Skip to content
 

user acquisition

Results 1 - 17 of 17Sort Results By: Published Date | Title | Company Name
Published By: Kaminario     Published Date: May 05, 2016
The most successful Software-as-a-Service (SaaS) businesses adopt infrastructure strategies that deliver the economics, agility, and user experience that support customer acquisition and retention.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, infrastructure
    
Kaminario
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
    
VMware AirWatch
Published By: Oracle HCM Cloud     Published Date: Aug 02, 2016
Maintaining a smooth, user-friendly, and even fun talent acquisition process is imperative to aligning a retailers employer brand with a positive corporate public identity. Find out how savvy retailers are balancing cutting-edge technologies with the basics to juggle three key talent initiatives: quickly hiring seasonal talent, engaging and retaining younger and older associates alike, and expanding their presence into new locations.
Tags : 
aberdeen talent inquisition, corporate public identity, key talent initiatives, hiring talent, retailers introduction
    
Oracle HCM Cloud
Published By: App Annie     Published Date: Aug 26, 2016
The app market is crowded. Learn everything you need to know about ASO to break through the clutter in current — and future — markets.
Tags : 
app annie, aso, aso strategy, optimization, user acquisition
    
App Annie
Published By: App Annie     Published Date: Aug 26, 2016
Using App Annie Intelligence, we dove into the Google Play Store’s major categories to find the top apps and publishers. We also looked at macro trends like emerging market expansion, user retention rates (split by games and non-games), and tactics to optimize your user acquisition on the Android platform. Download the full report to get access to all these findings — and much more.
Tags : 
app annie, google play, user acquisition, optimization, macro trends
    
App Annie
Published By: App Annie     Published Date: Aug 26, 2016
QSR mobile apps are on the rise. See what key players are implementing to keep users engaged throughout the customer journey.
Tags : 
app annie, aso, aso strategy, optimization, user acquisition
    
App Annie
Published By: VMware     Published Date: Sep 06, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
vmware, vmware horizon, mobile, cloud
    
VMware
Published By: IBM     Published Date: Oct 09, 2009
"Recently, Open Source Software has been gaining in popularity due to the ability it provides users to view and modify source code. Another attraction is the perceived cost savings. Read the white paper that takes a look at the truth about those savings. Initially, deployment environments like JBoss have an advantage-zero initial software acquisition costs. However, the white paper will show how, over time, IBM WebSphere Application Server (WAS) and IBM WebSphere Application Server Network Deployment (WAS ND) win the TCO battle. Learn more."
Tags : 
open source, ibm, tco, total cost ownership, roi, return on investment, application development, jboss, was nd, websphere
    
IBM
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: IBM     Published Date: Mar 28, 2016
To succeed today, organizations need to take advantage of information technology in every area of their business. Talent acquisition is no exception. Robust, reliable technology can help recruiters more effectively engage with candidates. According to Aberdeen Group, the user experience is key. It is more important than ever to have friendly and interactive platforms. In terms of talent acquisition, companies that prioritize the candidate experience are more than twice as likely to improve their cost per hire on a year–by-year basis.1 In addition, social capabilities can enable recruiting professionals to use the Internet for job applications, social referrals and video interviewing. Mobile integration also enables users to connect with information where and when they need it. With better tools and insight into people and data, organizations can much more quickly identify talent, match capabilities to market needs, retain the best talent and improve recruiting outcomes. Simply put, rec
Tags : 
ibm, talent acquisition, human resources, recruiting
    
IBM
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege
    
Centrify Corporation
Published By: Adobe     Published Date: Jan 12, 2015
Mobile is more than likely a part of your marketing mix, but chances are, you haven’t defined the metrics you need to measure its success. The Forrester paper, Make the most of analytics to meet your mobile objectives, shares insights from mobile executives and lays out the steps marketers need to take to improve mobile effectiveness.
Tags : 
adobe, mobile, marketing, mix, analytics, measure, success, executives, effectiveness, performance, tools, integration, traffic, tracking, channels, kpi, devices, users, metrics, acquisition
    
Adobe
Published By: appia     Published Date: Jan 21, 2014
Behind every successful app is a great user acquisition strategy. In our whitepaper, Four Tips for Driving Mobile Advertising Success, learn four essential tactics creating successful mobile advertising program.
Tags : 
appia, mobile marketing, mobile targeting, localization, tracking, app marketing, iphone, blackberry, android, iphone marketing, mobile advertising, mobile target, social media, interactive marketing, web analytics, market research, e-commerce solutions, social media marketing, direct mail/marketing
    
appia
Published By: Localytics     Published Date: Jul 18, 2014
Whether your business model is driven by in-app advertising, purchases, or paid subscriptions, driving your revenue is fundamentally dependent on personalization and engagement. The metrics are available, but identifying which are the most important for tracking engagement and are the most actionable can be tricky.
Tags : 
app metrics, app measurement, app users, app screenflow, track users, user segmentation, segment user, user retention, retain user, user acquisition, acquire user, lifetime value, user value, engage user, user engagement, session length, session interval, time in app, measure app user, app user metrics
    
Localytics
Published By: Localytics     Published Date: Jul 18, 2014
In this 23-page eBook, written for people new to app analytics, you'll learn what you need to know to start improving your app.
Tags : 
app analytics, mobile analytics, app analytics tools, app analytics guide, app monetization, user value, user acquisition, user conversion, track users, app funnel, app tracking, app testing, app measurement, app performance, app optimization, android app analytics, ios app analytics, iphone app analytics, app stats, app data
    
Localytics
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.