RecruitingBlogscom

Follow Us:

 

end user

Results 176 - 200 of 938Sort Results By: Published Date | Title | Company Name
Published By: Movable Ink     Published Date: Oct 04, 2016
33% of brands kick off holiday campaigns in October, and most of them are planning now. Grab our latest report and learn how to leverage the biggest holiday trends, including triggered emails and user-generated content.
Tags : 
contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing, internet marketing
    
Movable Ink
Published By: Movable Ink     Published Date: Oct 04, 2016
33% of brands kick off holiday campaigns in October, and most of them are planning now. Grab our latest report and learn how to leverage the biggest holiday trends, including triggered emails and user-generated content.
Tags : 
contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing, internet marketing, e-commerce
    
Movable Ink
Published By: SolidFire_NetApp     Published Date: Nov 21, 2016
It’s no surprise that the Software-as-a-Service (SaaS) market is exploding; its benefits are evident and mounting. In fact, IDC predicts that the SaaS market will grow significantly by 2020. SaaS end users are reaping the benefits of greater software efficiency, agility, reduced operational headaches, and trading CapEx for OpEx. The SaaS model enables low cost to entry, scale, and no maintenance as opposed to traditional software which placed these burdens on the end user.
Tags : 
    
SolidFire_NetApp
Published By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : 
technology, best practices, data, enterprise, business analytics, business intelligence, business management
    
Microsoft
Published By: CA Technologies     Published Date: Nov 02, 2016
Since Aternity was founded in 2005, the business world has changed dramatically. Mobile devices, software as a service (SaaS) and the cloud have taken up permanent residence in today’s enterprise IT department. Aternity stays on the cutting edge by rapidly delivering innovative End User Experience Monitoring solutions that can monitor any application on any device—physical, virtual or mobile—for any user.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Suddenly, the network is cool again. Tech trends such as the Internet of Things, software-defined networking and growing end-user expectations all add up to a demand for “dialtone” network performance and reliability. But as the data deluge continues to accelerate, and as organizations continue to rely on multiple clouds to achieve business goals, how can the network keep up, much less meet tomorrow’s demands? This e-book looks at the trends that are impacting the enterprise network—the modern network—the issues it creates for NetOps professionals, and how organizations can act today to plan for tomorrow.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 12, 2018
Plötzlich ist das Netzwerk wieder angesagt. Technische Trends wie das Internet of Things, softwaredefiniertes Networking und wachsende End User-Erwartungen führen zu einer Nachfrage nach ungestörter Performance und Zuverlässigkeit des Netzwerks. Die Datenmengen werden zunehmend größer, und Unternehmen können ihre geschäftlichen Ziele nur noch mit mehreren Clouds erreichen. Wie kann das Netzwerk in dieser Situation Schritt halten und auch noch die künftigen Anforderungen erfüllen? In diesem eBook werden die Trends analysiert, die das Unternehmensnetzwerk beeinflussen – das moderne Netzwerk. Zudem werden die damit für NetOps-Experten verbundenen Probleme und Maßnahmen von Unternehmen zur Vorbereitung auf die Zukunft behandelt.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager protects an organization’s business and empowers its people. The solution protects critical accounts and endpoints while providing a seamless user experience. CA commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) and enterprises may realize by deploying its Privileged Access Manager solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the CA Privileged Access Manager solution on their organizations.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: Oracle Analytics     Published Date: Oct 10, 2017
How are organizations balancing self-service analytics and data governance today? What are the trends for tomorrow? Many organizations are on their way to achieving self-service analytics maturity through the use of intuitive data visualization technologies aimed at non-technical users; as well as various tactics that reduce reliance on IT. But handing the analytics reins entirely to business users can make governance nearly impossible. As a result, organizations are increasing investments in modern analytics platforms that enable a balance between IT governing and curating data, empowering business users to derive insights from data mostly on their own and without delay. Join guest speaker, Forrester Research VP and Principal Analyst, Boris Evelson and Oracle Analytics Senior Group Director, Jose Villacis as they discuss insights from an Oracle-commissioned study of North American enterprise analytics leaders.
Tags : 
    
Oracle Analytics
Published By: Oracle Analytics     Published Date: Oct 10, 2017
How are organizations balancing self-service analytics and data governance today? What are the trends for tomorrow? Many organizations are on their way to achieving self-service analytics maturity through the use of intuitive data visualization technologies aimed at non-technical users; as well as various tactics that reduce reliance on IT. But handing the analytics reins entirely to business users can make governance nearly impossible. As a result, organizations are increasing investments in modern analytics platforms that enable a balance between IT governing and curating data, empowering business users to derive insights from data mostly on their own and without delay.
Tags : 
    
Oracle Analytics
Published By: Riverbed     Published Date: May 24, 2012
The combination of Riverbed WAN optimization and web content optimization solutions ultimately have the same end goal of improving user performance, the techniques employed serve different use cases.
Tags : 
steelhead appliances, stingray aptimizer, microsoft sharepoint, wan, wbo, web content optimization, business technology, data center
    
Riverbed
Published By: Riverbed     Published Date: May 24, 2012
End users want to be productive just as much as the business wants them to be. Most people thrive in environments where they are set up to succeed, and IT has a strategic role in that process. Simply put, users expect applications to be faster.
Tags : 
enterprise it, platform, server virtualization, private cloud, public cloud, cloud services, data centers, steelhead, granite, stingray, cascade, business technology, data center
    
Riverbed
Published By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : 
dyn, dns, downtime risk, end-user experience, networking, enterprise applications, business technology
    
Dyn
Published By: IBM     Published Date: Jul 26, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business. To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize
Tags : 
scalability, data warehousing, resource planning
    
IBM
Published By: New Relic     Published Date: Apr 07, 2015
Are you an AWS user looking to accelerate time to market? Lower costs? Or avoid painful mistakes as you migrate your applications to the Cloud? Whether you’ve already moved to the Cloud or are getting ready to migrate, New Relic helps Amazon Web Services (AWS) users improve the performance and end-user experience of their applications.
Tags : 
    
New Relic
Published By: New Relic     Published Date: Apr 07, 2015
Whether you've already moved to the cloud or are ready to migrate, New Relic helps Amazon Web Services (AWS) users improve performance. Here are five best practices that can help you improve the end-user experience, simplify management, and reduce the cost of your AWS environment.
Tags : 
    
New Relic
Published By: New Relic     Published Date: Apr 07, 2015
With the Microsoft Azure Marketplace, it’s now easier than ever to deploy a complete cloud infrastructure, and with one click include New Relic APM to manage the applications. Forget looking at multiple management consoles to get a better view into your app performance. See the full picture and start improving the management and end-user experience of your Azure applications with New Relic.
Tags : 
    
New Relic
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: Schneider Electric     Published Date: Apr 23, 2019
Schneider Electric surveyed over 400 worldwide machine builders and factory end users in 2015. The questions they answered all centered around what their machines and plants would need to look like in 2020 if their businesses were to sustain growth and boost productivity. Their feedback has shaped (and will continue to shape) Schneider Electric digitized solution investments. Key requirements identified included: • Tools that could accommodate a younger, less skilled, and less experienced workforce • A need for simpler integration through open software connectivity and more open field buses • A need for whole lifecycle support of the products they purchase Read this eBook to see answers to some of these identified key points from those surveyed.
Tags : 
machine, digitization, industry 4.0, business models, smart machines
    
Schneider Electric
Published By: Liaison Technologies     Published Date: Nov 21, 2011
In this whitepaper, we describe how executive and IT management can get and maintain control of their company's data architecture to help meet business objectives. We describe the relationship between data integration projects and data architecture concepts and practices. We describe how the business planning and IT development processes that direct and leverage data integration projects depend on tooling. We describe breakthrough ways in which data architects, business analysts, programmers, and business users can collaborate to address their organization's pressing business challenges.
Tags : 
enterprise, soa, technology, liaison, business, data integration, data architecture, it management
    
Liaison Technologies
Published By: Success Factors     Published Date: Jul 27, 2012
When it comes to evaluating software investment decisions, such as on- premise vs. cloud-based solutions, many factors must be considered. In particular, pay attention to four key areas: support for business strategy, operations, security, and cost.
Tags : 
success factors, sap, cio goals, cloud solutions, cloud applications, cloud application vendors, cio cloud goals, employee central, strategic agility, user adoption, improved security, time to value, on-premise vs. cloud, evaluating software investments, business technology
    
Success Factors
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top