bi platforms

Results 176 - 200 of 282Sort Results By: Published Date | Title | Company Name
Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper explores what functions to consider when selecting and working with hosting providers as it relates to the entire value chain of function and performance. Get your complimentary 6-page report now.
Tags : 
gigaom, pro, enterprise, cloud, equinox, availability, security, platforms
    
Equinix
Published By: Adobe     Published Date: Sep 10, 2014
Mobile apps drive up to 4-times longer engagement than mobile sites, but mobile application development platforms (MADP) have mainly been focused on developers, making personalization and adjustments difficult for marketers. Adobe has changed that. Gartner recently evaluated the top MADP vendors, across a variety of criteria, including Completeness of Vision and Ability to Execute, and named Adobe a Leader in their Magic Quadrant for Mobile Application Development Platforms report. We help marketers and developers work together more efficiently, giving marketers an easy way to make, manage, measure, and monetize their mobile apps, so developers have more time to create rich app features.
Tags : 
mobile apps, madp, platform development, business intelligence, usability, mobile marketing
    
Adobe
Published By: Adobe     Published Date: Feb 22, 2017
Today’s customers expect personal experiences no matter where they are, on every device. And it’s on your team to keep pace with every digital demand. That’s part of the unique challenge facing by creative studios. But with the right stock solution, you can save time for the big ideas, not the little to-dos. Read Put Time Back on Your Side: How Adobe Stock Can Jumpstart Your Creative Process to learn how to: • Integrate Adobe Stock for business with your existing Creative Cloud solutions • License stock images without toggling between platforms or reapplying edits • Work up to 10x faster with stock images
Tags : 
time management, pfeiffer, stock images, adobe, adobe stock, creative cloud
    
Adobe
Published By: Adobe     Published Date: Apr 13, 2017
Today’s customers expect personal experiences no matter where they are, on every device. And it’s on your team to keep pace with every digital demand. That’s part of the unique challenge facing by creative studios. But with the right stock solution, you can save time for the big ideas, not the little to-dos. Read Put Time Back on Your Side: How Adobe Stock Can Jumpstart Your Creative Process to learn how to: • Integrate Adobe Stock for business with your existing Creative Cloud solutions • License stock images without toggling between platforms or reapplying edits • Work up to 10x faster with stock images
Tags : 
creative assistance, graphic design, photo editing, creative cloud, design, creative design, photoshop, stock photography
    
Adobe
Published By: Quark Software     Published Date: Mar 19, 2015
The growth of the dynamic publishing market is shaping the way organizations develop streamlined enterprise content management strategies, keep up with shifting end-user content consumption trends and acquire the best solutions for scalability, output and ease-of-use. Dynamic publishing solutions is critical for content creators looking to address the largest audience possible. In their report, Analysis of the Global Dynamic Publishing Market, Frost & Sullivan examines the impact and vendor solutions. Download the report to: • Learn why dynamic publishing solutions are gaining significant traction across all industries and verticals • Discover which vendors are competing in the market — from those that offer point-solutions, such as XML authoring tools, to those offering complete end-to-end platforms • Access the latest research and predictions on the dynamic publishing market, which is expected to reach $2.5 billion by 2017
Tags : 
xml authoring, structured authoring, structured content, dynamic publishing, enterprise publishing, automated publishing, publishing automation, xml publishing
    
Quark Software
Published By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability
    
Equinix
Published By: CDW-Lenovo     Published Date: Oct 15, 2015
This Report examines and compares the reliability of 14 major server platforms, 18 server operating system distributions and 11 server hardware virtualization layers. It also explores the underlying issues that positively or negatively influence the inherent reliability of servers and operating systems. And it delves into the external elements that directly impact planned and unplanned system downtime.
Tags : 
    
CDW-Lenovo
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: Zebra Technologies     Published Date: Jan 30, 2019
Don’t let your legacy devices hold you back. Watch these three exclusive 2018 webinars to learn how Zebra can help you and your organization modernize your warehouse. Webinar #1: The Age of Android in the Enterprise Zebra’s Kevin Lollock, Regional Product Manager, Mobile Computing OS and Developer Platforms will unpack the vast migration to Android™ and the opportunities available for your warehouse and distribution centers. Webinar #2: Modernize the Warehouse with Android Warehouses without Windows®? Mark Wheeler, Zebra’s Director of Supply Chain Solutions discusses the migration to Android devices and shares a vision of the warehouse of the future. Webinar #3: How to Start your OS Migration Zebra’s Ritesh Gupta, Lead for Zebra Learning Services simplifies the steps of migrating to Android devices, including key considerations for planning, management, support and security. Get free access to these Webinars today!
Tags : 
    
Zebra Technologies
Published By: Red Hat     Published Date: Nov 08, 2017
Industry-leading organizations are now exploiting interoperable business process management (BPM) and mobile application platforms (MAPs) so that process-oriented mobile applications can help transform the way they do business. This paper examines the phenomena driving this trend, and the common approaches to digital transformation that contribute to the enterprise in motion. Read this analyst paper from 451 Research to learn more.
Tags : 
business process management, mobile application platforms, digital transformation, customer experience, adaptive business operations
    
Red Hat
Published By: Red Hat     Published Date: Nov 08, 2017
This BPM.com whitepaper examines the role of business process management (BPM) software in enabling physical things to be connected to digital processes in the context of the Internet of Things (IoT)—exploring both the required capabilities for the next generation of BPM platforms as well as the benefits offered by BPM and IoT.
Tags : 
digital transformation, digital interface, business process management, internet of things, big data
    
Red Hat
Published By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics
    
Adverity
Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion
    
Rapid7
Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
    
Qualys
Published By: MoreVisibility     Published Date: Dec 19, 2017
As the approach to strategic business decision making becomes more and more data driven, a method for consolidating our various data sets, which are often spread across multiple systems becomes exceedingly important. Two of the biggest players in data driven decision making are website analytics platforms and customer relationship management systems. The former includes accumulating data on top of the funnel behavior such as site traffic origins, lead generation, content consumption tracking, device usage, and overall site behavior. While the latter has a focus more on bottom of the funnel activity such as lead nurturing, customer status, lifetime value, etc. Lastly, without communication between these two essential platforms, a complete understanding of your customers, from lead to longtime client, may never be possible. A web analytics (Google Analytics) and CRM integration provides you with a 360 degree view of your customer base, so that you can understand not just what PPC efforts
Tags : 
    
MoreVisibility
Published By: iCIMS     Published Date: Sep 30, 2013
View this webcast from iCIMS to learn wyas to take your employee referral program to the next level with the use of social media and how to use best-of-breed tech to optimize your job postings over SEO and mobile platforms.
Tags : 
icims, social recruiting, new employees, hiring management, new talent, talent pool
    
iCIMS
Published By: Salesforce.com     Published Date: Apr 16, 2013
Successful mobile apps, especially enterprise mobile apps, typically need to interact with a well-architected set of back-end services, but most mobile app developers are more skilled at client-side front-end development. Enter mobile back-end-as-a-service (BaaS), a new set of hosted platforms that addresses the gap between front-end development proficiency and back-end infrastructure requirements. Enterprise-class back-end-as-a-service addresses scalability while providing an integration platform into existing enterprise services. Use this research as your guidebook to navigating the emerging BaaS landscape.
Tags : 
cloud mobile development, applications, baas, back end as a service, mobile application development, apps, mobile applications, enterprise
    
Salesforce.com
Published By: Mobify     Published Date: Apr 20, 2015
In this workbook, we’ve presented the most commonly referenced mobile solution criteria for retailers in 2015. For the purposes of this guide, we’ve defined mobile solution providers as companies that bring together a productized mobile technology platform with creative and strategy services that are focused on improving mobile metrics.
Tags : 
mobile solutions, mobify, mobile solution criteria, mobile technology platforms, mobile metrics, emerging marketing, internet marketing, business intelligence
    
Mobify
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: Dell Software     Published Date: Aug 31, 2016
In this white paper, learn the difference between application-based deduplication vs. appliance-based deduplication, and discover how each method fares when it comes to cost of deployment, flexibility in operating with other platforms and rehydration of data during restores.
Tags : 
    
Dell Software
Published By: Zebra Technologies (Bulldog)     Published Date: Sep 19, 2016
In this whitepaper we discuss the reasons for app migration, the process organizations need to go through, the choices they need to make and the ways to successfully navigate through the process.
Tags : 
mobile apps, zebra technology, next generation platforms, modern enterprise, mobile devices
    
Zebra Technologies (Bulldog)
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.