research now

Results 101 - 125 of 177Sort Results By: Published Date | Title | Company Name
Published By: iKnowtion     Published Date: Nov 17, 2011
Find out ways to understand the online and offline behavior customers and other impacts associated with this company's online marketing efforts.
Tags : 
customer intelligence, behavioral analysis, customer analytics, channel optimization, iknowtion
    
iKnowtion
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec, psychology, research, corporate, insiders, anxiety, theft, stealing, steal, data, employees, protection, secure, conditions, security, it management
    
CDW Symantec
Published By: Comcast Business     Published Date: Mar 24, 2015
Its a transformative time in government information technology. Public sector organizations are moving to the cloud. At the same time, seemingly everything that can be virtualized is quickly heading in that direction. Immersive Web applications are enabling next-generation services, including innovative mobile apps that give agency staff members and constituents anytime access to valuable resources. Video seems to be everywhere, with one research firm estimating that video streaming accounts for more than 53 percent of all downstream traffic in North America. In this white paper from the Center for Digital Government (CDG), we break down what every IT leader needs to know about todays networking to ensure project success.
Tags : 
high-performance networks, modern government, cloud, immersive web, mobile technology, networking, it management, data management
    
Comcast Business
Published By: Comcast Business     Published Date: Mar 24, 2015
Todays K-12 schools are hungry for bandwidth. The reason is clear: highperforming, reliable and easily expanded network services support the latest classroom innovations, including videoconferencing, 1:1 computing, distance learning and modern learning management systems. Its no surprise then that progressive educators now see a direct link between the overall success of their school districts and access to high-capacity networks. This emerged as a clear trend in new research by the Center for Digital Education (CDE) a commanding 98 percent of administrators and IT representatives said the future of K-12 education hinges on ubiquitous connectivity. This white paper lays a framework for planning and implementing high-performance networks. In addition to explaining why nows the time to plan network upgrades, this paper answers one of the fundamental questions asked by IT managers at schools everywhere: How much network capacity will we actually need?
Tags : 
education, network modernization, high-performance networks, bandwith, classroom innovations, networking, it management
    
Comcast Business
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
Digital transformation has moved out of the early-adopter phase and into mainstream adoption. According to the ZK Research 2018 IT Priorities Study, 88% of businesses now have digital initiatives underway, up from 84% in 2017. The urgency of IT and business leaders is well warranted, as companies that master being digital will leapfrog the competition and be able to sustain a market-leading position. Those that lag in their digital initiatives will fall farther behind and will struggle to survive. The key to digital success is having an agile IT foundation that enables businesses to adapt to market transitions faster than the competition. However, there is no single technology called digital transformation. Rather, it is powered by the following four key enabling technologies
Tags : 
sd-wan, cloud computing, artificial intelligence
    
VMware SD-WAN by VeloCloud
Published By: Magento     Published Date: Mar 28, 2018
Its official. Magento Commerce is one of the leaders of B2B eCommerce. Dont believe us? Check out this new report, The Forrester Wave: B2B Commerce Suites for Midsize Organizations, Q3 2017. Forrester, one of the most influential research and advisory firms in the world, has just revealed their multiple-criteria evaluation of B2B commerce suite providers. Now you can see how Magento Commerce stacks up, with your FREE copy of the report.
Tags : 
b2b, commerce, organizations, vendors, providers
    
Magento
Published By: Vertica     Published Date: Oct 30, 2009
Independent research firm Knowledge Integrity Inc. examine two high performance computing technologies that are transitioning into the mainstream: high performance massively parallel analytical database management systems (ADBMS) and distributed parallel programming paradigms, such as MapReduce, (Hadoop, Pig, and HDFS, etc.). By providing an overview of both concepts and looking at how the two approaches can be used together, they conclude that combining a high performance batch programming and execution model with an high performance analytical database provides significant business benefits for a number of different types of applications.
Tags : 
vertica, analytical computing, adbms, mapreduce, application management, data management, data mining, grid computing, business analytics, business metrics, linux, analytical applications, business intelligence, information management, data warehousing
    
Vertica
Published By: Sophos     Published Date: Jul 01, 2013
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot. The rising trend of mobility consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a standard mobile device. This whitepaper will help you identify each device platforms security featuresand choose the right platform for your business.
Tags : 
mobile device, security
    
Sophos
Published By: IBM     Published Date: Jul 24, 2012
This white paper discusses survey research by breaking it up into a seven step process - and clearly detailing how you can maximize your efforts every step of the way. Get the white paper now.
Tags : 
ibm, technology, data, data collection, data research, analysis, survey, spss, data protection, data quality, data replication
    
IBM
Published By: Polycom     Published Date: Apr 30, 2013
This research note identifies the key trends, the video-enabled business applications that enterprises need to implement now, and describes how to develop a video strategy. Knowing how video is currently being used will help managers identify use cases, understand what users need to get their jobs done, and choose the right solutions for their enterprises.
Tags : 
enterprise, video collaboration, research, consumerization, mobile, cloud, video conferencing, wireless hardware, application integration, best practices, change management, enterprise software, groupware workflow, collaboration
    
Polycom
Published By: Hyland Software     Published Date: Dec 17, 2013
Businesses are discovering how to create efficiencies and meet constantly evolving business needs with an enterprise content management (ECM) solution. Make ECM work for your organization by researching best practices and knowing your options.
Tags : 
emc, enterprise content management, emc solution, automated processing, workflow, integration, emc strategy, onbase, hyland software, knowledge management, enterprise applications, data management
    
Hyland Software
Published By: Hyland Software     Published Date: Dec 17, 2013
Businesses are discovering how to create efficiencies and meet constantly evolving business needs with an enterprise content management (ECM) solution. Make ECM work for your organization by researching best practices and knowing your options.a
Tags : 
emc, enterprise content management, emc solution, automated processing, workflow, integration, emc strategy, onbase, hyland software, workforce management, content management system, document management, information management
    
Hyland Software
Published By: ADP     Published Date: Oct 14, 2014
In July and August 2014, the ADP Research Institute, a specialized group within ADP, conducted an online survey of more than 750 owners and executives at companies with 50-999 employees. The Midsized Business Owners Study is now in its third year. Midsize businesses often struggle between operating like a smaller business but having to abide by the same regulations as larger corporations. Download this case study to learn how midsize business are dealing with their three greatest concerns right now: healthcare benefit costs, the Affordable Care Act, and the level of government regulations.
Tags : 
adp, midsize business, healthcare benefit costs, affordable care act, government regulations, adp research institute, midsized business owners study
    
ADP
Published By: Avaya     Published Date: Jun 15, 2016
Enabling information mobility and security is critical to the evolution of healthcare Hospitals and other healthcare organizations are rapidly moving to a digital care ecosystem, putting incredible pressure on the network. The solution is an SDN solution built for the specific needs of healthcare. Read the ZK Research now for 4 key capabilities SDN offers
Tags : 
sdn, networking, best practices, software, technology
    
Avaya
Published By: Flexera     Published Date: Feb 19, 2019
Flexeras Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Dont Know What You Dont Know Its hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: Carbonite     Published Date: Feb 22, 2017
Download Research Nows summary to see how competing cloud backup providers stack up against one another in business customer satisfaction.
Tags : 
backup and recovery, backup survey, business backup, computer backup, cloud backup, cloud recovery, data backup, data recovery, data protection, disaster recovery, hybrid backup, hybrid data protection, hyper-v backup, on-site backup, on-premises backup, recovery plan, remote backup, vm backup
    
Carbonite
Published By: Oracle     Published Date: Feb 10, 2016
There is little question that cloud is well established as a way to deliver business applications. Based on IDC research, over 70% of manufacturing companies are using hosted applications somewhere within their supply chain, with another 25% considering it. The most popular supply chain management (SCM) application areas are transportation related (transportation management, global trade management), where the "network effect" (i.e., carrier pooling, regulatory impact) can leverage both shared knowledge and existing connectivity along with sales and operations planning, demand signal management, and business intelligence/analytics. The concern that cloud is "risky" is increasingly taking a back seat to the perceived benefits of the technology. Indeed, those benefits, both achieved and anticipated, are significant, including cost, speed of implementation, and the ability to "consume" new capabilities and functionality easily and transparently.
Tags : 
oracle, supply chain cloud, supply chain best practices, idc research, it management, wireless, knowledge management, data management
    
Oracle
Published By: Aberdeen Group     Published Date: Sep 06, 2011
This Aberdeen Group research shows why you should be looking more closely right now at secure/managed file transfer solutions.
Tags : 
aberdeen, secure / managed file transfer, file transfer, collaboration, copy and carry, ftp, dropbox, sftp, ftps, smft, enterprise data, velocity, consumerization, complexity, digital diy, infrastructure, network attached storage, storage management, business intelligence, data integration
    
Aberdeen Group
Published By: IBM     Published Date: Jan 10, 2014
Building an effective sales team starts with hiring the best talent and then making them productive as quickly as possible.
Tags : 
social collaboration, social networking, social business, communication, social media, mobile, bid data, cloud, ventana research, sales team, learning management, management systems, collaboration tools, knowledge sharing, learning, ibm, collaboration, collaborative commerce, content management system, employee performance
    
IBM
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free 15-minute podcast, Laura Ramos of Forrester Research explains how B2B marketers can leverage Web 2.0.  Listen at your desk or on the road and discover: how to enhance marketing ROI by driving real engagement and dialog ... how to reach key decision-makers ... reasons behind the move from demand generation toward more organic demand management ... and more.  Understanding Web 2.0 tactics is a must for B2B marketers who want to compete.  Find out why; listen to this free podcast now.
Tags : 
using digital, promo code: wp2, marketing, b2b marketing, social marketing, social networks, social networking, interactive direct marketing, interactive demand generation, digital media, engagement, rich media, rich web, rich applications, blogging, rss, social networks, facebook, myspace, digital marketing
    
Marketo, INC.
Published By: Bazaarvoice     Published Date: Apr 30, 2014
Its no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research 7 Ways the Mobile Consumer Changes Everything now.
Tags : 
bazaarvoice, mobile consumer, mobile purchases, digital sales, mobile shppers, online reviews, retailers
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Nov 05, 2014
Its no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research 7 Ways the Mobile Consumer Changes Everything now.
Tags : 
bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers, consumer feedback, change management
    
Bazaarvoice
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications
    
Intralinks
Published By: Cisco Systems     Published Date: Dec 23, 2013
Are you ready to leverage the flexibility and power of mobile and cloud computing? ZK Research outlines the limitations of legacy WANs and provides recommendations for transforming your network into a strategic asset. See why the Cisco ISR 4451-AX is your building block for evolving the WAN. Read Now
Tags : 
cisco, zk research, wan, virtualization, data center, wireless network, wide area network, network-centric, cloud computing, mobile computing, networking, wireless, enterprise applications, data management, encryption
    
Cisco Systems
Published By: Oracle     Published Date: Apr 22, 2014
A 2013 global research findings report on what service managers need to know to drive the cloud.
Tags : 
cloud, cloud applications, service managers, oracle, cloud computing, design and facilities
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.