user acquisition

Results 1 - 22 of 22Sort Results By: Published Date | Title | Company Name
Published By: Coupa     Published Date: Dec 14, 2018
Organizations need a new way to manage this complexity and uncertainty in an environment where expectations for results are rising, not falling. Download this asset to learn how Business Spend Management (BSM) empowers both centralized and decentralized corporate functions with: - Fully scalable processes that increase user adoption and ease of use - Capital efficiency to maximize savings and process efficiency - Business agility to adapt to changing conditions such as acquisitions, growth, etc. - And much more! Download this complimentary report to learn all the ways BSM powers your business success!
Tags : 
    
Coupa
Published By: Dell EMC     Published Date: May 09, 2019
Now more than ever, IT technologists need to take control of PC infrastructure costs while deploying secure and manageable client solutions for their end users. With all the options available, how can IT pros position the right PC lifecycle solutions with management to make IT deployment, maintenance and continuous modernization simple? Download this interactive eGuide, brought to you by Dell and Intel® to learn more about ways to support today’s modern PCs with unparalleled efficiency, treating PC acquisition, usage and retirement as an integral part of IT and business operations.
Tags : 
    
Dell EMC
Published By: Kaminario     Published Date: May 05, 2016
The most successful Software-as-a-Service (SaaS) businesses adopt infrastructure strategies that deliver the economics, agility, and user experience that support customer acquisition and retention.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, infrastructure
    
Kaminario
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
    
VMware AirWatch
Published By: Oracle HCM Cloud     Published Date: Aug 02, 2016
Maintaining a smooth, user-friendly, and even fun talent acquisition process is imperative to aligning a retailers employer brand with a positive corporate public identity. Find out how savvy retailers are balancing cutting-edge technologies with the basics to juggle three key talent initiatives: quickly hiring seasonal talent, engaging and retaining younger and older associates alike, and expanding their presence into new locations.
Tags : 
aberdeen talent inquisition, corporate public identity, key talent initiatives, hiring talent, retailers introduction
    
Oracle HCM Cloud
Published By: App Annie     Published Date: Aug 26, 2016
The app market is crowded. Learn everything you need to know about ASO to break through the clutter in current — and future — markets.
Tags : 
app annie, aso, aso strategy, optimization, user acquisition
    
App Annie
Published By: App Annie     Published Date: Aug 26, 2016
Using App Annie Intelligence, we dove into the Google Play Store’s major categories to find the top apps and publishers. We also looked at macro trends like emerging market expansion, user retention rates (split by games and non-games), and tactics to optimize your user acquisition on the Android platform. Download the full report to get access to all these findings — and much more.
Tags : 
app annie, google play, user acquisition, optimization, macro trends
    
App Annie
Published By: App Annie     Published Date: Aug 26, 2016
QSR mobile apps are on the rise. See what key players are implementing to keep users engaged throughout the customer journey.
Tags : 
app annie, aso, aso strategy, optimization, user acquisition
    
App Annie
Published By: VMware     Published Date: Sep 06, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
vmware, vmware horizon, mobile, cloud
    
VMware
Published By: IBM     Published Date: Oct 09, 2009
"Recently, Open Source Software has been gaining in popularity due to the ability it provides users to view and modify source code. Another attraction is the perceived cost savings. Read the white paper that takes a look at the truth about those savings. Initially, deployment environments like JBoss have an advantage-zero initial software acquisition costs. However, the white paper will show how, over time, IBM WebSphere Application Server (WAS) and IBM WebSphere Application Server Network Deployment (WAS ND) win the TCO battle. Learn more."
Tags : 
open source, ibm, tco, total cost ownership, roi, return on investment, application development, jboss, was nd, websphere
    
IBM
Published By: Janrain, Inc.     Published Date: Jan 02, 2014
The rise of the social consumer creates tremendous opportunities for organizations to develop deeper relationships with their customers in support of their business objectives. Whether your goals are to acquire new users, increase on-site engagement, or collect and leverage customer insights (or all of the above), a comprehensive user management platform solution will play a critical role.
Tags : 
user management, on-site engagement, customer insights, user acquisition, user engagement, customer experience/engagement
    
