respondents

Results 76 - 100 of 230Sort Results By: Published Date | Title | Company Name
By: Gomez IT     Published Date: May 24, 2011
In a recent global survey of 474 business and IT decision makers, conducted by IDC on behalf of Compuware, respondents offered insights about their needs for effective operation of Internet-enabled business activities.
Tags : gomez, compuware, web performance management, idc, slas, service level agreements, end-user experience, multi-device
     Gomez IT
By: Google     Published Date: Apr 30, 2018
"In a recent global survey conducted on behalf of Google Cloud in association with MIT SMR Custom Studio, respondents were asked: over the last two years, how has your overall confidence in the security of cloud applications and infrastructure changed? The response was encouraging. 74% of respondents have become more confident in cloud security. The age of unthinking fears about cloud security is over. Not only is cloud adoption rising steadily across geographies, industries and job functions, but confidence in cloud security is rising as well — to the point where increased security is a major reason enterprises opt for cloud solutions. Download this report and find out more."
Tags : 
     Google
By: Google     Published Date: Aug 23, 2018
"In a recent global survey conducted on behalf of Google Cloud in association with MIT SMR Custom Studio, respondents were asked: over the last two years, how has your overall confidence in the security of cloud applications and infrastructure changed? The response showed that 74% of respondents have become more confident in cloud security. Read this report and learn more about the measures organizations are taking to manage security across cloud platforms."
Tags : 
     Google
By: Google Apigee     Published Date: Feb 05, 2019
Application programming interfaces, or APIs, are the way software talks to other software—so by definition, they’re a technology that connects systems. Many enterprise leaders think of them primarily in these terms. For example, 57 percent of respondents to Google’s enterprise digital maturity assessment tool, Apigee Compass, characterize APIs as systems integration technology.
Tags : 
     Google Apigee
By: GoToWebinar     Published Date: Aug 02, 2011
This new white paper identifies strategies for maximizing your webinar program, uncovers key trends related to the benefits and use of webinars and provides valuable insights from survey respondents and other industry experts.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
     GoToWebinar
By: GoToWebinar     Published Date: Apr 06, 2011
This white paper identifies strategies for maximizing your webinar program, uncovers key trends related to the benefits and use of webinars and provides valuable insights from survey respondents and other industry experts.
Tags : citrix gotowebinar, webinars 2.0, web conferencing, citrix gotowebinar, social media, interactive engagement, web 2.0
     GoToWebinar
By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
The “Future of Identity” infographic provides highlights and surprising statistics from the "Future of Identity" study that revealed global and generational preferences and concerns on emergent sign-on methods. 3,997 respondents from the United States, European Union, and Asia Pacific regions weighed in.
Tags : 
     Group M_IBM Q4'19
By: Group M_IBM Q418     Published Date: Sep 24, 2018
Take a look at the IT ecosystem of any company today and there’s a good chance you’ll find it includes offerings from several cloud services providers. That’s certainly the case at mid- to large-sized companies with at least 500 employees, according to a recent survey conducted by IDG Research. The survey of 100 senior IT professionals found that 59% are already multi-cloud adopters — that is, using computing and storage services from two or more cloud providers. Another 31% of respondents say they plan to become multi-cloud organizations in the coming 12-24 months, with only 10% still in the “consideration” phase.
Tags : 
     Group M_IBM Q418
By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
We started with a simple question: What surprises have you experienced since you started deploying flash storage in your organization? Of course, surprises can be good or they can be bad, but we sought to understand what may have changed – and what’s not changed – since our survey respondents deployed flash storage into their environments. To that end, we asked 1,000 people to share with us their attitudes and experiences around storage. In this report, we will share with you what we learned and how you may be able to use this information to better inform your own path forward.
Tags : flash storage, information technology, survey report, employee satisfaction
     Hewlett Packard Enterprise
By: HP - Enterprise     Published Date: Jun 04, 2013
In the world of storage management, something looms large on the horizon: the cloud. The cloud impacts storage strategies whether you are moving your storage to the cloud, managing the on-premises storage of private cloud applications, or a combination. Many organizations already take advantage of cloud storage, but an even greater shift is on the way. In a recent survey, respondents forecasted increases in cloud storage as large as 75 percent.
Tags : cloud, storage growth, storage resource management, solutions
     HP - Enterprise
By: HPE     Published Date: Feb 11, 2015
According to ESG’s 2014 IT Spending Intentions Survey, improving data backup and recovery is the most often mentioned priority for midmarket organizations for the third year in a row. It is the third most frequently cited priority by enterprises and midmarket organizations overall. Additionally, business continuity and disaster recovery (BC/DR) also appear in the top-ten priority lists of both midmarket and enterprise respondents.
Tags : 
     HPE
By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : social media, social media analytics, marketing analytics, marketing data, crm, customer relationship management
     IBM
By: IBM     Published Date: Jul 13, 2012
Learn how respondents, including nearly 400 senior executives from some of the world's largest enterprises, are incorporating holistic business resilience planning into their businesses through top-level findings and case studies. Download the research report here.
Tags : ibm, technology, risk management, global technology, technology, risk study
     IBM
By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : social media, social media analytics, social media marketing, ibm, unica, crm, customer relationship management, top-line marketing strategy
     IBM
By: IBM     Published Date: Oct 17, 2014
According to a study from the Aberdeen Group, the number of companies starting initiatives for collaboration has doubled in the last two years. Their research indicates that collaborating with customers and collaborating with partners are both in the top five actions being taken by survey respondents.
Tags : internal collaboration, b2b collaboration, visibility, globalization, data management
     IBM
By: IBM     Published Date: Feb 03, 2015
This SlashGuide discusses the results of a recent Slashdot Media survey that looks at the challenges facing developers today, how the primary development target is evolving, and how strategies are changing to embrace public, private, and hybrid-Cloud models. Respondents to the survey were asked four questions regarding their challenges in development and their needs regarding infrastructure and PaaS. Here are the results.
Tags : hybrid cloud targets, multiple mobile platforms, slashdot media, primary development targeting, it management, enterprise applications, data management
     IBM
By: IBM     Published Date: Jan 06, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles.
Tags : competition, recruiter, engagement, acquisition team, marketing tactics
     IBM
By: IBM     Published Date: Jan 06, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles.
Tags : recruitment, recruitment marketing, critical role recruiting, human resources, talent attraction
     IBM
By: IBM     Published Date: Jun 13, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles. Competition is fierce and the power has clearly shifted from employers to the candidate. Today’s job candidates expect to be treated like consumers, and the most successful marketing teams know that consumers are increasingly suspicious of brands. These marketing teams implement strategies to foster trust and loyalty among their target audience. Just like marketers, recruiters must have the ability to not only attract but engage candidates as well, and they are tasked with fostering that same trust and loyalty among the candidates they hire as well as the ones they don’t. It’s not enough to just leverage the latest tools and implement trend-setting processes in the recruiting department. Recruiters must also live the employer brand every day. Living the brand encompasses demonstrating the EV
Tags : ibm, ibm smarter workforce, work trends, employee acquisition, recruiting, recruiters
     IBM
By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : ibm, c-suite study, cybersecurity, security, enterprise applications
     IBM
By: IBM     Published Date: Mar 29, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
     IBM
By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : best practices, security, technology, next gen
     IBM
By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
     IBM
By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : ibm, security, maturity, c suite, cybersecurity, enterprise applications
     IBM
By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : ibm, security, big fix, endpoint security, sans report, network security, enterprise applications
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com