research report

Results 401 - 425 of 431Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Oct 08, 2012
New business requirements are transforming the demands placed on IT. To operate effectively in today's fast-paced global environment, organizations need to be able to get work done anywhere, anytime, by any type of worker to achieve the best results. This is the context for the rise of workshifting-the practice of moving work to the most optimal location, time and resources.
Tags : 
citrix, workshifting, optimal location, virtualization, resources, technology
    
Citrix Systems
Published By: Gleanster Research     Published Date: May 15, 2013
A must read if you are considering a marketing automation solution. Gleanster Research surveyed 219 organizations to isolate practices from "Top Performers". The report explores the use of Marketing Automation, solutions to common challenges, metrics for measuring the success of the investment, and best practices for maximizing the return on investment.
Tags : 
    
Gleanster Research
Published By: LogMeIn     Published Date: Aug 27, 2013
While a lot of research has been done on the effectiveness and benefits of live chat, the customers voice is rarely heard. This report, written by Lauren Freemann from the e-tailing group, examines the customers' view on live chat and presents a deep insight into why consumers choose live chat. Findings include the key reasons for choosing live chat over other communication channels, best practices for deploying live chat successfully and key insights from the Annual Merchant Survey, a report that explores the merchants perspective of live chat implementations.
Tags : 
chat with chatters, consumers, retailers, chatting, logmein, customer support, e-tailing, merchants, knowledge management
    
LogMeIn
Published By: IBM     Published Date: Jul 25, 2012
IBM PureSystems offers highly integrated solutions that can help you deploy and tune applications for cloud architectures with ease. Read the research report to take a deeper look at PureFlex Systems within the PureSystems family and learn how PureFlex Systems can help you streamline management and accelerate client time-to-value with a new integrated and modular system/subsystem.
Tags : 
technology, cloud computing, cloud architecture, storage, management, storage management, ibm puresystems, ibm
    
IBM
Published By: IBM     Published Date: Nov 30, 2012
Read the Clabby Analytics research report to see how consolidating Linux servers on an IBM Systems z mainframe is more cost effective than deploying Linux on x86 servers. It could save you over a million dollars!
Tags : 
ibm, linux cloud server, cloud server, server, cloud, virtualization, cloud computing, data management
    
IBM
Published By: Adobe     Published Date: Mar 07, 2013
This Forrester Research report discusses: testing to refine a relevant customer experience, four ways to use analytics to increase personalisation and deciding when and what to customise.
Tags : 
personalisation, customer engagement, customer retention
    
Adobe
Published By: Adobe     Published Date: Aug 22, 2013
With the exponential growth of smartphone and tablet use for search, research, and online purchases, mobile is quickly becoming the focal point of digital marketing. For most marketers, these increasingly ubiquitous devices are transforming the way customers engage with companies and their brands. Recent Adobe Digital Index reports have confirmed that smartphone and tablet traffic is rapidly on the rise, making these channels that advertisers need to be paying attention to as mobility trends continue to evolve.
Tags : 
search, search marketing, mobile marketing, mobile marketing trends, mobility trends
    
Adobe
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: Siemens     Published Date: Jun 01, 2016
Researchers in the occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns. Obviously, the electric shock injuries occurred in relation to low voltage equipment since electric shock in relation to medium voltage equipment is as a rule fatal. It is reported that in the U.S., annually about 2000 arc burn related injuries occur and require hospitalization. Thus, the impact of such injuries on workers becomes a major concern in itself, beyond the economic aspects which are not to be ignored.
Tags : 
siemens, arc defense, fault-resistant, medium voltage, electrical emergency, electronics
    
Siemens
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec
Published By: Cisco     Published Date: Sep 15, 2015
The role of the CIO has changed more in the past five years than any other position in the business world. IT success used to be measured on IT metrics such as uptime and performance of the infrastructure. Today, the goals of the IT leader are aligned with the goals of the business, causing IT to be redefined on all levels.
Tags : 
iot, datacenter, aci, enterprise, networking
    
