research now

Results 126 - 150 of 188Sort Results By: Published Date | Title | Company Name
By: Carbonite     Published Date: Feb 22, 2017
Download Research Now’s summary to see how competing cloud backup providers stack up against one another in business customer satisfaction.
Tags : backup and recovery, backup survey, business backup, computer backup, cloud backup, cloud recovery, data backup, data recovery
     Carbonite
By: PwC     Published Date: Aug 27, 2019
Six hours a day. According to research, that’s how much of a lawyer’s time, on average, is spent on administrative tasks or new client development (sound familiar?). Fortunately, technology and the data it generates can help you streamline systems and processes — and reveal important insights about your firm. But what tools should you use? How should you implement them? We’ve got the answers. Our guide outlines what you need to know when leveraging technology to reduce admin inefficiencies and, better yet, increase cash flow. You’ll learn how to identify what metrics matter most to your practice: like billable hours, profitability by client and hiring decisions. It also spotlights helpful tools, like PwC’s InsightsOfficer, that turn data into insights, impacting your firm’s performance.
Tags : 
     PwC
By: Oracle     Published Date: Feb 10, 2016
There is little question that cloud is well established as a way to deliver business applications. Based on IDC research, over 70% of manufacturing companies are using hosted applications somewhere within their supply chain, with another 25% considering it. The most popular supply chain management (SCM) application areas are transportation related (transportation management, global trade management), where the "network effect" (i.e., carrier pooling, regulatory impact) can leverage both shared knowledge and existing connectivity along with sales and operations planning, demand signal management, and business intelligence/analytics. The concern that cloud is "risky" is increasingly taking a back seat to the perceived benefits of the technology. Indeed, those benefits, both achieved and anticipated, are significant, including cost, speed of implementation, and the ability to "consume" new capabilities and functionality easily and transparently.
Tags : oracle, supply chain cloud, supply chain best practices, idc research, it management, data management
     Oracle
By: Aberdeen Group     Published Date: Sep 06, 2011
This Aberdeen Group research shows why you should be looking more closely right now at secure/managed file transfer solutions.
Tags : aberdeen, secure / managed file transfer, file transfer, collaboration, copy and carry, ftp, dropbox, sftp
     Aberdeen Group
By: IBM     Published Date: Jan 10, 2014
Building an effective sales team starts with hiring the best talent and then making them productive as quickly as possible.
Tags : social collaboration, social networking, social business, communication, social media, mobile, bid data, cloud
     IBM
By: Marketo, INC.     Published Date: Sep 25, 2008
In this free 15-minute podcast, Laura Ramos of Forrester Research explains how B2B marketers can leverage Web 2.0.  Listen at your desk or on the road and discover: how to enhance marketing ROI by driving real engagement and dialog ... how to reach key decision-makers ... reasons behind the move from demand generation toward more organic demand management ... and more.  Understanding Web 2.0 tactics is a must for B2B marketers who want to compete.  Find out why; listen to this free podcast now.
Tags : using digital, promo code: wp2, marketing, b2b marketing, social marketing, social networks, social networking, interactive direct marketing
     Marketo, INC.
By: Bazaarvoice     Published Date: Apr 30, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research “7 Ways the Mobile Consumer Changes Everything” now.
Tags : bazaarvoice, mobile consumer, mobile purchases, digital sales, mobile shppers, online reviews, retailers
     Bazaarvoice
By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research “7 Ways the Mobile Consumer Changes Everything” now.
Tags : bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers
     Bazaarvoice
By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications
     Intralinks
By: Cisco Systems     Published Date: Dec 23, 2013
Are you ready to leverage the flexibility and power of mobile and cloud computing? ZK Research outlines the limitations of legacy WANs and provides recommendations for transforming your network into a strategic asset. See why the Cisco ISR 4451-AX is your building block for evolving the WAN. Read Now
Tags : cisco, zk research, wan, virtualization, data center, wireless network, wide area network, network-centric
     Cisco Systems
By: Oracle     Published Date: Apr 22, 2014
A 2013 global research findings report on what service managers need to know to drive the cloud.
Tags : cloud, cloud applications, service managers, oracle
     Oracle
By: Polycom     Published Date: Sep 24, 2014
Microsoft Lync is transforming enterprise communications. A 2013 ZK Research study shows that 43 percent of organizations have deployed Lync in at least part of their organization, with another 17 percent of organizations planning to do so in the next 12 months. If you’re in this group of organizations that have deployed Lync, you probably deployed instant messaging (IM) and presence. Now that Lync IM and presence has been running for a while, you’re thinking about taking the next step with Lync Enterprise Voice.
Tags : investment, voice, maximize, organization, deployed, research, lync, transforming
     Polycom
By: SAP     Published Date: Feb 10, 2011
Prompted by volatile markets and a troubled economy, the need to contain or reduce costs is key for small to medium size enterprises (SMEs). In the pursuit of cost reductions and in the struggle to sustain and grow revenue and profits it becomes more and more important to preserve the level of visibility that becomes elusive as SMEs grow in both size and complexity. Download this research now to learn more.
Tags : sap, business intelligence, erp, sme, shipping, transportation, enterprise applications
     SAP
By: SAP     Published Date: Feb 10, 2011
Tap directly into the findings of an exclusive survey by IDG Research and Sybase with this new white paper that define the current state of mobility. More importantly it underscores specific ways IT can and should behave to proactively deal with the fast-developing world of enterprise mobility. Download it now to learn more about how the "Consumerization of IT" presents a wealth of business opportunities for IT management.
Tags : sap, mobility, competitive edge, greenfield, enterprise mobility, mobile, applications, iphone
     SAP
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : cylance, endpoint, protection, cyber, security
     BlackBerry Cylance
By: Schneider Electric     Published Date: Jun 04, 2014
While many who invest in Data Center Infrastructure Management (DCIM) software benefit greatly, some do not. Research has revealed a number of pitfalls that end users should avoid when evaluating and implementing DCIM solutions. Choosing an inappropriate solution, relying on inadequate processes, and a lack of commitment / ownership / knowledge can each undermine a chosen toolset’s ability to deliver the value it was designed to provide. This paper describes these common pitfalls and provides practical guidance on how to avoid them.
Tags : schneider, electric, dcim, solution, invest, infrastructure, management, software
     Schneider Electric
By: Bazaarvoice     Published Date: Aug 01, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research “7 Ways the Mobile Consumer Changes Everything” now.
Tags : bazaarvoice, web content, mobile, consumers, research, shoppers
     Bazaarvoice
By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : on-the-job training, it professionals, cyber security services, security programs, security
     Symantec
By: Coveo     Published Date: Nov 13, 2013
Where does a $5.5 billion technology company with 15,000 employees and a $1 billion annual R&D spend turn for a more effective way to tap existing research & engineering knowledge and avoid duplicating work? Harris Corporation turned to Coveo. read this case study to learn how Harris has improved productivity, communications and innovation.
Tags : advanced enterprise search, increasing productivity, knowledge assets, unified enterprise search, enterprise search solutions
     Coveo
By: Avalara     Published Date: Jan 28, 2014
Sales tax compliance and the CFO: What automation means for risk management conveys why it’s time C-level executives should take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance — and, more importantly — what the accounting and finance professionals in the trenches are doing to safeguard their organizations from potential audits and accounting pitfalls. Download this White Paper for more information.
Tags : sales tax, tax liability, internet sales tax, best practices
     Avalara
By: Movable Ink     Published Date: Apr 09, 2015
The latest research shows that two-thirds of email opens now occur on mobile devices, but many email marketers are still acting like their customers are reading email from a computer, at home. It’s time to take email marketing to the next level with effective mobile email marketing campaigns! Watch the webcast for nine easy ways to get started with responsive email campaigns today.
Tags : email marketing, contextual marketing, responsive email campaigns, responsive email, mobile email, responsive email examples, email marketing webinar, email marketing webcast
     Movable Ink
By: IBM     Published Date: Nov 14, 2014
A recent study completed by Ventana Research found that 68% of companies are using predictive analytics to gain a competitive edge. Find out more now, and learn how predictive analytics can help you.
Tags : ibm, ventana, deployment, predictive analytics, forecasting, accessing data, business management, data management
     IBM
By: IBM     Published Date: Feb 24, 2015
Read this report from Forrester Research to learnhow IBM ACM solutions improve the efficiency of knowledge workers, integrate with analytics to create upselling and cross-selling opportunities and reduce the cost and risk of regulatory fines through increased audit consistency.
Tags : ibm, acm solutions, cross-selling opportunities, audit consistency, it management, enterprise applications
     IBM
By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : ibm, it security, vulnerability management, virus protection, spyware protection
     IBM
By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : ibm, ibm x force, threat intelligence, data protection, ibm security, security
     IBM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com