targeting

Results 251 - 266 of 266Sort Results By: Published Date | Title | Company Name
By: Semcasting     Published Date: Aug 29, 2013
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, digital target, online marketing strategies
     Semcasting
By: Turn     Published Date: Mar 13, 2013
Tech for Cross-Channel Ad Targeting
Tags : cross-channel ad targeting, advertising strategy, real-time bidding, digital marketing
     Turn
By: Turn     Published Date: Mar 13, 2013
3 Keys to Look-Alike Modeling
Tags : look-alike modeling, targeting, predictive modeling, predictive models, advertising strategy
     Turn
By: CEB     Published Date: Sep 04, 2013
Analysis on the key challenges, developments, and innovations affecting corporate and business finance. This edition helps you to compare your cost and growth assumptions with peers, establish a finance-friendly corporate culture, develop critical guidance-based skills on your team, mobilize global cash balances, increase the effectiveness of investor targeting, and improve business analytics.
Tags : corporate culture, thought leadership, finance talent, cash balances, investor targeting, finance outlook, business analytics
     CEB
By: Oracle     Published Date: Nov 05, 2013
The key is knowing your target audience and creating video content relevant to them. This paper provides some key insights into how you can maximize your video’s effectiveness in social streams.
Tags : branding, branded video posts, video posts, multimedia, engagement, audience targeting, video content, social media
     Oracle
By: Symantec     Published Date: Oct 07, 2014
Last year, Mac malware increased by 66% with a single, high-profile attack infecting over 600,000 machines. Malware authors are targeting unsuspecting Mac users and gaining access to organization's data. Still wondering whether Macs need protection? See what advice a senior strategic analyst at ESG has to share.
Tags : enterprise, mac security, cybercrime, malware, data, high-profile attack, infection, security
     Symantec
By: Monetate     Published Date: Aug 19, 2014
Everyone is talking about multichannel marketing as a way to reach today’s empowered customer, but what’s that mean for the email marketer? Simple: email marketers need to stop thinking about their role as a single channel focused solely on retention. This white paper will walk you through how to increase customer acquisition and retention rates by working with other members of your organization’s digital marketing team.
Tags : multichannel marketing, geo-targeting, customer retention, acquiring customers
     Monetate
By: Monetate     Published Date: Aug 19, 2014
82 percent of shoppers say they would buy more items from a brand if the emails they sent were more personalized. But how do you deliver that level of revenue-driving personalization? This white paper offer five tactics that will personalize your email beyond the subject line and drive real business growth.
Tags : subject line, geo-targeting, personalized emails, email strategies
     Monetate
By: Monetate     Published Date: Aug 19, 2014
Everyone is talking about multichannel marketing as a way to reach today’s empowered customer, but what’s that mean for the email marketer? Simple: email marketers need to stop thinking about their role as a single channel focused solely on retention. This white paper will walk you through how to increase customer acquisition and retention rates by working with other members of your organization’s digital marketing team.
Tags : multichannel marketing, geo-targeting, customer retention, acquiring customers
     Monetate
By: Dun & Bradstreet     Published Date: Dec 08, 2015
A guide to creating stronger marketing campaigns with better data.
Tags : 
     Dun & Bradstreet
By: Dun & Bradstreet     Published Date: Feb 03, 2016
Better customer data management increases marketing ROI.” Easy to say, but not so easy to prove. This whitepaper provides everything you need to build a business case for customer data management, including: What organizational data maturity is and how it benefits the business Actual performance outcomes of data-mature organizations Data maturity’s quantifiable impact on targeting, nurturing and close
Tags : 
     Dun & Bradstreet
By: AdRoll     Published Date: Oct 29, 2014
In this guide, we’ll help you set up the most successful retargeting campaigns during the critical holiday time of year.
Tags : retargeting campaigns, consumer behavior, desktop retargeting, mobile retargeting, roi, consumer targeting
     AdRoll
By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
     Akamai Technologies
By: Vindicia     Published Date: Oct 04, 2017
The move to subscription and recurring revenue business models is sweeping both business-to-business (B2B) and business-to-consumer (B2C) sectors. There are striking similarities in why— and how—subscription models lead to success for companies targeting businesses or consumers as customers. But there are also differences, and those differences show themselves clearly the impact of billing on customer acquisition and retention success.
Tags : 
     Vindicia
By: TIBCO Software     Published Date: Jul 22, 2019
FINANCIAL SERVICES’ HISTORY OF DISRUPTION Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
     TIBCO Software
By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
     Darktrace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com