sms

Results 1 - 25 of 139Sort Results By: Published Date | Title | Company Name

The Mobile Advertising Opportunity: 10 Times Better Results than Online

Published By: AdMob     Published Date: Jul 20, 2009
Devices like the iPhone have made the mobile Internet a massively valuable new advertising medium, with a worldwide audience of 546 million consumers and 10 times higher brand awareness and 10 times higher click-through rates than online advertising. The mobile Internet is changing the face of advertising, and marketers must adapt to stay ahead of the competition. This White Paper is an introduction to mobile advertising and the key things marketers need to know to run successful mobile campaigns. What you'll learn: 1) The Basics: An introduction to mobile advertising; 2) Who you can reach: Demographics and statistics; 3) Spotlight on the iPhone: What it means for marketers; 4) Results you can expect with mobile advertising; 5) Case studies: Examples of Brand and Performance mobile campaigns; 6) What you need to know to extend your campaigns to mobile.
Tags : 
iphone, mobile, internet, pda, mobile phone, cpc, cost per click, blackberry, mobile advertising, cpm, click through rate, ctr, click through rates, sms
    
AdMob

Create Mobile Moments With Messaging

Published By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : 
mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung, mobile, mobile analytics, mobile marketing, sms, mobile computing, mobile data systems, mobile workers, messaging
    
Adobe

Durch Messaging mobile Momente herbeiführen

Published By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : 
mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung, mobile, mobile analytics, mobile marketing, sms, mobile computing, mobile data systems, mobile workers, wireless messaging
    
Adobe

Créez des interactions privilégiées grâce aux messages mobiles

Published By: Adobe     Published Date: Aug 04, 2015
This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.
Tags : 
mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung, mobile, mobile analytics, mobile marketing, sms, mobile computing, mobile data systems, mobile workers, wireless communications, wireless messaging
    
Adobe

Citizen Data Analytics: Give everyone a shot at the action

Published By: Adobe     Published Date: Oct 24, 2018
Adobe automates the process of turning insights into action by connecting Adobe Analytics to other solutions in Adobe Experience Cloud, including Adobe Target and Adobe Audience Manager. Four features make this possible: • Anomaly detection. The technology automatically analyzes trends and determines if they are statistically significant — in milliseconds. • Analyze play button. With analytics, you can take insights and connect them to your email, DMP, and personalization platform in seconds. • Intelligent alert. A built-in alerting system sends an SMS text or email when it detects an anomaly. There are also predictive algorithms that help you forecast how often the alert is likely to trigger. You can set these to only notify you of the most important changes. • Intelligent recommendations. It’s simply impossible to manually create every alert you might need, so Adobe is building machine learning directly into analytics to analyze users’ behaviors. Like a virtual data assistant, it co
Tags : 
    
Adobe

Integrating Text Messaging into the Healthcare Staffing Environment

Published By: Advantix Communications     Published Date: Oct 26, 2007
Today, most healthcare professionals carry mobile phones. These phones are capable of sending and receiving text messages; immediately, non-intrusively and cost effectively. Text messaging has opened up a revolutionary way for healthcare organizations to interact with their health care staff.  This document will help the reader to understand the costs associated with current staffing organizations' communications and identify a cost effective alternative.
Tags : 
nurse communications, sms for healthcare, sms for health care, text messaging communications, cell phone messaging, cellphone messaging, mobile phone messaging, health care text message, healthcare text message, health care professionals, healthcare professionals, health care communications, healthcare communications, health care messaging, healthcare messaging, healthcare technology, health care technology, wireless healthcare, wireless health care, nurse communication
    
Advantix Communications

Detecting Sophisticated Bots with Bot Manager Premier

Published By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : 
bot manager, bot interaction bot detection
    
Akamai Technologies

Protecting Your Network from Malware

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies

Protecting Your Network from Malware

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies

Putting the Contact Center at the Core of the Customer Experience

Published By: Aspect Software     Published Date: Feb 07, 2014
Learn the importance of having all your contact options on one platform and see how having the contact center at the core of the customer experience will allow for customers to interact with your organization with minimal effort.
Tags : 
aspect software, contact center, customer experience, customer service, sms, it management
    
Aspect Software

Class of Service: Myths and Misconceptions

Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management, network management
    
AT&T

How Adding SMS To Cross-Channel Communication Can Optimize Retailer-Customer Relationships

Published By: Bronto     Published Date: Sep 26, 2011
Download the white paper, "Activate And Engage: How Adding SMS To Cross-Channel Communication Can Optimize Retailer-Customer Relationships" to learn more about how text message campaigns can successfully activate consumers relationships and engage shoppers to drive purchases.
Tags : 
whitepaper, mobile, bronto, white paper, text, sms, cross channel, in-store opt-in, bronto software, bronto marketing platform
    
Bronto

3 Ways to Amplify Email Marketing with SMS Messaging

Published By: Bronto     Published Date: Sep 09, 2013
Short Message Service (SMS) marketing, or text messaging, has become one of the most widely used and effective media for both inbound and outbound marketing communications. This represents a tremendous opportunity for e-commerce marketers to use SMS marketing as an extension of their email marketing program to increase customer engagement and drive more revenue.
Tags : 
sms messaging, email marketing, strategic email marketing, e-commerce solutions, customer engagement
    
Bronto

Engage And Sell The Tools Every Commerce Marketer Needs To Succeed

Published By: Bronto     Published Date: May 18, 2017
Managing a sophisticated commerce marketing program requires more than a simple email marketing platform. Say goodbye to batch and blast messages and hello to relevance. Today's commerce marketers use an average of 7.2 marketing tactics to grow their business and keep shoppers coming back for more. Are you ready to add a few to your tool box? To build or revamp your e-commerce program, you'll need tools to build subscriber lists in healthy ways, manage coupons, maximize transnational messages, and ping shoppers to remind them about whats waiting in their shopping cart. To stay ahead of the competition, you must also capture browse behavior and create triggered messages to nudge shoppers along in their buying journey, predict what a customer wants and recommend the right product. And, depending on your target audience, you may need to explore SMS.
Tags : 
    
Bronto

5 OAuth Essentials for API Access Control

Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Tags : 
    
CA Technologies

Why—and How—Organizations Need to Align Business Priorities and Data Protection Strategies

Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
    
Carbonite

TEI of Cisco TrustSEC

Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network, networking, wireless
    
Cisco

Differentiate your Business with a Cloud Contact Center

Published By: Cisco     Published Date: Feb 23, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video
Tags : 
cloud computing, cisco, contact center, best practices, cloud network, storage management, data integration, data quality, data center
    
Cisco

Ovum White Paper

Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco

Ovum: Differentiate Your Business with a Cloud Contact Center

Published By: Cisco     Published Date: Jul 11, 2016
Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor.
Tags : 
    
Cisco

Differentiate Your Business With a Cloud Contact Center

Published By: Cisco     Published Date: Dec 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact cen
Tags : 
    
Cisco

The Total Economic Impact™ Of Cisco TrustSec Simplified Security Engineering And Reduced Operations

Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco

Encrypted Traffic Analytics

Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA

The First Step in a Successful Mobile Banking Strategy

Published By: Clickatell     Published Date: May 20, 2008
This white paper addresses the application of SMS messaging to the banking industry, and suggests how financial institutions can leverage multimodal messaging architecture to gain a competitive advantage.
Tags : 
clickatell, mobile banking, mobile marketing
    
Clickatell

Mobile Marketing – Unlocking a Powerful Tool

Published By: Clickatell     Published Date: May 20, 2008
Communication is a profoundly human activity and the primary driving force behind all technological development. The secret of the mobile phone’s success lies not just in its simplicity, but also in its adaptability.  Download this white paper to learn more.
Tags : 
clickatell, mobile marketing, sms marketing
    
Clickatell
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.