Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

online users

Results 1 - 25 of 51Sort Results By: Published Date | Title | Company Name
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: Akamai Technologies     Published Date: May 08, 2017
The gaming industry continues to grow rapidly, and it is projected to grow another 30% in the next three years1 . Online gaming is driving this growth as the industry is making a seismic shift from disk to digital. This shift comes with an abundance of opportunities and challenges, as digital gaming makes it easier than ever to get games into the hands of more players, in more places, in less time. TechValidate Research surveyed 131 Akamai Technologies, Inc. customer accounts to find out more about how gaming companies are innovating the marketplace and the challenges they need to overcome in order to do so. The results show the importance of web security, that acquiring and retaining new users is the biggest business challenge companies are facing, and that mobile is taking over as the most popular gaming platform.
Tags : 
techvalidate, gaming industry, online gaming, akamai gaming, gaming growth
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 12, 2017
Online images used to be simple. In the past, they weren’t the focal point of a page — there were only a handful of images on a given page and all users were viewing online images on a desktop with dial-up. That has all changed. Today’s web pages are dynamic, filled with images and viewed by end users on different devices with varying connectivity. As audience expectations for rich web experiences have grown, so has the requirement to deliver increasingly image-heavy web applications. The problem? The cost and complexity of creating, storing, and delivering web images tailored for every device poses a significant challenge for businesses, but failing to address the increasing diversity across devices and networks will lead to a poor and inconsistent user experience. Current solutions don’t solve this problem completely.
Tags : 
cloud image management, online images, web applications, devices, web experience
    
Akamai Technologies
Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
    
Akamai Technologies Australia
Published By: Limelight Network     Published Date: Aug 12, 2019
Live streaming is attracting viewers online to watch major sports events, play games, participate remotely in educational opportunities, and bid at live auctions. But today, the latency of online video stream delivery is typically too long to provide the viewing experience users expect, resulting in unhappy viewers and lost revenue. Fortunately, new live streaming technology makes it possible to deliver live streams in less than a second, enabling exciting new experiences that engage viewers in multiple ways. For organizations that need to distribute live streams, it’s about increasing audience size and revenue. For viewers, watching streams in realtime with interactive data integrated with the live video enables new possibilities for how they can interact with you and each other. Read this brief to learn how sub-second latency streaming enables new business opportunities by making live viewing a more interactive social experience.
Tags : 
    
Limelight Network
Published By: Limelight Network     Published Date: Aug 12, 2019
Why do so many companies turn to a Content Delivery Network (CDN) to deliver their online videos, websites, and downloads? It’s simple: The core benefits of a CDN directly improve customer experiences. End-users get the content they want quickly and reliably with better quality, wherever they are located. More satisfied customers help the organization increase revenue and customer loyalty.
Tags : 
    
Limelight Network
Published By: Dell EMC     Published Date: Aug 17, 2017
Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. We found that the Dell EMC™ VxRail™ P470F hyperconverged system with VMware® vSAN™ could allow you to do more database work than the HPE Hyper Converged 380 (HC 380) with StoreVirtual VSA. The four-node Dell EMC solution processed more orders with faster response times, so more users can fulfill requests quicker—whether they’re placing orders in a store, accessing databases of client info, or adding to company records.
Tags : 
database, database solution, hyperconverged system, database performance, database optimization
    
Dell EMC
Published By: Akamai Technologies     Published Date: May 08, 2017
We are coming to expect quality video in all our digital experiences – from online shopping to on the job training. However, as video technology has become more ubiquitous, it has also become more complex. To deliver a quality experience to users, regardless of their device and connectivity, you need a holistic video strategy. We’ve tapped into our experience to present the top issues you must address to ensure a successful online video strategy. Download now to learn more!
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
Akamai Technologies
Published By: Adobe     Published Date: Aug 22, 2013
Online video plays a critical role in today's digital marketing strategies for engaging with consumers. With a majority of U.S. web users regularly watching video, the potential for online video is clear: It can effectively drive clicks and conversions, turning casual consumers into loyal customers. Conversion is one of the most powerful and easily measurable benefits of video. A well-placed video supporting complex products and services can create up to a 90% conversion uplift.
Tags : 
online video, online video marketing, digital marketing strategies, video marketing
    
