Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

targeting

Results 26 - 50 of 276Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Jan 08, 2019
Every day we use location apps on smartphone devices to get us where we need to go, and to find services and products we’re looking for. However, smartphone location apps aren’t just helping individuals navigate their way around. Forward-thinking businesses are using these apps to help them get their messages straight to the right audience, at the right time, too. It’s why the connected car and in-map location marketing is a growing area of opportunity—helping companies to meet KPIs whilst transforming the landscape of marketing at the same time. This on-demand webinar with experts from HERE and eMarketer discusses how to improve location-based audience segmentation and build a more accurate consumer profiles, as well as how real-time location targeting enables hyper-targeted marketing campaigns.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer, including bridging the journeys between digital and physical worlds, you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. And with nearly all smartphones equipped with geolocation abilities, advertisements can be made location-aware with improved precision for targeting. Understanding location is key to gaining improved insights. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them to provide well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Akamai Technologies     Published Date: May 08, 2017
• Our survey of companies that currently offer, or plan to launch, so-called “direct to consumer,” or over-the-top (OTT), video services in the market suggests that the industry is maturing. Though 51 percent of those surveyed view their video service as a money-making venture, 49 percent see it as providing some other primary benefit to the company. Not only are the types of OTT video services offered to consumers becoming more diverse, but the marketing and distribution are also improving such that target audiences are more likely to find new services intended for them
Tags : 
video services, akamai, marketing, distribution, audience targeting, service optimization
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Adobe     Published Date: Nov 07, 2013
One of the key objectives of Adobe’s current advertising campaign is to explode the myth that ‘managing websites is hell’. We believe that in this day and age, the idea that website management is a nightmare should be a thing of the past.
Tags : 
adobe, econsultancy, trends and innovation, content management, customer experience management, driving engagement, brand-building, web content management, wcm, adobe experience manager, adobe marketing cloud, the cloud, cloud computing, social community, econsultancy and adobe, driving sales, multichannel customer experience, digital intelligence, targeting, segmentation
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Today’s leading DMPs are ingesting a wide range of owned and licensed data streams for insights and segmentation and are pushing data into a growing number of external targeting platforms, helping marketers deliver more relevant and consistent marketing communications.
Tags : 
adobe, the forrester wave, forrester dmp wave, audience management, data management platforms, multi-touchpoint targeting, multi-touchpoint execution, dmp vendor offerings, seamless data ingestion, message delivery, strong vendors, product evaluations, selecting right partner, audience insights, coordinated targeting
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues, ad targeting, target audiences, social media audience, spend forecast, it management
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Honda uses Adobe Social to effectively engage European fans of cars, motorcycles, robots, jets, and other inventive products through a single, coordinated effort
Tags : 
adobe, honda motor, social media, brand governance, aodbe social, inventive products, coordinated effort, social communities, targeted experiences, using resources effectively, coordinate marketing campaigns, social media management platform, localized apps, international blockade, global campaign coordination, social analytics, local marketers, digital marketing, targeting publishing, social media quality
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Think targeting ticks customers off? Actually, it’s quite the opposite. Studies show that 41% of consumers would consider ending a brand relationship because of irrelevant messaging.1 That’s why targeted and personalized content is more important now than ever before.
Tags : 
adobe, testing and targeting, targeted content, personalized content, target segments, targeting tips, important target facts, targeted campaigns, noticeable page elements, segment preferences, alternate content, control content, testing organizations, optimal end conversion, dynamic banners, quick attraction, device usage, test designs, define segments
    
Adobe
Published By: VMware     Published Date: Oct 05, 2015
Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a “Zero Trust” network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower — until now, that is. Download this use case from VMware and Carahsoft® now to learn why.
Tags : 
vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft, security
    
VMware
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Adobe     Published Date: Feb 03, 2015
The 2015 Digital Trends report, published by Econsultancy in partnership with Adobe explores different new digital trends such as customer experience, CX and content marketing, data-driven business, targeting and personalisation, mobile, cross-channel marketing and content optimisation.
Tags : 
digital trends, marketing digital and ecommerce trends, customer experience, content marketing, targeting and personalisation, mobile trends, marketing and content optimisation
    
Adobe
Published By: Evariant     Published Date: Sep 07, 2016
The physician liaison position is a relatively new one for most health systems, but individuals hired as physician liaisons are being held accountable for facilitating impactful, fast change. Where marketing drives incremental revenues by targeting patients and consumers (non-patients), physician liaisons drive incremental revenues by cultivating relationships with physicians and improving referral behavior.
Tags : 
evariant, physician liaison, hospital, physician alignment
    
Evariant
Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai
Published By: Limelight Networks     Published Date: Oct 17, 2011
An effective mobile website experience is essential to your brand's success. In this report, learn: . Insights on how to extend your brand image effectively across mobile devices . Tips for targeting multiple mobile platforms . Strategies for optimizing content publishing and performance
Tags : 
mobile strategy, mobile site, mobile website, mobile marketing, mobile web
    
Limelight Networks
Published By: Clustrix     Published Date: Sep 04, 2013
Online advertising is a highly competitive and innovative market being driven to new levels by the rise of ad exchanges, real-time bidding alongside traditional ad networks. With advertisers increasingly buying one impression at a time, advertising market growth is soaring. If your database is the bottleneck limiting the growth of your advertising business, this is the white paper for you. Find out how Clustrix will give you access to functionality, such as ad segmentation and targeting based on up-to-the minute campaign performance, as well as instant access to smart data, so your clients can make the right buy decisions. This free whitepaper considers the technical challenges this rise presents for the database, and discusses the unique technology that enables Clustrix to solve these challenges and give your advertising business a competitive advantage.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics, it management
    
Clustrix
Published By: Clustrix     Published Date: Oct 08, 2013
This whitepaper outlines new database technologies that are helping advertisers remove bottlenecks that slow down applications, improve functions such as ad segmentation and targeting based on up to the minute campaign performance and give agency clients instant access to smart data.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics, smart data, applications, it management
    
Clustrix
Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.