RSS feed Get our RSS feed

News by Topic

consumer data

Results 1 - 25 of 149Sort Results By: Published Date | Title | Company Name
By: AppNexus     Published Date: Apr 04, 2017
Email marketing is one of digital media’s most effective channels. Inside the inbox, marketers can capture the consumer’s undivided attention in a uniquely intimate environment, creating a perfect opportunity for meaningful brand engagement and driving new purchase transactions. However, with open rates for even the most effective brands hovering around 25%, there is huge opportunity for marketers to reach their customers with impactful formats on the open internet to successfully engage them across the marketing funnel. Download the free eBook “Beyond The Inbox: How To Transform Your Email Marketing Platform Into An Omnichannel Solution” to learn: • How to rapidly build an omni-channel solution for your clients • How AppNexus can help your platform reach your marketer’s customers most cost-effectively • How AppNexus ensures complete security for your client’s CRM data assets ?
Tags : appnexus, email marketing, omni-channel, crm data, branding, marketing, brand engagement, customer engagement
     AppNexus
By: Freshdesk     Published Date: Aug 15, 2016
When 76% of consumers say they view customer service as the true test of how much a company values them, you have to make sure that your strategy, and tool, are top notch. Here's a collection of best practices, drawn from our conversations with customers, to help you improve your agents' productivity and win customer love. In this whitepaper, we detail how you can - Provide your agents with complete context by pulling data from your third party systems into your helpdesk - Reduce ticket volume and help customers help themselves by setting up a knowledge base - Automatically assign tickets to the right team with ease thus reducing your agent's workload and many more!
Tags : 
     Freshdesk
By: Akamai Technologies     Published Date: Mar 09, 2017
Is your site ready for the mobile opportunity? Mobile users buy more often and spend more money, but 75% of consumers see their mobile experience as slow. Read the Mobile is the Moneymaker infographic now to find out what mobile users expect from your e-commerce website. Compiled using data from Akamai’s recent consumer web performance expectations survey, this infographic reveals: • E-commerce engagement and spending habits for mobile consumers • Mobile consumer page load expectations • The real-world business impact of not being mobile ready • The key challenges to successful mobile experiences
Tags : financial services, financial data, mobile opportunity, e-commerce, mobile consumers, mobile experiences
     Akamai Technologies
By: Adobe     Published Date: Nov 07, 2013
Audi differentiates its brand experience using web content and digital asset management capabilities in Adobe Experience Manager.
Tags : adobe, audi, audi cars, adobe marketing cloud, audi website, latest innovation, brand experience, head of brand portal
     Adobe
By: ServiceNow     Published Date: Oct 18, 2013
Three IT transformations can help IT get its own house in order to become the proactive partner of the business. By applying these concepts, IT departments at major enterprises are changing the way they engage with their business peers.
Tags : technology, service automation, it workload, it infrastructure, service consolidation, it globalization, managing service relationships, consumerized service experience
     ServiceNow
By: Bazaarvoice     Published Date: Aug 12, 2013
Thanks to social, consumers are more vocal than ever and their opinions are influencing the purchase decisions of consumers all across the web. Learn how to turn social data into strategic business advantage with nine guiding insights to improve your bottom line today.
Tags : product insights, consumer engagement, business intelligence, consumer insights
     Bazaarvoice
By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : social media, business intelligence, customer hub, crm, oracle
     Oracle
By: Evariant     Published Date: Sep 07, 2016
Marketers face a unique challenge to allocate resources across a variety of tactics to target key audiences that need their product or service – with limited information on what combination of products or services will have the optimum impact, which target audience members are ideal fits, and what allocations will provide the best return on investment to the organization. Healthcare has its own myriad of challenges, including many local, regional, and national options for consumers, service line variations, and disparate demographics. The good news is that there is an emerging understanding of digital and multichannel marketing, and ample opportunity to define best practices, systematically calculate marketing effectiveness and return on marketing investment (ROMI), and use technology and data to create great business outcomes.
Tags : evariant, multi-channel marketing, hospital, patient engagement, digital marketing
     Evariant
By: Intel® Services     Published Date: Aug 15, 2014
With mobile hitting the mainstream, travel suppliers and intermediaries need to evolve their mobile offerings in order to satisfy the always-connected traveler.
Tags : consumer experience, api management, booking and purchase, datal flow, customer satisfaction
     Intel® Services
By: Code42     Published Date: Mar 20, 2014
While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity, it presents important challenges for IT departments, especially in terms of endpoint backup and data security. To reap the benefits of consumerization while avoiding security and other pitfalls requires an understanding of the origins of this latest IT trend, its enduring presence and how the most successful enterprises have effectively embraced this new reality.
Tags : codefourtytwo software, code 42, endpoint backup, data protection, mobile data, mobile devices, mobile security
     Code42
By: Micro Focus     Published Date: Feb 24, 2015
With today’s ‘touch of a button’, always-on lifestyles, consumers expect information to be quickly accessible to customer-facing staff. They expect the same efficiency they get from their own phones or devices. Yet all too often business data is mired in outdated, slow systems and applications. These systems are difficult to work with, making each call or transaction slow to process as a result. This impacts customer satisfaction and reduces throughput. It affects productivity.
Tags : microfocus, rumba, customer service, real time web application, insurance quotes, business efficiency
     Micro Focus
By: Epicor Software     Published Date: Feb 26, 2015
Online consumers are redefining the fulfillment landscape. Wholesalers need to unlock the value of integrated business data. Only full insight into all areas of the distributor’s business will provide the necessary clarity to make decisions they can stand behind. This confidence can be achieved only if they have the required data and technology at hand at the right time. The total technology investment is not small. But, it may mean the future viability of the wholesale distribution segment. Why now is the critical time to invest.
Tags : wholesale distribution, online consumers, integrated business data
     Epicor Software
By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
     MobileIron
By: Deluxe     Published Date: Mar 15, 2017
Best-in-class FI marketers have embraced the power of signals. Through their everyday actions, consumers and businesses continually create signals for marketers like you. A signal is an indication of intent or behavior. Examples of activities that produce signals include making a purchase, searching online for information about a financial product, clicking on an ad, applying for a loan, and paying off debt. Each signal can be tracked, monitored, and acted upon. Reaching customers at the critical moment, in the right channel with the right message, requires keen insights about the signals they’re producing. Signals aren’t new to marketing. In fact, you may already be using new mover lists or even search engine marketing. Today, though, there is so much more valuable data available — if you know where to look and what to do with it.
Tags : 
     Deluxe
By: WNS     Published Date: Jun 21, 2017
'Innovatively growing a consumer base, especially non-users' can be a challenging task for a CPG organization, looking for growth strategies in a world of discerning loyalty and fragmented markets. WNS designed a personalized consumer analysis framework that enabled a CPG major to successfully target non-user target segments, and enabled a two-fold growth in consumer base and revenue from sales.
Tags : consumer survey, data set, u&a studies, analysis, non-users, price optimization, brand affinity, cpg
     WNS
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: MarkLogic     Published Date: May 16, 2017
With MiFID II regulations demanding increased pre and post-trade transparency for consumers, investment banks are in a race against the clock to demonstrate compliance across a dizzying array of data sources, systems and schemas before January 2018.
Tags : 
     MarkLogic
By: IBM     Published Date: Apr 14, 2017
Today, all consumers can obtain any piece of data at any point in time. This experience represents a significant cultural shift: the beginning of the democratization of data. However, the data landscape is increasing in complexity, with diverse data types from myriad sources residing in a mix of environments: on-premises, in the cloud or both. How can you avoid data chaos?
Tags : data analytics, product refinement, business exploration, advanced prototyping, analytics, data preparation, customer support, sales relations
     IBM
By: Neustar     Published Date: Feb 27, 2013
Consumer phone data is changing every day, from the device to the subscriber which leaves you at risk for violating the TCPA. Neustar Information Services provides you with authoritative phone data to help you mitigate risk and increase efficiency.
Tags : tcpa, compliance, risk, authoritative phone data, auto dialing restrictions, telephone consumer protection act, autodialer violations, b2c
     Neustar
By: Code42     Published Date: Mar 31, 2015
There is a problem with convenient (but rogue) consumer sync and share tools. Although they do a great job of fulfilling the immediate need, they expose the enterprise to the possibility of data breaches, leakage, and viruses. Security concerns common to free file-sharing services include: - Password thefts from the service itself - Security loopholes that allow public access to files for hours at a time - Theft of login credentials from a mobile device Loss or exposure of proprietary information can have devastating consequences for a business. But how does an enterprise protect itself when the culture of the mobile workforce is to resist top-down, policy-driven security practices?
Tags : syncing, sharing, data breaches, viruses, file-sharing, security
     Code42
By: Code42     Published Date: Mar 31, 2015
There’s no doubt consumer-grade sync and share solutions are convenient, but it’s the risk they introduce to the enterprise that keeps IT leaders up at night. And it’s not without a price: unintentional data compromises cause financial hardship—nearly $2 billion, according to the harmon.ie study—and reputational damage for businesses and their customers. Luckily, there is such a thing as “enterprise-grade” sync and share, meeting IT teams’ needs for solutions that combine corporate-level security and management capabilities with the ease-of-use employees demand. But what really constitutes an enterprise-grade sync and share solution? To get a second glance from enterprise IT, sync and share solutions must, at a minimum, include the basic business feature sets: security, integrations, roles and permissions, audit trails, remote wipe, comprehensive APIs, real-time administration, bandwidth controls and de-duplication.
Tags : sync, fss, file share, data compromises, integrations, bandwith controls, security, storage
     Code42
By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
     Intralinks
By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
     Intralinks
By: SAP     Published Date: Jul 20, 2015
However, here at SAP we have identified four broad technology trends that are currently having a major impact on how retailers conduct business and engage with consumers. They are Big Data, social media, seamless retailing and disruptive technologies. Read this report for an analysis and overview of each trend area, why they are important and what the future likely holds.
Tags : it trends, retail, big data, social media, seamless retailing, disruptive technology, trends, crm & customer care
     SAP
Start   Previous   1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics