language

Results 151 - 175 of 242Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 21, 2013
Read this book to discover the benefits and value of a single, integrated, financial reporting and disclosure management platform that automate the production of these critical reports.
Tags : 
automation, last mile, finance, sec, xbrl, extensible business reporting language, reporting, cfo
    
IBM
Published By: Intercom     Published Date: Oct 08, 2015
An effective messaging strategy means targeting the right users with the right message at the right time and place. Failing to do so leads to customers mentally, or literally, unsubscribing from you. From the makers of Intercom, a customer communications platform, this book teaches you how to increase customer engagement in three ways: 1. Define the audience for your message by segmenting users according to behavior and action. 2. Craft a message for maximum impact; what voice, tone, format, and language to use. 3. Discern the right way and the right time for a message and know what you can do to ensure it is received in the most appropriate setting and in the most appropriate context.
Tags : 
customer onboarding software, user engagement, in-product communication, in-product messaging, onboarding software, customer engagement software
    
Intercom
Published By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: NodeSource     Published Date: Nov 20, 2017
Node.js is now the most dominant and in-demand language for application development, particularly on the enterprise scale. This report will trace the evolution and adoption of Node.js in the enterprise, as well as the directions in which the ecosystem will grow.
Tags : 
nodesource, application development, javascript, web applications, open source, soa
    
NodeSource
Published By: AI Business     Published Date: Mar 11, 2019
LOOK TO RELEVANT USE CASES FOR YOUR BUSINESS. While use cases vary across industries, the most common ones fall into these categories and are usually associated with the listed neural network: • Image classification or object detection: convolutional neural network (CNN) • Time-series predictions: long short-term memory (LSTM) • Natural language processing: recurrent neural network (RNN) • Unlabeled data classification and data labeling: autoencoder (AE) • Anomaly detection: autoencoder (AE) • Recommender systems: multilayer perceptron (MLP) Work with your deep learning talent or consultants to identify which use cases best match your organization and desired solutions. Then recreate a successful, already proven method.
Tags : 
    
AI Business
Published By: Eloqua     Published Date: Sep 28, 2011
B2B purchasing in a Web 2.0 world has transformed into an interactive process driven by the customer, not the vendor. Learn how using clickstream data to target buyers' motivations allows marketers to trigger automated processes to drive better leads for sales.
Tags : 
digital body language, sales lead management, lead management system, lead nurturing, b2b social media, b2b software marketing, marketing white paper, lead generation, business to business advertising, social media optimization, b2b lead generation, lead scoring
    
Eloqua
Published By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : 
.net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model, com, windows operating system, com-based code, cpu utilization, optimize database connectivity, software development
    
DataDirect Technologies
Published By: Microsoft Visual Studio Team System     Published Date: Apr 29, 2009
Today’s economic climate presents challenges in achieving business differentiation.  Investing in innovation during an economic downturn may seem counterintuitive at first, but it can help companies pull ahead of the competition by displaying a show of strength in a climate of weakness.  The Microsoft® Application Platform can help organizations do more with less, enabling them to more quickly, efficiently, and cost-effectively deliver custom solutions that provide strong business value.
Tags : 
microsoft, vsts, microsoft vsts, affordable innovation, application platform, custom solutions, application life-cycle management, rich development platform, designer-developer collaboration, application life-cycle management, alm, microsoft visual studio team system, version control, work assignment, tracking, builds, testing, shaw group, microsoft .net framework, ch2m hill
    
Microsoft Visual Studio Team System
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Citrix Online     Published Date: Jun 28, 2009
Terms like Facebook, Twitter, wikis and blogs are a recent addition to mainstream vocabulary. And now it seems like everyone is fluent in the language of social media - including your prospects and customers.
Tags : 
goto meeting, social media, citrix, customer support, training, marketing, ebook, facebook, twitter, blog, social networking, social media, collaboration, collaboration tools
    
Citrix Online
Published By: Citrix     Published Date: Nov 20, 2012
Research shows that the top fears for people who present online or speak on online meetings are: 'How can I deliver a powerful presentation to an audience I can't see?' and 'How do I compensate for the loss of body language and eye contact'. Read on!
Tags : 
virtual presenter, citrix, presentation, virtaulization, collaboration, meeting, enterprise applications, business technology
    
Citrix
Published By: AWS     Published Date: Jun 07, 2019
With more data to analyze than ever before, companies are finding new ways to quickly find meaning in their data with artificial intelligence (AI). Natural Language Generation (NLG) technologies deployed on Amazon Web Services (AWS) can enable organizations to free their employees from manual data analysis and interpretation tasks. NLG transforms data into easy-to-understand, data-driven narratives with context and relevance.
Tags : 
    
AWS
Published By: Rosetta Stone     Published Date: Dec 07, 2017
Watch this on-demand webinar to explore new tools and strategies for empowering students in today’s language-learning classrooms.
Tags : 
edtech, traditional instruction, language learning classrooms, rosetta stone, blended learning
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Dec 07, 2017
In this informational webinar, we focus on identifying funding streams for K-12 ELL and world language programs. Hear perspectives and insights on funding streams in K-12 education from funding expert David DeSchryver, Senior Vice President of Education Policy at Whiteboard Advisors.
Tags : 
ell, language programs, k-12, rosetta stone, federal funding strategies
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Dec 07, 2017
ELLs are a diverse group of about ?ve million students in the U.S. who speak a primary language other than English and are not yet pro?cient in English. To catch and keep up with their native English speaking peers, ELLs need more instructional time and specialized instruction, including specially designed materials and advanced educational tools to accelerate their learning. Well utilized state-of-the-art technology tools can transform not only learning but academic success itself for ELLs and their families. To read the complete white paper and learn more about Rosetta Stone, go to k12hub.rosettastone.com.
Tags : 
ell students, english proficiency, blended learning, rosetta stone
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Dec 07, 2017
The new federal law, Every Student Succeeds Act (ESSA), creates new opportunities to secure funding for language programming. Funding is available, but the strategies to secure the money must be carefully measured. Taking a strategic approach to this opportunity is critical. Download the whitepaper to read more about the funding sources that should play into your strategies.
Tags : 
language programs, k-12, rosetta stone, every student succeeds act (essa), federal funding strategies
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Feb 02, 2018
English Language Learners do not succeed at the same rate as their English-speaking peers. The impact is felt throughout the country: not only does it affect students, their families and their schools, it affects our communities. As the number of ELLs grows rapidly, the challenges increase. Today, a full 9 percent of this country’s population is not English proficient, and 11 percent of our K–12 students are considered English Language Learners. Learn what districts can do to close this achievement gap in this infographic that paints the big picture.
Tags : 
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Feb 02, 2018
In this eBook, we discuss strategic approaches to help you fund your world language and ELL programs.
Tags : 
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Feb 02, 2018
Read about how parents, teachers, administrators, and communities can work together to encourage and support their students’ language learning.
Tags : 
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Feb 02, 2018
Bernadette Musetti, Associate Professor of Liberal Studies at Loyola Marymount University has devoted most of her career to learning about and creating more equity and access in education for students whose primary language is other than English. In this white paper, she discusses how we can leverage technology to support ELL students and families for success.
Tags : 
    
Rosetta Stone
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
There is a lot of excitement in the market about artificial intelligence (AI), machine learning (ML), and natural language processing (NLP). Although many of these technologies have been available for decades, new advancements in compute power along with new algorithmic developments are making these technologies more attractive to early adopter companies. These organizations are embracing advanced analytics technologies for a number of reasons including improving operational efficiencies, better understanding behaviors, and gaining competitive advantage.
Tags : 
    
SAS
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee