SlideShare una empresa de Scribd logo
1 de 7
Audience-Preference Analysis Concepts July 2009
Segment Analysis Use Case: Find targetable segments.  Users interested in: Security (category) (Follow hyperlinks above to generate email targeting lists.) Are Also Interested In Number of Users malware  (keyword) 23,345 cloud computing   (keyword) 12,982 Hardware   (category) 7,242 virtualization   (keyword) 4,238
Negative Interest Indicators Use Case: Understand what readers do  not  find interesting. Users interested in: Security (category) (Follow hyperlinks above to generate email targeting lists.) Show  negative  interest in: Number of Users xyzzy   (keyword) 11,324 plugh   (keyword) 5,492 Category Name   (category) 3,021 smurfing   (keyword) 2,083
Sponsor Opportunity Analysis Use Case: Propose opportunity to sponsor or generate mailing list. (breaks down positive user preferences that match previous Cisco-sponsored items) Analyze user interest drivers across previous items sponsored by: Cisco (Follow hyperlinks above to generate email targeting lists.) Cisco  interest driven by: Number of Users malware  (keyword) 23,345 cloud computing   (keyword) 12,982 Hardware   (category) 7,242 virtualization   (keyword) 4,238
Sponsor Format Guidance Use Case: Guide a sponsor on the asset type to use. (analyzes asset type preferences of readers who previously  clicked on  Cisco-sponsored items) Analyze asset type preferences  for readers of items sponsored by: Cisco Most Interested In Number of Users articles 2,345 live events 1,982 whitepapers 742 research 438
Asset Promotion Use Case: Find users with likely interest in a particular asset. ID of asset to promote 212900304 (Follow hyperlinks above to generate email targeting lists.) Cell  Phone -Controlled Security Surveillance System Unveiled Predicted Interest Level Number of Users Moderate 23,345 Strong 12,982 Very Strong 4,238
More Compelling Visuals?

Más contenido relacionado

La actualidad más candente

A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
1crore projects
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groups
Suchithra Balan
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Shruthi Suresh
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Avinash K S
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Kamal Spring
 

La actualidad más candente (20)

Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
 
CSE-05-27-34
CSE-05-27-34CSE-05-27-34
CSE-05-27-34
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groups
 
Mona final review
Mona final reviewMona final review
Mona final review
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
 
privacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked searchprivacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked search
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
 

Similar a Audience Preference Analysis Concepts

Building a Recommendation Engine Using Diverse Features by Divyanshu Vats
Building a Recommendation Engine Using Diverse Features by Divyanshu VatsBuilding a Recommendation Engine Using Diverse Features by Divyanshu Vats
Building a Recommendation Engine Using Diverse Features by Divyanshu Vats
Spark Summit
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
 

Similar a Audience Preference Analysis Concepts (20)

Data Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! ResearchData Cloud - Yury Lifshits - Yahoo! Research
Data Cloud - Yury Lifshits - Yahoo! Research
 
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.com
 
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdfMicrosoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
 
Apply your knowledge learned about the architecture that fac.pdf
Apply your knowledge learned about the architecture that fac.pdfApply your knowledge learned about the architecture that fac.pdf
Apply your knowledge learned about the architecture that fac.pdf
 
Sistemas de Recomendação sem Enrolação
Sistemas de Recomendação sem Enrolação Sistemas de Recomendação sem Enrolação
Sistemas de Recomendação sem Enrolação
 
Azure Manage Apps - The Full Story.pdf
Azure Manage Apps - The Full Story.pdfAzure Manage Apps - The Full Story.pdf
Azure Manage Apps - The Full Story.pdf
 
Microsoft Graph community call-October 2018
Microsoft Graph community call-October 2018Microsoft Graph community call-October 2018
Microsoft Graph community call-October 2018
 
