HIT Consultant Insightful coverage of healthcare innovation
 

ecosystem

Results 351 - 375 of 401Sort Results By: Published Date | Title | Company Name
Published By: Act-On     Published Date: Oct 09, 2015
Marketing technology is now an incredibly complex and diverse ecosystem of vendors and products. In fact, the 2015 edition of Brinker’s “Marketing Technology Landscape Supergraphic” includes 1,876 marketing technology vendors across 43 categories. Our guide will help you cut through the clutter and complexity of the marketing technology landscape so you can make better decisions about where and how to plan your technology investments.
Tags : 
marketing, marketing technology, marketing tech vendors, reachmail, marketing technology guide, marketing technology investments
    
Act-On
Published By: Quantcast     Published Date: Jan 25, 2016
With the onset of programmatic buying and real-time media, it is possible to run more targeted advertising than ever before. To effectively leverage these new technologies to drive the best performance and ROI, it's essential to understand how the real-time advertising ecosystem is evolving.
Tags : 
real-time advertising, programmatic buying, real-time media, targeted advertising, roi
    
Quantcast
Published By: Quantcast     Published Date: Feb 13, 2015
In 2012, 1.8 trillion display ads were paid for, but not seen. For advertisers looking for results, this is an unnecessary waste of effort and budget! Thankfully the industry is rallying towards a viewability standard, signaling a new wave of accountability for publishers, advertisers and ad vendors. As advertisers embrace viewability, they can benefit from knowing that their ads are seen, eliminating waste, and increasing campaign accountability and effectiveness. We conducted our own research and found that viewability is becoming a reality for improved campaign performance.
Tags : 
display advertising, display viewability, advertising ecosystem
    
Quantcast
Published By: Quantcast     Published Date: Feb 27, 2015
Did you know that “Programmatic” was voted the Association of National Advertisers’ marketing word of the year in 2014? Over the past few years, programmatic has transformed digital marketing by bringing efficiency and scale to the online advertising ecosystem. Read this white paper to learn how programmatic can help you make the most of your digital branding efforts. Download now!
Tags : 
online advertising ecosystem, programmatic branding, digital branding, marketing trends
    
Quantcast
Published By: Applico, Inc.     Published Date: Sep 20, 2013
The recent iOS7 release marks the single biggest change to the iOS ecosystem since the original iPhone was released. Download this whitepaper to find out the most important things you need to know about the upgrade and how your mobile apps will be impacted.
Tags : 
mobile strategy, mobile design, mobile product development, mobile engineering, ios7 upgrades, mobile marketing, mobile innovation, mobile-connected solutions, mobile consulting, ios7 strategy, ios7 consulting, ios7 strategy, ios7 consulting, ios7 marketing, ios7 design, ios7 engineering, ios7 development, ios mobile strategy, mobile app development, mobile app strategy
    
Applico, Inc.
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing
    
Symantec Corporation
Published By: Symantec     Published Date: Dec 04, 2014
This white paper explains why PKI is the key to the future of trust on the Internet; what steps must be taken to build a stronger, more trustworthy PKI ecosystem.
Tags : 
pki, pki ecosystem, browser developers, internet security, security, symantec
    
Symantec
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem
    
Symantec
Published By: Rocket Fuel     Published Date: Mar 04, 2015
Remember back in the day when digital advertising was simple to understand? Like popping open the hood of a 1972 Ford, all the parts were simple and visible, and how they fit together was intuitive. It made sense. Now? Piecing together the modern digital advertising ecosystem is like trying to assemble a spaceship in your living room. But as Rocket Fuel Director of Artificial Intelligence Michael Benisch explains in our latest whitepaper, using advanced systems to buy media programmatically doesn't have to be overwhelming. Michael will take you "under the hood" of programmatic buying and walk you through the process of how and why a consumer sees the ads they see. Download the whitepaper and pop open the hood before choosing a programmatic partner.
Tags : 
programmatic, programmatic partner, digital advertising, programmatic advertising, online advertising, ad platform, digital marketing, ad network, media buying, real-time bidding, digital media buys, big data, artificial intelligence, programmatic media buying, always-on marketing, dsp, big data marketing, optimize advertising performance, fixed-price bid models, marketing roi
    
Rocket Fuel
Published By: Windstream     Published Date: Nov 15, 2018
Vetted Third-Party Service Providers Facilitate The Creation Of Individualized Business Network Fabrics
Tags : 
    
Windstream
Published By: Infor     Published Date: May 25, 2007
Given the potential for SOA to solve pressing business problems, it’s inevitable that most companies will begin adopting SOA constructs within the next year or two. As they move to SOA, the approach they choose will have both immediate and long-term effects on their ability to support and adjust their ecosystem to meet future business requirements.
Tags : 
soa, service oriented architecture, service-oriented architecture, business management, business process management, bpm, customer service, infor
    
Infor
Published By: Ultimus     Published Date: Aug 16, 2007
With the largest global installed base of pure-play BPM solutions, the Ultimus BPM Suite exemplifies the role of managing OSAP processes in the business process ecosystem. Customers worldwide use it to extend, maximize and complement their investments in SAP or other enterprise applications.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, outside sap
    
Ultimus
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : 
mobile applications, ecosystem, risk, defense, application, risk
    
HP - Enterprise
Published By: SAP     Published Date: Mar 29, 2011
Explore the latest thinking on use of mobile technology to deliver business value by enabling sales and service processes - and transform processes across the enterprise. Business software vendors can best support their customers by collaborating with strategic partners to co-innovate and foster a mobile ecosystem.
Tags : 
sap crm, enterprise mobility suite, enterprise mobility
    
SAP
Published By: SAP     Published Date: Mar 29, 2011
Consider how SAP can help you improve customer relationship management. Build a synergistic ecosystem with employees, customers, and partners to deliver customer value - where customer demand drives the supply chain and customer insight inspires innovation. Quickly respond to sustain competitive advantage and profitability.
Tags : 
sap crm, ecosystem, crm deployment, crm culture
    
SAP
Published By: Webtrends     Published Date: Jun 13, 2011
Awareness, conversion, retention. As a marketer, your job hasn't changed, but the digital ecosystem changes fast. In this whitepaper from the CMO Council, top marketing execs discuss digital challenges and the resulting opportunities. Sponsored by Webtrends.
Tags : 
webtrends, cmo, international, digital marketing, process, partnerships, go-to-market, customer experience, multi-channel marketing, optimization, data-driven marketing, web analytics, business intelligence, customer intelligence, crm, facebook, social media, mobile apps, lead generation, advertising
    
Webtrends
Published By: SAS     Published Date: Apr 16, 2015
This research brief begins with an outline of the major costs to consider when making an investment in analytics, the second section presents five modernization stages that analytics hardware/software have experienced, and the final section finishes with considerations when calculating total cost of ownership of the analytics ecosystem.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 16, 2015
This white paper describes the architecture of SAS Marketing Operations Management and various aspects of its deployment and security. The following areas are covered: • High-level architecture overview • Architectural components • Ecosystem • Virtualization • Deployment options • Deployment best practices • Security This paper is intended for those involved in purchasing, selling and implementing SAS Marketing Operations Management, including system administrators and anyone seeking an understanding of the solution’s architecture and security.
Tags : 
    
SAS
Published By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : 
byod, okta, mobility, safety, dad, mobility management
    
Okta
Published By: Keynote Systems     Published Date: Mar 25, 2011
Learn about the challenges of monitoring web application performance in increasingly complex cloud application ecosystems
Tags : 
cloud, apm, service level agreement, sla, performance, monitoring
    
Keynote Systems
Published By: TriNet     Published Date: Jan 22, 2013
Talent acquisition and retention are critical to the growth of startups and midsize companies.
Tags : 
    
TriNet
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.