language

Results 126 - 150 of 226Sort Results By: Published Date | Title | Company Name
Published By: Rosetta Stone     Published Date: Aug 04, 2016
White paper highlighting the role language (and HR/Learning and Development) plays in impacting customer service initiatives.
Tags : 
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Aug 04, 2016
Forbes Insights surveyed senior executives at leading US companies to learn how language abilities impact individual and organizational success. The results indicate that corporate leaders see multilingual employees and language-training programs as critical ingredients to success in the global economy.
Tags : 
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Aug 04, 2016
In today’s global economy, the “fittest” companies will be those that equip their employees with the language skills needed to compete in a diverse and multicultural marketplace.
Tags : 
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Aug 04, 2016
Proving the value of language training to business can be challenging so we decided to take the guesswork out of it. We surveyed 56,000 of our business product users to gain key insights into how language training has changed their businesses. This infographic shares the key results to help human resource, learning and development, and business line leaders better understand how language impacts business.
Tags : 
    
Rosetta Stone
Published By: Riverbed DE     Published Date: Oct 16, 2017
What is the key benefit of SD-WAN? To provide seamless access to digital services for end-users. But IT is more distributed, fragmentary, and dynamic than ever, with hybrid apps, hybrid networks, and remote and mobile users everywhere. Hardware-bound legacy networks can never fulfill the promise of seamless access. Taming the chaos of today’s IT requires a new approach to networking. This is the promise of software-defined wide area networks (SD-WAN)—the ability to use plain-language business policies to automate and orchestrate all the components of digital access. Read this white paper to learn how SD-WAN lets you: • Manage centrally from a cloud console with a comprehensive view of your connectivity fabric that spans and unifies datacenter/cloud apps, branch/mobile users, and enterprise/cloud networks. • Orchestrate globally using business policy-based automation to define quality of service and access privileges for all apps/users. • Deploy locally with zero touch via automated
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Riverbed DE
Published By: Microsoft     Published Date: Jul 20, 2018
Although AI research has been ongoing for decades, the past few years have seen a leap in practical innovations, catalyzed by vast amounts of digital data, online services, and enormous computing power. As a result, technologies such as natural-language understanding, sentiment analysis, speech recognition, image understanding, and machine learning have become accurate enough to power applications across a broad range of industries.
Tags : 
    
Microsoft
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Join Forrester Vice President & Principal Analyst Jeffrey Hammond for an examination of the choices developers are making, trends in programming language adoption, adoption of frameworks, and how development projects are moving to the cloud.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle     Published Date: Jul 09, 2014
Reading and Responding to your prospects' digital buying behaviour
Tags : 
digital body language, reading your prospect, digital behaviour, online activity, content consumption, marketing research
    
Oracle
Published By: EMA Analyst Research     Published Date: Jun 07, 2016
By viewing this on-demand webinar, you will also discover: • How organizations view their big data initiatives and how they compare with their actual implementation maturity. • Are data lakes becoming a brackish data swamp or a reliable location for data management practices? • How organizations are continuing the trend of implementing the EMA Hybrid Data Ecosystem in association with their big data initiatives.
Tags : 
    
EMA Analyst Research
Published By: IBM     Published Date: Jul 10, 2009
A complex IT infrastructure is a stumbling block for many businesses seeking greater agility in these uncertain times. This white paper shows how a service oriented architecture (SOA) helps align the infrastructure with business needs in order to achieve maximum flexibility.
Tags : 
soa, service oriented architecture, ibm smart soa, it infrastructure, integration, websphere, change management, costs, connectivity, messaging-oriented middleware, mom, middleware, api, application programming interface, enterprise service bus, esb, web services description language, wsdl, java
    
IBM
Published By: IBM     Published Date: Nov 17, 2009
The information agenda is intended to map out corporate business and technology goals and to create a roadmap to ensure that companies can leverage their corporate information as a strategic asset in the pursuit of these goals.
Tags : 
ium evaluation, ibm, information on demand, uim, iod, information management, scential, filenet, cognos, soa, cross-ibm initiative, websphere, lotus, tivoli, ibm global services, ovum 2008, information agenda, vanguard, master data management, enterprise content integration
    
IBM
Published By: Tealeaf     Published Date: May 12, 2008
While many companies believe they are delivering adequate online experiences, their customers are in pain. Why do most organizations miss the mark? Improving online customer experience requires organizations to have one view of the online customer and to utilize a common language when discussing customer experience.  Tealeaf gives you insights via their new guide, "Building an Online Customer Experience Competency: Five Steps".
Tags : 
tealeaf, customer experience, website development, web development
    
