There is a misconception that User Experience (UX) design is too touchy feely to have real business impact. The reality is that UX design is a discipline deeply rooted in behavioral and neurosciences that when done right can help drive revenue and reduce cost. Register to learn the 3 key steps you can take to ensure your User Experience (UX) design has a positive impact on your customers and revenue.Read more >
As UX consultant at eProseed, partner of Oracle, I currently design UXs of B2B apps to be used on an Oracle platform. For a B2B application to be a successful User Experience, it needs to fulfil requirements from different angles. Users want the app to be useful and usable. Developers need the app to be easy to develop and the customer wants the app to provide business value.
Asa UX designer I'm always in the middle. I know the different requirements and of course I put the user first and foremost. At the same time I make sure that all stakeholders know the users by defining personas and usage scenarios.
I design the app for a user to use in any required context (at home, at work, in public transport etc.) By applying the "glance, scan, commit" design philosophy, I make sure that the UX helps the user to fulfil all required work related tasks.
At the same time i use standard (user tested) Oracle UX patterns to design the app in a way that it's easy for developers to build the UX. By applying these patterns and the Oracle guidelines, the time to develop the uX is reduced, which also makes the customer happy.
How I do all this, I will explain in this webinar.
Recent studies show that people spend 80 percent of their time using only five apps on their smartphones. This makes monetizing apps even more difficult than it used to be.
Not surprisingly, apps that have a chat element such as SnapChat, WhatsApp, and Facebook remain the most popular. Apps with less obvious but potentially higher benefits remain untouched. And as people are drawn away from apps to chatbots, app makers are faced with some difficult decisions.
In the highly competitive world of mobile apps, how to monetize is an increasingly difficult challenge. And customizing a strategy for each app isn't always a scalable solution. Join VentureBeat expert Stewart Rogers and GSN Games executive Eyal Grundstein as they discuss the challenges facing app makers and how to address them.
In this webinar, you'll learn to:
* Customize your monetization strategy so that it's scalable
* Unlock the revenue potential of lower spending users
* Attract higher-spend users
* Negotiate monetization strategies without alienating current users
* Eyal Grundstein, VP Growth & User Acquisition, Game Show Network
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
User experience (UX) has been a buzzword for so long that its exact definition has become hard to nail down concretely; it’s still ubiquitous in the industry (and even beyond), but it often holds different meanings for different people. The general confusion around UX is further compounded by the exponential growth of the new digital frontier we live in. The roles and responsibilities of a UX practitioner have been rapidly transforming to keep pace with the ever-changing digital evolution.
So what is UX really? How has UX changed over the last 20 years? How does UX fit into a modern, product-centric organization today? How is UX practiced now and what does the future hold? Do UX designers really have cyborg brains and robotic appendages?
In this 45-minute webinar, Centric Digital’s Jean-Marcel Nicolai, Chief Product Officer and Jackson Young, VP of User Experience, will answer the above questions and share their insights about UX discipline’s past, present and future.
Last year, the number of mobile developers and publishers who were cheated when acquiring new app users doubled. That kind of fraud means a whole lot of people are paying good money for bad users.
It’s not surprising. The mobile market has heated up so much that as your user acquisition campaigns scale – across more channels, more markets, using more sophisticated automation -- you’re bound to run across bad traffic.
You know something’s up because conversion rates suddenly drop. Install numbers stop synching up. Your business intelligence is stumped. Someone is claiming conversions that never happened!
The good news? You can greatly reduce the risk. We’ve brought together a stellar round-up of pros who have diagnosed, identified, and successfully pushed back fraudulent activity in extensive UA operations. Each will share their experience from the front-lines on how to combat mobile fraud.
After this webinar, you’ll:
* Understand what user acquisition fraud is, and its many forms
* Identify campaigns and publishers associated with illegitimate traffic
* Learn how datasets can be cleaned and payouts reclaimed once fraud is identified.
* Eric Seufert, VP of User Acquisition, Rovio
* Yevgeny Peres, VP of Growth, Supersonic by ironSource
* Paul H. Müller, CTO at adjust
* Evan Schuman, Moderator, VentureBeat
Don't miss this insightful and interactive panel discussion on mobile fraud. Register today!
Sponsored by adjust
User Authentication in GovernmentRead more >
The latest in business mobility straight from VMworld.
Find out how VMware can help you embrace and address some of the biggest initiatives in end-user computing and enable true business mobility. We'll share the latest announcements and innovations from VMworld and provide you with an overview of solutions and tools to deliver desktop, workspace and mobile services across devices, locations, connections and clouds.
This webcast includes new features and enhancements for VMware End-User Computing products and services including:
Demos featuring the latest in Horizon and Horizon for Linux
The latest beta program with Project Enzo
Exploring an architecture built to deliver business mobility
Director, Solution Engineering, End User Computing, VMware
This webcast is designed for IT Directors, IT Managers, IT Practitioners, Systems Admins, Network Admins, Application Specialists, Desktop Directors.
Today, poor user experience is a business problem, not just an IT problem. If the performance of your web applications is consistently poor, your users will take their business to a competitor.
Traditionally, IT managers have been “data center” focused, looking at system resource metrics rather than the end user experience. Even when performance is considered at the application level, the metrics are based on individual elements (SQL response time, application heap usage, etc.) and are not focused on what is really happening from the users’ perspective. The data center-centric approach is insufficient for effective application performance management. Performance could be perfectly fine on the server-side, but be horrible when viewed from the end user perspective.
Watch this webinar to learn how to monitor, diagnose and report on the real user experience for your business-critical web applications.
Business sectors like finance, government and healthcare have specific performance, availability and security needs. The latest technology allows organizations to accelerate the time to value and minimize risk for customers. Join this session for an inside look at the latest technology that is helping organizations overcome all the tough challenges that come with accessing their data from any device, any where, and any time.Read more >
Join Michael Cucchi and Sureshmi Wijewardena as they discusses how to pinpoint application problems and maximize the end-user experience.Read more >
Dell Services Solutions end user services to resolve issues in new ways:
- PC Self healing
- Contact Management centre
- Self help
- Multi-channel contact management centres
- Self help social Media
- Self help learning libraries
The blending of our work and personal lives is a reality for many digital employees. While many organizations continue to maintain strong lines of division, other organizations are struggling to find the right balance of security and privacy. This session will review trends, myths and best practices with our own VMWare in-house privacy council for establishing and communicating Bring-Your-Own policies.Read more >
Microsofts’ Windows 10 offers many new management and deployment features that will help customers move to a mobile-cloud first world. Getting there will be a challenge, as customers will need to re-architect the assumptions, processes, and tools needed for effective EUC management. Most customers will find benefit in deploying a variety of EUC management tools that can deliver desktops, applications, and data in a easy to use and secure way.Read more >
User behavior analytics is growing more sophisticated, using machine learning and big data analysis to precisely identify true malicious activity on a network. The big challenge for such solutions is to optimize the use of security analysts' time by avoiding false positives and by giving them complete context when activity is genuinely thought to be malicious. In this session, you’ll learn about innovations in this space that help you find insider threats and quickly shut them down.Read more >
In this video, Jordan Owens, VP of Architecture at Pexip, discusses some of the obstacles to driving user adoption of smart collaboration tools.Read more >
As a cyber security pro, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.
If you’re focused on addressing user threats, User Behaviour Analytics (UBA) can be a powerful tool in your kit. In this webcast David Gorton and Mark Settle from LogRhythm, discuss the elements of an effective user threat detection program. You’ll learn:
- Why detecting user threats is so important—and so difficult
- Different approaches to UBA
- The value of data from across your enterprise
- How to maximise the efficiency of your security analysts
Watch the webcast to learn how UBA can help you discover hidden user threats, reduce false-positives, and properly prioritise the most concerning threats.
User, threats, user, behaviour, analytics, cyber security