User Interests Identification From Twitter using Hierarchical Knowledge Base
User Interests Identification From Twitter using Hierarchical Knowledge BaseUser Interests Identification From Twitter using Hierarchical Knowledge Base
User Interests Identification From Twitter using Hierarchical Knowledge Base
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Real-Time Recommendations with Hopsworks and OpenSearch - MLOps World 2022
Real-Time Recommendations  with Hopsworks and OpenSearch - MLOps World 2022Real-Time Recommendations  with Hopsworks and OpenSearch - MLOps World 2022
Real-Time Recommendations with Hopsworks and OpenSearch - MLOps World 2022
 
Movie Recommender System Using Artificial Intelligence
Movie Recommender System Using Artificial Intelligence Movie Recommender System Using Artificial Intelligence
Movie Recommender System Using Artificial Intelligence
 
Building a Recommendation Engine Using Diverse Features by Divyanshu Vats
Building a Recommendation Engine Using Diverse Features by Divyanshu VatsBuilding a Recommendation Engine Using Diverse Features by Divyanshu Vats
Building a Recommendation Engine Using Diverse Features by Divyanshu Vats
 
AppInspect: Large-scale Evaluation of Social Networking Apps
AppInspect: Large-scale Evaluation of Social Networking AppsAppInspect: Large-scale Evaluation of Social Networking Apps
AppInspect: Large-scale Evaluation of Social Networking Apps
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
Defrag: Pulling the Threads on User Data
Defrag: Pulling the Threads on User DataDefrag: Pulling the Threads on User Data
Defrag: Pulling the Threads on User Data
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
 

Más de Sean Ammirati

Lean entrepreneurship Agile Product Developmnet
Lean entrepreneurship   Agile Product DevelopmnetLean entrepreneurship   Agile Product Developmnet
Lean entrepreneurship Agile Product Developmnet
Sean Ammirati
 
Lean Entrepreneurship - Digital Business Models
Lean Entrepreneurship - Digital Business ModelsLean Entrepreneurship - Digital Business Models
Lean Entrepreneurship - Digital Business Models
Sean Ammirati
 

Más de Sean Ammirati (20)

Maximizing ROI for Corporate Innovation
Maximizing ROI for Corporate Innovation Maximizing ROI for Corporate Innovation
Maximizing ROI for Corporate Innovation
 
From Employee to Entrepreneur: Leading Your Team to Take Smart Innovation Risks
From Employee to Entrepreneur: Leading Your Team to Take Smart Innovation RisksFrom Employee to Entrepreneur: Leading Your Team to Take Smart Innovation Risks
From Employee to Entrepreneur: Leading Your Team to Take Smart Innovation Risks
 
Carnegie Bosch 25th Anniversary
Carnegie Bosch 25th AnniversaryCarnegie Bosch 25th Anniversary
Carnegie Bosch 25th Anniversary
 
Raising Venture Capital - presented at Miami Idea Center 2/19/15
Raising Venture Capital - presented at  Miami Idea Center 2/19/15Raising Venture Capital - presented at  Miami Idea Center 2/19/15
Raising Venture Capital - presented at Miami Idea Center 2/19/15
 
Building Innovative Products with Agile
Building Innovative Products with AgileBuilding Innovative Products with Agile
Building Innovative Products with Agile
 
9 Great Quotes about Data
9 Great Quotes about Data9 Great Quotes about Data
9 Great Quotes about Data
 
Minimally Awesome Products - Lean Entrepreneurship Carnegie Mellon
Minimally Awesome Products - Lean Entrepreneurship Carnegie Mellon Minimally Awesome Products - Lean Entrepreneurship Carnegie Mellon
Minimally Awesome Products - Lean Entrepreneurship Carnegie Mellon
 
Market Opportunity - Lean Entrepreneurship Carnegie Mellon
Market Opportunity - Lean Entrepreneurship Carnegie MellonMarket Opportunity - Lean Entrepreneurship Carnegie Mellon
Market Opportunity - Lean Entrepreneurship Carnegie Mellon
 
Elevator Pitch - Lean Entrepreneurship Carnegie Mellon
Elevator Pitch - Lean Entrepreneurship Carnegie MellonElevator Pitch - Lean Entrepreneurship Carnegie Mellon
Elevator Pitch - Lean Entrepreneurship Carnegie Mellon
 
First Principles - Lean Entrepreneurship Course at Carnegie Mellon
First Principles - Lean Entrepreneurship Course at Carnegie MellonFirst Principles - Lean Entrepreneurship Course at Carnegie Mellon
First Principles - Lean Entrepreneurship Course at Carnegie Mellon
 
My Entrepreneurial Journey
My Entrepreneurial  JourneyMy Entrepreneurial  Journey
My Entrepreneurial Journey
 
Five Misunderstandings about MVPs
Five Misunderstandings about MVPsFive Misunderstandings about MVPs
Five Misunderstandings about MVPs
 
The Science of Growth
The Science of Growth The Science of Growth
The Science of Growth
 
Planning for Success / AlphaLab
Planning for Success / AlphaLabPlanning for Success / AlphaLab
Planning for Success / AlphaLab
 
Commercializing Your Idea Getting Heard & Funded
Commercializing Your Idea Getting Heard & FundedCommercializing Your Idea Getting Heard & Funded
Commercializing Your Idea Getting Heard & Funded
 
Raising Capital for Your Startup - Lean Entrepreneurship Carnegie Mellon
Raising Capital for Your Startup - Lean Entrepreneurship Carnegie MellonRaising Capital for Your Startup - Lean Entrepreneurship Carnegie Mellon
Raising Capital for Your Startup - Lean Entrepreneurship Carnegie Mellon
 
Lean entrepreneurship Agile Product Developmnet
Lean entrepreneurship   Agile Product DevelopmnetLean entrepreneurship   Agile Product Developmnet
Lean entrepreneurship Agile Product Developmnet
 
Recruiting Team Members
Recruiting Team MembersRecruiting Team Members
Recruiting Team Members
 
Investment for the Underdog - SVc2Lx
Investment for the Underdog - SVc2LxInvestment for the Underdog - SVc2Lx
Investment for the Underdog - SVc2Lx
 
Lean Entrepreneurship - Digital Business Models
Lean Entrepreneurship - Digital Business ModelsLean Entrepreneurship - Digital Business Models
Lean Entrepreneurship - Digital Business Models
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Audience Preference Analysis Concepts

  • 2. Segment Analysis Use Case: Find targetable segments. Users interested in: Security (category) (Follow hyperlinks above to generate email targeting lists.) Are Also Interested In Number of Users malware (keyword) 23,345 cloud computing (keyword) 12,982 Hardware (category) 7,242 virtualization (keyword) 4,238
  • 3. Negative Interest Indicators Use Case: Understand what readers do not find interesting. Users interested in: Security (category) (Follow hyperlinks above to generate email targeting lists.) Show negative interest in: Number of Users xyzzy (keyword) 11,324 plugh (keyword) 5,492 Category Name (category) 3,021 smurfing (keyword) 2,083
  • 4. Sponsor Opportunity Analysis Use Case: Propose opportunity to sponsor or generate mailing list. (breaks down positive user preferences that match previous Cisco-sponsored items) Analyze user interest drivers across previous items sponsored by: Cisco (Follow hyperlinks above to generate email targeting lists.) Cisco interest driven by: Number of Users malware (keyword) 23,345 cloud computing (keyword) 12,982 Hardware (category) 7,242 virtualization (keyword) 4,238
  • 5. Sponsor Format Guidance Use Case: Guide a sponsor on the asset type to use. (analyzes asset type preferences of readers who previously clicked on Cisco-sponsored items) Analyze asset type preferences for readers of items sponsored by: Cisco Most Interested In Number of Users articles 2,345 live events 1,982 whitepapers 742 research 438
  • 6. Asset Promotion Use Case: Find users with likely interest in a particular asset. ID of asset to promote 212900304 (Follow hyperlinks above to generate email targeting lists.) Cell Phone -Controlled Security Surveillance System Unveiled Predicted Interest Level Number of Users Moderate 23,345 Strong 12,982 Very Strong 4,238