"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

web events

Results 1 - 17 of 17Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : 
akamai, akamai gaming, infrastructure, distribution channel, technological advancements
    
Akamai Technologies
Published By: PGi     Published Date: Nov 07, 2018
Webinare unterscheiden sich von kollaborativen Web-Meetings basierend auf Umfang, Geschäftsverhalten, Geschäftsanforderungen und Erwartungen der Teilnehmer. Webinare sind strukturierte, vorab geplante, One-to-Many LiveEvents, die höchst skalierbar sind und gestreamte Präsentationen sowie DesktopSharing, Stimmenabgaben, Umfragen und Chat-Funktionen bieten. Infolgedessen erfordern sie unterschiedliche Planung, Förderung, Übertragung und Messung.
Tags : 
    
PGi
Published By: Zoom     Published Date: Mar 29, 2016
Web conferencing can be used in many meeting scenarios, from internal collaboration to presentations, training and large events. IT leaders must examine the use cases that will drive their requirements for a portfolio of online meeting technologies.
Tags : 
zoom, gartner report, web conferencing, office collaboration, video conferencing, learning management systems, collaboration tools, webinars, networking, it management, wireless
    
Zoom
Published By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
    
PGi
Published By: Amazon Web Services     Published Date: Aug 01, 2018
Learn more about the AWS Partner Webinar Series at - https://amzn.to/2ILG0R7. Join our webinar to hear how Lyft and other data-driven organizations benefit from uncovering hidden insights in real time with AI solutions from Amazon Web Services (AWS) and Anodot. Learn how to prevent events that can impact your revenue and brand integrity with a solution that detects anomalies quickly, allowing you to address issues in a timely manner to help ensure a consistently high-quality experience for your customers.
Tags : 
    
Amazon Web Services
Published By: BlueJeans Network     Published Date: Jun 10, 2016
This white paper, written by David Maldow, will explain why webcasts aren’t fully interactive, why you should care, and the potential benefits of full interactivity for large-scale business video events.
Tags : 
webinars, webcasts, virtual events, video conferencing, web conferencing, video events, townhalls, town halls, interactive presentations, internet presentations, blue jeans, primetime, sales training, employee training, employee communications, large webinars
    
BlueJeans Network
Published By: Amazon Web Services     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
Amazon Web Services
Published By: IBM     Published Date: Jul 10, 2009
Differentiate yourself from the competition with superior services and products. Business process management (BPM) powered by the IBM Smart SOA™ portfolio makes it possible by enabling you to monitor, manage and improve business operations. Constant insight fuels smarter decisions and a more proactive approach to business.
Tags : 
ibm, ebf, business process management, bpm, ibm smart soa, bep, kpi, websphere, business monitor, business events, lotus, enterprise applications, business process automation
    
IBM
Published By: Amazon Web Services     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
Amazon Web Services
Published By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : 
webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences, collaboration applications, online training, online meetings, portals, instant messaging, online webinars/events, human resources technology, enabling knowledge workers, erp, crm, external audiences, vendor solutions
    
WebEx
Published By: iLinc     Published Date: Mar 04, 2010
Webinars are more than just isolated events - they are powerful, tactical tools for executing Marketing and Sales strategies. As any session organizer knows, much of the work (and worry) lies in sending invitations, collecting registrations, emailing reminders, recording, and distributing follow-up communications.
Tags : 
ilinc, salesforce, webinar, presentation, web conferencing, video conferencing, visual aid, social networking
    
iLinc
Published By: Arkadin     Published Date: Sep 11, 2013
In line with economic recovery, marketing professionals are hard-pressed to achieve lofty marketing and sales goals, with increased pressure on driving higher ROI. Webcasts are scalable events enabling marketers to educate prospects, nurture leads, and retain customers without strain on time and budget.
Tags : 
webcast, web conferencing, webinar, web collaboration, webinars, web events, web collaboration, online meeting, event conferencing, web audio conferencing, arkadin, web conference, marketing events, roi, web meeting, software development, it management
    
Arkadin
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Act-On     Published Date: Apr 18, 2014
Webinars have much in common with real-world events and can deliver a similar quality of leads, at a lower cost per lead. Producing a webinar provides its own set of unique challenges, but with strategic planning, a project approach, and attentive execution, you’ll find yourself creating thoroughly professional webinars.
Tags : 
marketing automation, marketing, roi, benefits, grow your business, lead generation, social media, lead management strategy, content marketing, marketing strategy
    
Act-On
Published By: TowerData     Published Date: Jan 20, 2007
Visitors to your website are valuable leads and capturing their contact information is essential to converting them to customers. However, when prospects enter email addresses and phone numbers into a web form they often make mistakes, such as misspellings and typos, or they falsify data, which prevents you from being able to contact them.
Tags : 
email list, email append, email address, cass, customer database, tower data, database, data quality, clean data, list management, towerdata
    
TowerData
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
    
Cox Business
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory