analysis

Results 126 - 150 of 1330Sort Results By: Published Date | Title | Company Name
Published By: Zendesk     Published Date: Aug 26, 2016
This white paper provides a full analysis on how Zendesk successfully helped Trustpilot with customer service needs.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jan 03, 2019
To successfully meet customer demands for more immediate, personalized attention, companies are leveraging new technologies that go beyond traditional voice and email. By implementing such channels as live chat, social media, mobile apps, SMS/text messages, self-help solutions, and more, companies can now be ready wherever and however the customer wants. The following report, sponsored by Zendesk, is based on an online survey of 1,044 U.S. consumers who have received online or phone customer service. The research goal was to better understand present customer expectations and to quantify the impact of customer service on business results. Questions were asked about past experiences with customer service, as well as preferences and opinions. Certain questions were repeated from a similar 2013 survey to enable trend analysis.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jan 03, 2019
Upgrades, upgrades, upgrades. Everyone is making them and so you ask yourself: Should your business upgrade systems, too? It seems like there’s always a newer version or better software out there. Yet while implementing new and improved systems can help your business scale and save your company money, it’s important to know whether new software is worth the transition. Zendesk recently commissioned Forrester Consulting to conduct a study that evaluated the financial impact of Zendesk on organizations. Forrester interviewed five customers and conducted a financial analysis. In this study, Forrester lays out the benefits and costs of Zendesk’s family of customer service products, with the analysis pointing to benefits of more than $3.8 million.
Tags : 
    
Zendesk
Published By: RSM US     Published Date: Feb 08, 2019
The term outsourcing can have a negative connotation, conjuring images of layoffs and relocating jobs to third parties in remote locations. However, outsourcing can take many forms, and finance and accounting outsourcing (FAO) does not always mean the displacing of the finance back office. Specifically, FAO leverages digital technology to complement and support the back office, streamlining processes while providing enhanced transaction processing, reporting and analytics capabilities. It also allows key resources to focus on strategy, analysis and decision-making.
Tags : 
    
RSM US
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Symantec     Published Date: Jul 09, 2017
This paper describes how malware is evolving, how it functions, and how it can be identified, neutralized, and blocked by what we refer to as cloud generation malware analysis, which is available as a robust enterprise cloud service. Let’s start with how the blizzard of advanced malware alarms is affecting IT security teams.
Tags : 
cloud, malware, threat and vulnerability management, security
    
Symantec
Published By: Adobe     Published Date: Aug 04, 2015
InfoTrends has developed this analysis piece to highlight who we believe to be the top vendors in this market.
Tags : 
digital publishing, digital publishing landscape, digital publishing solution
    
Adobe
Published By: Prophix     Published Date: Jun 03, 2016
Discover how best-in-class organizations are using financial consolidation as the catalyst to better strategic financial analysis and business decision making. Learn about how the best finance operations deliver faster, more accurate and more automated close and consolidations. Hear about Space Saver a Prophix customer and how his company uses Prophix for financial consolidation and to help them plan their product inventories, their product discounting strategies, and their product mix.
Tags : 
financial consolidation, best practices, prophix, productivity, competitive advantage, business analytics, database development
    
Prophix
Published By: Prophix     Published Date: Jun 03, 2016
Prophix financial consolidation is the springboard to strategic financial analysis and better business decision making.
Tags : 
best practices, financial consolidation, financial analysis, prophix, business analytics, business intelligence, productivity
    
Prophix
Published By: Prophix     Published Date: May 31, 2016
Watch how Prophix empowers you with monitoring reports and analytics to support a continuous process that involves the input of employees from across the organization. With Prophix, you can evaluate your corporate performance from both high-level and granular views. And by ensuring that you keep an eye on the alignment of business goals and the company’s progress, you will enjoy a valuable tool for facilitating informed decision making.
Tags : 
prophix, best practices, productivity, business analysis, business activity monitoring, business analytics, business integration, business intelligence
    
Prophix
Published By: Prophix     Published Date: May 31, 2016
Prophix gives you a clear picture of all your operational costs and connects them with key factors that are driving your revenues. That increased line-of-sight is made possible because Prophix tracks and monitors all day-to-day operational planning activities. Improving operational outcomes for the short-term and providing insights into your future operations
Tags : 
prophix, best practices, database management, productivity, business analysis, business analytics, business intelligence, business management
    
Prophix
Published By: Riverbed     Published Date: Jul 17, 2013
Riverbed® Cascade Shark provides continuous, high-speed packet capture to ensure that packet-level information is available when needed for granular, real-time and post-event forensic analysis. Based on high-performance 1GbE and 10GbE capture cards, Cascade Shark is capable of sustained line-rate, multi-gigabit per second recording of network traffic.
Tags : 
cascade shark, datasheet, riverbed, cascade, riverbed cascade, high-performance, sustained line-rate, network traffic
    
Riverbed
Published By: Riverbed     Published Date: Jul 17, 2013
"Cascade Pilot Personal Edition is a powerful network analysis, visualization, and reporting tool specifically designed to enhance Wireshark. Because Cascade Pilot Personal Edition is fully integrated with Wireshark, it allows you to easily leverage your team's existing expertise, increasing efficiency in diagnosing your networking issues. Learn more
Tags : 
cascade pilot, network analysis, network, infrastructure, local area networking, network architecture, network management, network performance
    
Riverbed
Published By: Riverbed     Published Date: Jul 17, 2013
Riverbed® Cascade® Pilot and Cascade Shark combine sophisticated, end-to-end monitoring with high-speed,high-fidelity packet capture and analysis to deliver comprehensive network performance monitoring and analysis. By continuously recording the packets traversing the network, rich troubleshooting details are always available, accelerating problem isolation and resolution times, and increasing productivity. Download this insightful solution brief to learn more.
Tags : 
network performance, riverbed cascade pilot, cascade shark, it infrastructure, infrastructure, local area networking, network architecture, network management
    
Riverbed
Published By: Riverbed     Published Date: Jul 17, 2013
As a network manager, application manager or security manager, you need systems in place that can collect data across your WAN, continuously analyze the data to discover problems, and allow you to troubleshoot issues as soon as they occur. A packet capture and analysis solution is an essential part of your toolset, since it provides the most granular level of information and can help troubleshoot the toughest problems. Riverbed Cascade has fundamentally changed the economics of network performance management. Learn more..
Tags : 
network, troubleshooting, wan, network manager, network performance management, infrastructure, local area networking, network architecture
    
Riverbed
Published By: Riverbed     Published Date: Jul 17, 2013
Riverbed Cascade is a new type of tool that incorporates traffic monitoring, packet capture and protocol analysis to provide an application-aware view of the network. Download this white paper from NetMedia to learn how Riverbed Cascade can help to solve your IT performance challenges.
Tags : 
network performance, management, performance management, riverbed cascade, riverbed, bandwidth management, ethernet networking, infrastructure
    
Riverbed
Published By: join.me     Published Date: Jul 10, 2015
Collaboration is key. This report combines quantitative research sponsored by join.me by LogMeIn and a range of other prominent research firms with qualitative analysis conducted by Forbes Insights.
Tags : 
collaboration tools, online meetings, virtual meetings, collaboration, benefits of collaborative tools, teamwork, video conferencing
    
join.me
Published By: Schneider Electric     Published Date: Oct 17, 2016
This white paper provides a quantitative TCO analysis of the two architectures, and illustrates the key drivers of both the capex and opex savings of the improved architecture.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 17, 2016
In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 17, 2016
A 10-year total cost of ownership (TCO) analysis is provided showing li-ion is 39% less than VRLA despite their capital cost premium. A sensitivity analysis reveals the TCO drivers. Finally we discuss li-ion batteries for retrofit and new UPS applications and the effect of temperature on battery life, runtime, and cooling.
Tags : 
    
Schneider Electric
Published By: NetApp     Published Date: Feb 14, 2017
This comprehensive economic analysis by ESG provides prospective customers with a return on investment model for evaluating NetApp AFF storage arrays.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Schneider Electric     Published Date: Oct 31, 2017
In some cases, adopting cloud IoT platform may make more sense where required processes, communication costs and cloud costs meet sufficient total cost of ownership against deploying MDC. Additionally, in situations that an end-user organization already has a secure room or a modular data center solution where infrastructure can be housed and/or the amount of infrastructure involved may be too small to benefit from power/cooling advantages of being housed in an MDC, the organization may not see a need for an MDC. An MDC is nothing more than a smaller form of a modular data center, and a number of providers have entered the modular data center solutions space in the past. These modular data center solution providers came into the market with high expectations for growth and ROI only to find that high sales were not forthcoming due to limited use cases, so many exited the space.
Tags : 
algorithm analysis, buyer trend, iot, workloads, market, vendors, data centers
    
Schneider Electric
Published By: Oracle     Published Date: Mar 28, 2017
The complexities of distribution make it a most daunting challenge. Indeed, for hoteliers, mastering it might be akin to finding the industry’s Holy Grail. Consider the task’s many facets: Maximizing exposure to attract new customers and establish presence in markets, both near and far, requires contracts and integration with an everchanging cast of OTAs and metasearch companies. Evaluating voluminous amounts of data for rate management practically defines “paralysis by analysis.” And demonstrating online capabilities that can adapt to the ever-changing demands of today’s consumers – who expect everything to be faster, better and cheaper than yesterday.
Tags : 
cloud, distribution, hoteliers, oracle
    
Oracle
Published By: RedHat     Published Date: May 10, 2017
This white paper provides an analysis of five organizations that migrated enterprise applications from proprietary legacy systems to RHEL solutions.
Tags : 
red hat, linux, enterprise linux, reduce costs, improve efficiency, platform
    
RedHat
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.