Janrain, Inc.
Published By: Janrain, Inc.     Published Date: Apr 25, 2012
A comprehensive user management platform provides the essential tools for improving acquisition, creating engagement and building intelligence. Use this guide when evaluating prospective vendors to select the right user management platform partner.
Tags : 
janrain, marketing, social media, emerging marketing, internet marketing, website, social networks, interactive, web analytics, interactive marketing, website/graphic design, crm & customer care, social media marketing
    
Janrain, Inc.
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: IBM     Published Date: Mar 28, 2016
To succeed today, organizations need to take advantage of information technology in every area of their business. Talent acquisition is no exception. Robust, reliable technology can help recruiters more effectively engage with candidates. According to Aberdeen Group, the user experience is key. It is more important than ever to have friendly and interactive platforms. In terms of talent acquisition, companies that prioritize the candidate experience are more than twice as likely to improve their cost per hire on a year–by-year basis.1 In addition, social capabilities can enable recruiting professionals to use the Internet for job applications, social referrals and video interviewing. Mobile integration also enables users to connect with information where and when they need it. With better tools and insight into people and data, organizations can much more quickly identify talent, match capabilities to market needs, retain the best talent and improve recruiting outcomes. Simply put, rec
Tags : 
ibm, talent acquisition, human resources, recruiting
    
IBM
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege
    
Centrify Corporation
Published By: Adobe     Published Date: Jan 12, 2015
Mobile is more than likely a part of your marketing mix, but chances are, you haven’t defined the metrics you need to measure its success. The Forrester paper, Make the most of analytics to meet your mobile objectives, shares insights from mobile executives and lays out the steps marketers need to take to improve mobile effectiveness.
Tags : 
adobe, mobile, marketing, mix, analytics, measure, success, executives, effectiveness, performance, tools, integration, traffic, tracking, channels, kpi, devices, users, metrics, acquisition
    
Adobe
Published By: appia     Published Date: Jan 21, 2014
Behind every successful app is a great user acquisition strategy. In our whitepaper, Four Tips for Driving Mobile Advertising Success, learn four essential tactics creating successful mobile advertising program.
Tags : 
appia, mobile marketing, mobile targeting, localization, tracking, app marketing, iphone, blackberry, android, iphone marketing, mobile advertising, mobile target, social media, interactive marketing, web analytics, market research, e-commerce solutions, social media marketing, direct mail/marketing
    
appia
Published By: DocuSign     Published Date: Jul 12, 2019
As you know, HR plays a critical role in recruiting, hiring, training, and retaining the lifeblood of your business: people. But despite HR’s strategic role, it has traditionally lagged behind other departments in terms of adopting user-friendly, employee-focused technology investments. Legacy tools and reams of paper are still often used to prepare, sign, act upon, and manage the overwhelming document load, from recruitment and onboarding to performance management and off-boarding.1 The combination of outdated processes and additional paperwork limits HR staff’s ability to do their most important job: hire and support employees. That’s changing as HR turns to the cloud to digitize the agreement process. According to a 2018 PwC survey of HR executives, 75 percent of respondents said that they’ve moved at least one HR process to the cloud, while 40 percent have core systems (talent and acquisition management and HR information systems, for example) in the cloud.2 And those efforts are
Tags : 
    
DocuSign
Published By: Localytics     Published Date: Jul 18, 2014
Whether your business model is driven by in-app advertising, purchases, or paid subscriptions, driving your revenue is fundamentally dependent on personalization and engagement. The metrics are available, but identifying which are the most important for tracking engagement and are the most actionable can be tricky.
Tags : 
app metrics, app measurement, app users, app screenflow, track users, user segmentation, segment user, user retention, retain user, user acquisition, acquire user, lifetime value, user value, engage user, user engagement, session length, session interval, time in app, measure app user, app user metrics
    
Localytics
Published By: Localytics     Published Date: Jul 18, 2014
In this 23-page eBook, written for people new to app analytics, you'll learn what you need to know to start improving your app.
Tags : 
app analytics, mobile analytics, app analytics tools, app analytics guide, app monetization, user value, user acquisition, user conversion, track users, app funnel, app tracking, app testing, app measurement, app performance, app optimization, android app analytics, ios app analytics, iphone app analytics, app stats, app data
    
Localytics
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Search      

Add Research

Get your company's research in the hands of targeted business professionals.