Tealeaf
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
Get under the hood: This technical note describes how to transform XML response into a JavaT-usable response by creating Plain Old Java Objects (POJOs) and calling JAXB's unmarshal method. Simplify how to send requests to create new instances based on images that request parameters from Java classes.
Tags : 
ibm corp., java, programming languages, software development, software/web development
    
IBM Cloud Business
Published By: IBM     Published Date: Aug 08, 2012
Read this white paper to learn how marketers are using IBM technology to learn about their customers' attitudes, preferences and buying habits from what they say on publicly available social media and through the full range of interactions that can be recorded, measured and analyzed. Discover how marketers are combining that knowledge with other sources of customer information to guide marketing decisions and shape marketing campaigns, cultivating relationships with online advocates to help steer product development, and, ultimately, boosting sales and revenue.
Tags : 
paid media, owned media, earned media, social media, ibm, social analytics, pay per click, ppc, advertising, sponsored content, cognos, text analytics, unica, spss, natural language processing, nlp, internet marketing
    
IBM
Published By: IBM     Published Date: Feb 21, 2013
Read this book to discover the benefits and value of a single, integrated, financial reporting and disclosure management platform that automate the production of these critical reports.
Tags : 
automation, last mile, finance, sec, xbrl, extensible business reporting language, reporting, cfo
    
IBM
Published By: Intercom     Published Date: Oct 08, 2015
An effective messaging strategy means targeting the right users with the right message at the right time and place. Failing to do so leads to customers mentally, or literally, unsubscribing from you. From the makers of Intercom, a customer communications platform, this book teaches you how to increase customer engagement in three ways: 1. Define the audience for your message by segmenting users according to behavior and action. 2. Craft a message for maximum impact; what voice, tone, format, and language to use. 3. Discern the right way and the right time for a message and know what you can do to ensure it is received in the most appropriate setting and in the most appropriate context.
Tags : 
customer onboarding software, user engagement, in-product communication, in-product messaging, onboarding software, customer engagement software
    
Intercom
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: NodeSource     Published Date: Nov 20, 2017
Node.js is now the most dominant and in-demand language for application development, particularly on the enterprise scale. This report will trace the evolution and adoption of Node.js in the enterprise, as well as the directions in which the ecosystem will grow.
Tags : 
nodesource, application development, javascript, web applications, open source, soa
    
NodeSource
Published By: AI Business     Published Date: Mar 11, 2019
LOOK TO RELEVANT USE CASES FOR YOUR BUSINESS. While use cases vary across industries, the most common ones fall into these categories and are usually associated with the listed neural network: • Image classification or object detection: convolutional neural network (CNN) • Time-series predictions: long short-term memory (LSTM) • Natural language processing: recurrent neural network (RNN) • Unlabeled data classification and data labeling: autoencoder (AE) • Anomaly detection: autoencoder (AE) • Recommender systems: multilayer perceptron (MLP) Work with your deep learning talent or consultants to identify which use cases best match your organization and desired solutions. Then recreate a successful, already proven method.
Tags : 
    
AI Business
Published By: Eloqua     Published Date: Sep 28, 2011
B2B purchasing in a Web 2.0 world has transformed into an interactive process driven by the customer, not the vendor. Learn how using clickstream data to target buyers' motivations allows marketers to trigger automated processes to drive better leads for sales.
Tags : 
digital body language, sales lead management, lead management system, lead nurturing, b2b social media, b2b software marketing, marketing white paper, lead generation, business to business advertising, social media optimization, b2b lead generation, lead scoring
    
Eloqua
Published By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : 
.net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model, com, windows operating system, com-based code, cpu utilization, optimize database connectivity
    
DataDirect Technologies
Published By: Microsoft Visual Studio Team System     Published Date: Apr 29, 2009
Today’s economic climate presents challenges in achieving business differentiation.  Investing in innovation during an economic downturn may seem counterintuitive at first, but it can help companies pull ahead of the competition by displaying a show of strength in a climate of weakness.  The Microsoft® Application Platform can help organizations do more with less, enabling them to more quickly, efficiently, and cost-effectively deliver custom solutions that provide strong business value.
Tags : 
microsoft, vsts, microsoft vsts, affordable innovation, application platform, custom solutions, application life-cycle management, rich development platform, designer-developer collaboration, application life-cycle management, alm, microsoft visual studio team system, version control, work assignment, tracking, builds, testing, shaw group, microsoft .net framework, ch2m hill
    
Microsoft Visual Studio Team System
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: