Published By: HP     Published Date: Jan 20, 2015
Security breaches can happen anywhere in an organization, and having the ability to analyze any form of data can give you the edge against fraud, theft, and infiltration by pinpointing abnormal behavior patterns. Understanding your security vulnerabilities requires rapid, deep analytics against business data, machine data, and unstructured human information.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: LogMeIn     Published Date: Jan 12, 2015
This paper briefly covers the relevant trends that are affecting user behavior, and offers new criteria for selecting an audio conferencing solution provider that meets your organization’s needs.
Tags : 
audio conferencing solutions, logmein joinme, trends affecting user behaviour
    
LogMeIn
Published By: Act-On     Published Date: Jan 08, 2015
Learn Facebook’s Rules of Engagement so you can make your content more sharable and searchable – and avoid violating the terms of service. This eBook will give you a thorough understanding of Facebook principles, and the general rules that apply to content and behavior.
Tags : 
act-on, facebook, social, media, rules, engagement, b2b, marketing, search, tags, post, data, feed, news, algorithm, branding, control
    
Act-On
Published By: Quantcast     Published Date: Jan 07, 2015
Over the last decade, Mobile has driven an unprecedented behavioral and cultural shift, providing utility, information and connectivity at our fingertips. Mobile is increasingly becoming the main screen accessed throughout the day, and Mobile marketing, in turn, has developed into a sophisticated, personalized marketing channel to reach Mobile consumers. In this paper, we explore the Mobile landscape and identify opportunities and solutions for advertisers.
Tags : 
mobile advertising, personalized marketing channel, mobile solutions, mobile landscape
    
Quantcast
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
Everyone likes to be noticed. Recognition and rewards help people feel good about what they are doing and things they have accomplished. Recognizing employees will keep them focused, directed and willing to repeat the behaviors they were recognized for. Learn 10 reasons why recognizing your employees really works.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, employee programs, recognition ideas, employee motivation, recognition program ideas
    
BI WORLDWIDE
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
As a manufacturer, your uncontrolled distribution channel has a lot of places to focus their attention. So how do you break through the clutter? Reward and recognition programs have long been used to engage channel partners and align their activities with manufacturers’ goals. Applying behavioral economics to your program design will drive extra focus and effort. Learn ten best practices to follow when designing your next channel reward and recognition program.
Tags : 
customer loyalty, loyalty program, customer engagement, brand loyalty, brand advocacy, channel engagement, channel incentives, channel loyalty, customer incentive programs, customer loyalty program, customer marketing
    
BI WORLDWIDE
Published By: BloomReach     Published Date: Dec 22, 2014
Introducing BloomReach Compass, a tool that understands your site's content and identifies opportunities to maximize revenue. Surface and prioritize opportunities out of your billions of datapoints from content details, user behavior, and business performance.
Tags : 
    
BloomReach
Published By: PostUp     Published Date: Dec 17, 2014
If you have been keeping up with email marketing trends, you know that personalization is a hot topic. Delivering personalized, timely messages allows you to stand out in the ever competitive inbox, but how is this executed? With a blended content strategy.
Tags : 
postup, email personalization, personalization, email content, email marketing strategies, behavioral marketing, email marketing trends, blended content strategy
    
PostUp
Published By: McAfee     Published Date: Nov 20, 2014
How do we get more visibility into attacks across our environments, improve our response, and reduce response time? SANS Analyst, James Tarala, provides insight on the solution by automating functions that should be automated and connecting the dots between detection systems and response. Connecting these dots and applying intelligence provides responders rich context into the observed behaviors for taking action. Integrating these processes improves accuracy, while reducing time, manpower, and costs involved in detecting and managing events. This white paper explores how to achieve this.
Tags : 
sans, incident response, detection systems, data correlation and aggregration, siem, security analytics tools
    
McAfee
Published By: Salesforce     Published Date: Nov 18, 2014
Find out which type of sales rep is mostly likely to succeed in the current economy. Corporate Executive Board asked over 450 front-line sales managers and their direct reports questions across 44 different attributes, covering areas such as attitudes, skills, behaviors, activities, and knowledge. Get the eBook to find out which sales profile wins the most deals and how all your sales reps can be more successful.
Tags : 
sales, economy, skills, attitudes, behaviors, knowledge, sales reps
    
Salesforce
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, business technology
    
Intralinks
Published By: AdRoll     Published Date: Oct 29, 2014
In this guide, we’ll help you set up the most successful retargeting campaigns during the critical holiday time of year.
Tags : 
retargeting campaigns, consumer behavior, desktop retargeting, mobile retargeting, roi, consumer targeting
    
AdRoll
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.