Adobe
Published By: join.me     Published Date: Jan 06, 2015
This White Paper provides information on how to avoid technology frustrations that sap productivity.
Tags : 
online meetings, business online meetings, how to improve online meetings, online conferences, network performance, quality of service, remote access, remote network management
    
join.me
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
By necessity, every company is now a software company. By 2017, two-thirds of customer service transactions will no longer require the support of a human intermediary. That means that if you haven’t already done so, you must adapt your business model to meet the needs of online customers. Failure to do so will put you at a severe competitive disadvantage. And chief among those demands is that you provide an exceptional user experience. App speed, reliability and ease of use are the new currency in this fast-changing landscape. In fact, app characteristics such as convenience and the ability to save users time can enhance brand loyalty by 60 percent or more.
Tags : 
    
CA Technologies
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia
Published By: Brightcove     Published Date: Sep 17, 2014
Salesforce ExactTarget Marketing Cloud, a digital marketing company, adopted Brightcove’s Video Cloud to manage the development and publication of video content to its Web site through a custom video portal to increase user engagement and increase the amount of time users spend learning about the brand. Nucleus found that using Brightcove enabled ExactTarget Marketing Cloud to better leverage its online video presence to increase its engagement with users and more effectively manage its digital brand.
Tags : 
digital marketing, video content, online video presence, custom video portal
    
Brightcove
Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, security, network security
    
MessageLabs
Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware
Published By: Shape Security     Published Date: Sep 12, 2019
Online credentials have been stolen and compromised for almost as long as the Internet has existed. But in the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. Theft of user credentials has ramped up significantly for a number of reasons including: Users are reusing the same usernames and passwords across multiple sites Automated tools can take stolen credentials and test them on other sites at a massive scale Many customers have high value assets that are extremely lucrative targets for cyberattacks In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Tags : 
    
Shape Security
Published By: IBM APAC     Published Date: Mar 19, 2018
Plenty of Fish, one of the largest online dating companies, accelerate the delivery of fresh information to its four million daily users so that they can connect and interact almost in real time. Read how they use IBM Flash Storage to load webpages in just four milliseconds, connecting its 100 million users faster providing a seamless experience for users looking for love.
Tags : 
    
IBM APAC
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Effective Competition Depends on Continuous Delivery of Quality Software In today’s application economy every company is a software company, no matter what industry it is in: • Shipping companies depend on logistics software to efficiently route packages, arrange drivers and automate warehouses. • Retail companies rely on software to manage inventory, engage with customers online and to give in-store associates the tools they need to answer customer questions on the spot. • Marketing firms lean on applications to gather consumer data and parse it, automate communication with prospects and effectively manage advertising campaigns. The examples are endless. The point is that in order to compete today, every business must be able to quickly build and tweak software to adjust to always evolving market demands. Ultimately, business success depends on faster development iterations while still maintaining the high quality of service expected by customers, stakeholders and end users.
Tags : 
    
CA Technologies EMEA
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security
    
Entrust Datacard
Published By: LogMeIn     Published Date: Jul 18, 2014
This InfoWorld report shows how to unshackle online meetings for business users.
Tags : 
join.me, avoiding technology frustrations, online meetings, conference calling
    
LogMeIn
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
In order to develop a framework for evaluating the success of non-traditional advertising. Crimson Hexagon analyzed the online conversions surrounding the 8-bit video game released by Old Spice in Dec. 2013, in which users play the game's eponymous hero. Download this case study to learn more about their findings.
Tags : 
old spice, online conversations, measuring consumer engagement
    
Crimson Hexagon
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Users Beware: 10 Security Tips to Share with Your Users - ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, network security, small business networks
    
ThreatTrack Security
Published By: Wyng     Published Date: Jan 13, 2016
McCormick Canada teamed up with Offerpop to launch their highly successful “McCormick Online Cook Off” contest, which invited users to share their best recipes with the brand for a chance to win some really great prizes. Instead of targeting a user base that is already highly saturated with direct competitors, McCormick Canada decided to target an entirely new, untapped market — second generation Filipino-Canadians with a highly customized campaign. By coupling an extremely easy and fun to enter contest with their in-depth customer analysis, McCormick Canada was able to create a wildly successful experience that greatly increased their unit sales year-over-year.
Tags : 
    
Wyng
Published By: Janrain, Inc.     Published Date: Oct 29, 2012
Learn how to collect, store, and leverage the social profile data of your most profitable website users, plus best practices and case studies for social login, sharing, gamification, and single sign-on. Get the paper now!
Tags : 
janrain, user management, vibrant audience, online users, user engagement
    
Janrain, Inc.
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.