research now

Results 126 - 150 of 177Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Sep 24, 2014
Microsoft Lync is transforming enterprise communications. A 2013 ZK Research study shows that 43 percent of organizations have deployed Lync in at least part of their organization, with another 17 percent of organizations planning to do so in the next 12 months. If youre in this group of organizations that have deployed Lync, you probably deployed instant messaging (IM) and presence. Now that Lync IM and presence has been running for a while, youre thinking about taking the next step with Lync Enterprise Voice.
Tags : 
investment, voice, maximize, organization, deployed, research, lync, transforming, enterprise, communications, group, percent, instant messaging, software development, enterprise applications
    
Polycom
Published By: SAP     Published Date: Feb 10, 2011
Prompted by volatile markets and a troubled economy, the need to contain or reduce costs is key for small to medium size enterprises (SMEs). In the pursuit of cost reductions and in the struggle to sustain and grow revenue and profits it becomes more and more important to preserve the level of visibility that becomes elusive as SMEs grow in both size and complexity. Download this research now to learn more.
Tags : 
sap, business intelligence, erp, sme, shipping, transportation, enterprise applications, enterprise resource planning, supply chain management
    
SAP
Published By: SAP     Published Date: Feb 10, 2011
Tap directly into the findings of an exclusive survey by IDG Research and Sybase with this new white paper that define the current state of mobility. More importantly it underscores specific ways IT can and should behave to proactively deal with the fast-developing world of enterprise mobility. Download it now to learn more about how the "Consumerization of IT" presents a wealth of business opportunities for IT management.
Tags : 
sap, mobility, competitive edge, greenfield, enterprise mobility, mobile, applications, iphone, crm, erp, mobile data systems, mobile workers, wireless infrastructure, customer interaction service, customer relationship management, enterprise resource planning
    
SAP
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but its occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning what they are and how they work has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: Schneider Electric     Published Date: Jun 04, 2014
While many who invest in Data Center Infrastructure Management (DCIM) software benefit greatly, some do not. Research has revealed a number of pitfalls that end users should avoid when evaluating and implementing DCIM solutions. Choosing an inappropriate solution, relying on inadequate processes, and a lack of commitment / ownership / knowledge can each undermine a chosen toolsets ability to deliver the value it was designed to provide. This paper describes these common pitfalls and provides practical guidance on how to avoid them.
Tags : 
schneider, electric, dcim, solution, invest, infrastructure, management, software, it management, data management
    
Schneider Electric
Published By: Bazaarvoice     Published Date: Aug 01, 2014
Its no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research 7 Ways the Mobile Consumer Changes Everything now.
Tags : 
bazaarvoice, web content, mobile, consumers, research, shoppers
    
Bazaarvoice
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you cant afford to suffer through APTs, breaches and data leakages just to provide teachable moments for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec
Published By: Coveo     Published Date: Nov 13, 2013
Where does a $5.5 billion technology company with 15,000 employees and a $1 billion annual R&D spend turn for a more effective way to tap existing research & engineering knowledge and avoid duplicating work? Harris Corporation turned to Coveo. read this case study to learn how Harris has improved productivity, communications and innovation.
Tags : 
advanced enterprise search, increasing productivity, knowledge assets, unified enterprise search, enterprise search solutions, enterprise software, search engines
    
Coveo
Published By: Avalara     Published Date: Jan 28, 2014
Sales tax compliance and the CFO: What automation means for risk management conveys why its time C-level executives should take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and dont know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance and, more importantly what the accounting and finance professionals in the trenches are doing to safeguard their organizations from potential audits and accounting pitfalls. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices
    
Avalara
Published By: Movable Ink     Published Date: Apr 09, 2015
The latest research shows that two-thirds of email opens now occur on mobile devices, but many email marketers are still acting like their customers are reading email from a computer, at home. Its time to take email marketing to the next level with effective mobile email marketing campaigns! Watch the webcast for nine easy ways to get started with responsive email campaigns today.
Tags : 
email marketing, contextual marketing, responsive email campaigns, responsive email, mobile email, responsive email examples, email marketing webinar, email marketing webcast
    
Movable Ink
Published By: IBM     Published Date: Nov 14, 2014
A recent study completed by Ventana Research found that 68% of companies are using predictive analytics to gain a competitive edge. Find out more now, and learn how predictive analytics can help you.
Tags : 
ibm, ventana, deployment, predictive analytics, forecasting, accessing data, business management, data management, business analytics, productivity
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Read this report from Forrester Research to learnhow IBM ACM solutions improve the efficiency of knowledge workers, integrate with analytics to create upselling and cross-selling opportunities and reduce the cost and risk of regulatory fines through increased audit consistency.
Tags : 
ibm, acm solutions, cross-selling opportunities, audit consistency, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, it security, vulnerability management, virus protection, spyware protection, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security, security, data quality, database security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x-force, ibm security portfolio, threat intelligence, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: May 13, 2016
Download this research report now to learn more about the financial and operational impacts on asset-intensive industries worldwide.
Tags : 
ibm, watson, iot, cognitive asset management, asset management, iot, knowledge management, business intelligence
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
New research from IBM found that one-third of employees surveyed at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. Why? Theyre tired of workplace apps that dont perform like their personal apps: intuitively, on the go, and with some intelligence. Saying yes might feel good to your teams, but it can also turn your infrastructure into a Beast. You dont know all the different apps being used, like file sharing or online meetings. Or how much they cost. Or if your content is safe and manageable. Can you give your teams what they want without getting trampled by the Beast? Yes you can. You can transform the Beast into a Beauty. But you need to consider three critical ways to make that happen.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business operations, business technology, third-party cloud apps, workplace apps, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 18, 2016
This paper from Osterman Research, explores the origins of the "information problem" many organizations are now facing and presents a detailed discussion of how to calculate your current information costs as well as how to calculate the ROI of an information governance program.
Tags : 
ibm, osterman, roi, big data, data, analytics, information governance, knowledge management, enterprise applications, data management, data center
    
IBM
Published By: SilverSky     Published Date: Apr 16, 2013
In Forrester's 15-criteria evaluation of the emerging managed security services provider (MSSP) market, SilverSky was identified as a leader. Forrester identified the 10 most significant providers in this category and researched, analyzed, and scored them. SilverSky was given high ranks for business and technical value, SLA adherence, security services, and threat intelligence and analytics. Download this industry research paper now to learn why SilverSky is the MSSP you should be working with today.
Tags : 
managed security, msp, managed service provider, sla adherance, threat intelligence, analytics, mssp, forrester, access control, anti spam, anti spyware, anti virus, application security, auditing, compliance, ddos, disaster recovery, email security, encryption, internet security
    
SilverSky
Published By: IBM     Published Date: Oct 17, 2013
Have you heard about the DevOps revolution? Whats all the buzz about? Find out more in this report by Kurt Bittner, Analyst, Forrester Research, Inc. Even if full continuous delivery is not your goal, proceeding toward it can help increase reliability, reduce risks, and decrease costs. As Kurt shares, The revolution is just beginning, but its real and the time to act is now.
Tags : 
forrester report, ibm, alm, application lifecycle, application lifecycle management, delivery, devops, continuous delivery, ad&d, application development, application integration, application performance management, productivity
    
IBM
Published By: IBM     Published Date: Apr 22, 2014
Researched and compiled independently by Chartis, the RiskTech100 evaluates and ranks the worlds most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.
Tags : 
ibm, chartis, risktech100, risk technology, risk technology vendors, security, risk, compliance, risk management
    
IBM
Published By: Kapost     Published Date: Jan 16, 2014
Today, the internet has changed the way buyers discover solutions. More people are meeting and researching vendors online than ever before. Your ideal customers are reading blog posts and articles, checking Facebook, Twitter, and LinkedIn profiles, and forming opinions based on what you say and share online. Before they call to get to know your company better, they turn to Google for answers and information. If a competing vendor appears smarter, more interesting, or more reliable than you, your buyers will reach out to them first. These online engagements have changed the rules of buyer/brand communications. So how can you and your company form meaningful relationships with buyers who are getting to know you long before theyve been introduced?
Tags : 
content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform, content marketing software, editorial strategy, marketing campaign planning, content marketing best practices, content marketing companies, editorial content, content marketing workflow
    
Kapost
Published By: Lenovo and Intel     Published Date: Aug 09, 2018
Organizations around the world are clamoring for the kind of scale, automation and agility delivered by Lenovo ThinkAgile hyperconverged infrastructure (HCI), powered by the Intel Xeon Platinum processor. Hear from Eric Sheppard, Research Director for Storage at IDC, how the move from converged infrastructure to hyperconverged systems is reaching market maturity and gaining traction in enterprise IT. Read an experts opinion on whats next for HCI plus recommendations for organizations who havent yet benefited this exciting technology. Download now.
Tags : 
intel, the intel logo, xeon
    
Lenovo and Intel
Published By: Lenovo and Nutanix     Published Date: Aug 09, 2018
Sponsored by Lenovo, Intel and Nutanix Organizations around the world are clamoring for the kind of scale, automation and agility delivered by Lenovo ThinkAgile hyperconverged infrastructure (HCI), powered by the Intel Xeon Platinum processor. Hear from Eric Sheppard, Research Director for Storage at IDC, how the move from converged infrastructure to hyperconverged systems is reaching market maturity and gaining traction in enterprise IT. Read an experts opinion on whats next for HCI plus recommendations for organizations who havent yet benefited this exciting technology. Download now.
Tags : 
lenovo, intel, nutanix, organization, automation
    
Lenovo and Nutanix
Published By: IBM     Published Date: Oct 30, 2014
Filled with exotic terms like Hadoop and Data Scientist, Big Data, business intelligence and analytics have always been the domain of the biggest enterprises with huge teams to devote to analyzing data. But thanks to the latest technology advances businesses of almost any size can utilize tools to help inform every part of business decision-making. This SlashGuide looks at a recent Slashdot Pulse research study on BI/BA and discusses whats really important when it comes to Big Data and what businesses can do now to capitalize on the trend.
Tags : 
business analytics, big data, bi/ba, it management, knowledge management, data management, best practices
    
IBM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.