Cisco
Published By: DNN Corp.     Published Date: Mar 26, 2014
Download your free copy of this 12-page report, loaded with charts and analysis of Forrester Research’s 2013 "B2B Social and Community Marketing Online Survey."
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: DNN Corp.     Published Date: May 14, 2014
Forrester Research shares key findings from their report on branded communities in B2B marketing in this on-demand webinar. While Facebook and Twitter have failed to reach their full potential, B2B marketers are reaping the rewards of branded communities: driving lead generation and revenue, as community members influence both prospects and customers. Watch this replay as Forrester's Kim Celestre describes the tactics that B2B marketers are finding the most successful and provides a business case for creating and managing your own branded community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: Castlight Health     Published Date: Aug 02, 2016
In this Constellation Research report, Principal Analyst Doug Henschen examines how Indiana manufacturer Steel Dynamics cut skyrocketing healthcare costs by turning their employees into informed healthcare consumers, saving millions.
Tags : 
    
Castlight Health
Published By: Acrolinx     Published Date: Apr 01, 2015
Content marketing is one of the highest priorities for today’s marketers, with growth rates for content development and distribution skyrocketing. According to the Content Marketing Institute, for example, 70 percent of marketers are investing more in content marketing than ever before. A recent research report from global market intelligence firm IDC further underscores the point, noting that “building out content marketing as an organizational competency” is one of CMOs’ most important initiatives, second only to measuring ROI. Read this white paper to learn more about the Global Content Impact Index.
Tags : 
global content impact index, brands, web pages, analysis, content marketing, roi
    
Acrolinx
Published By: NetApp     Published Date: May 29, 2018
Read the IDC research report Shared Storage Offers Lower TCO than Direct-Attached Storage for Hadoop and NoSQL Deployments and learn how to: Unify insights across various data sources and multiple cloud deployments Reduce compute, capacity and operational costs Increase security and prevent data loss Plus, learn about the NetApp in-place analytics solution for your existing NAS data and how it can reduce infrastructure costs
Tags : 
    
NetApp
Published By: HP Ecommerce     Published Date: Aug 31, 2015
This July 2015 Forrester Research report is provided compliments of HP. Modern application delivery leaders realize that their primary goal is to deliver value to the business and its customers, faster. For many, this is a significant shift from the past, when they primarily focused on cost control and efficiency. Today, they must connect the work they do and the results they produce to business outcomes. To do this, application development and delivery (AD&D) leaders use a new set of metrics that help them monitor and improve the value they deliver, based on feedback from business partners and customers. In this report, we highlight these new metrics that connect business outcomes to app delivery performance — as well as the practices and tools that modern application delivery teams and their AD&D leaders use to collect and report them.
Tags : 
    
HP Ecommerce
Published By: Pega     Published Date: Sep 11, 2015
In this Forrester Wave evaluation of customer relationship management (CRM) suites for enterprise organizations, we identified the nine most significant CRM suites solutions — Infor CRM (formerly known as SalesLogix), Microsoft Dynamics CRM, NetSuite, Oracle Siebel CRM, Pegasystems, Salesforce, SAP CRM, SAP Cloud for Customer, and SugarCRM — and researched, analyzed, and scored them. This report details our findings in order to help application development and delivery (AD&D) professionals supporting CRM operations select the right partner for their customer engagement initiatives.
Tags : 
    
Pega
Published By: IBM     Published Date: Jul 14, 2016
How are some companies decreasing audit fees in the face of pressure to increase them? In this follow-up report to the 2015 Audit Fee Survey, Financial Executives Research Foundation interviewed several senior-level financial executives and audit partners. These interviews revealed best practices in mitigating increases in audit fees and how to work more efficiently and effectively with auditors. Access this report to learn the reasons for increased audit fees and the impact of PCAOB inspections. You'll also discover how to review current audit focus areas, improve internal controls, automate processes, and review audit hours and fees.
Tags : 
best practices, audit, finance, efficiency, productivity
    
IBM
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: -Top 5 causes of downtime and poor performance across the infrastructure stack -How machine learning and predictive analytics can prevent issues -Steps you can take to boost performance and availability "
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: -Top 5 causes of downtime and poor performance across the infrastructure stack -How machine learning and predictive analytics can prevent issues -Steps you can take to boost performance and availability "
Tags : 
    
Hewlett Packard Enterprise
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Published By: Lookout     Published Date: Dec 09, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
mobile security, device encryption, enterprise mobility management, integration, mobile indetity
    
Lookout
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!