respondents

Results 126 - 150 of 226Sort Results By: Published Date | Title | Company Name
By: Dell EMC     Published Date: Nov 04, 2016
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue. The impact of hyper-converged infrastructures on IT has been profound. In fact, 85% of respondents to a recent ESG survey already use or plan to use a hyper-converged solution in the coming months. Though that number appears high, it is not all that surprising. ESG also asked organizations to identify which factors drove them to deploy or considering deploying a hyper-conv
Tags : ubuntu, performance, windows, hyper-convergence
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : data, software-defined, hyper-convergence, hdd, sddc
     Dell EMC
By: Veritas     Published Date: Oct 03, 2016
A study, conducted by research firm Vanson Bourne, covering some 2,550 respondents across 22 countries, looks at the issues surrounding the phenomenon of the Databerg and uncovers how organizations throughout the globe are on track to waste more than $3.3tn by 2020. This report is a must-read for IT executives.
Tags : 
     Veritas
By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
     IBM
By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : ibm, security, maturity, c suite, cybersecurity, enterprise applications
     IBM
By: G/O Digital     Published Date: Sep 13, 2016
• Getting and staying in front of shoppers is key. 55 percent of respondents would be somewhat to very likely to click on a retargeted ad from a previous website they had visited. • Reviews make a difference to the consumer. Only 8 percent of respondents said online reviews never factor into their decision to purchase at a local retailer. • Relevant Facebook ads work for local retailers. Almost 1 in 2 respondents would be likely to click on a Facebook ad that aligns with their personal needs and interests.
Tags : retail consumers, local stores, consideration phase, repeat customers, consumer survey, social media, facebook ads
     G/O Digital
By: Polycom     Published Date: Sep 09, 2016
For decades, the predominant model for deploying voice technology was on premises. However, over the past five years, the opinion of cloud-based voice services, such as Office 365, has changed dramatically. Just five years ago, the majority of businesses either felt that cloud unified communication was not viable or were taking a wait and see approach. Today, the majority of respondents are planning a minor or major cloud UC purchase. For Microsoft customers, Skype for Business in Office 365 provides an excellent alternative to a traditional premises-based deployment.
Tags : 
     Polycom
By: Okta     Published Date: Jul 27, 2016
Most IT decision makers are struggling to master identity management in an infrastructure where modern cloud-based software must function with legacy on premise systems. According to a recent IDG Research study, 91 percent of respondents say solving this identity management conundrum is critical or very important to succeeding at their digital initiatives. And the vast majority of respondents long for a solution that is both efficient to manage and provides users and customers with an outstanding experience. This white paper examines how your peers are looking at digitizing their businesses, lowering the total cost of ownership, and building an identity management strategy to support their business’s goals.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : best practices, security, technology, next gen
     IBM
By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mobility is being approached by mid-market and enterprise organizations globally Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and Business leaders’ views, priorities and objectives align and differ • Building a global and local view from over 1400 respondents across 14 countries in every geography
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mid-market organizations globally are approaching mobility. Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and business leaders’ views, priorities, and objectives align and differ • Building a global and local view from over 1400 total respondents and over 570 who consider themselves mid-market, across 14 countries in every geography
Tags : 
     Cisco
By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : technology, security, best practices, solutions, network management, detection, protection
     Cyphort
By: SumTotal, a Skillsoft Company     Published Date: Jun 24, 2016
The Skillsoft Learning and Talent Maturity Framework™ is designed to help organizations chart a path to actualize a self-developing organization reality. The framework is based on observations of more than 6,700 organizations with 45 million employees. By taking the complimentary diagnostic, organizations can gauge their current maturity level across nine indicators. At the end of the diagnostic, respondents will receive a report with their current maturity results, as well as prescriptions for advancing to the next stage. As more HR teams resolve to leverage the insights of forward-looking practices and initiate action toward progress, the field itself will become a more indispensable partner to the business. It’s an exhilarating opportunity that simply must be seized.
Tags : best practices, business optimization, business management, organization, talent management
     SumTotal, a Skillsoft Company
By: Skillsoft     Published Date: Jun 23, 2016
The Skillsoft Learning and Talent Maturity Framework™ is designed to help organizations chart a path to actualize a self-developing organization reality. The framework is based on observations of more than 6,700 organizations with 45 million employees. By taking the complimentary diagnostic, organizations can gauge their current maturity level across nine indicators. At the end of the diagnostic, respondents will receive a report with their current maturity results, as well as prescriptions for advancing to the next stage. As more HR teams resolve to leverage the insights of forward-looking practices and initiate action toward progress, the field itself will become a more indispensable partner to the business. It’s an exhilarating opportunity that simply must be seized.
Tags : best practices, business optimization, business management, organization
     Skillsoft
By: BitStew     Published Date: Jun 23, 2016
If we examine the root cause of the IT organization’s pain, it continues to be the inability to integrate data from many disparate and operationally focused systems. A recent survey found that only 18% of the respondents had extensively integrated their analytics initiatives across operations and realized their objectives, which pointed to the diversity of datasets and formats and poor data quality. Indeed, data integration is causing the analytics burden to be placed on IT professionals. Download the white paper to learn more.
Tags : 
     BitStew
By: IBM     Published Date: Jun 13, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles. Competition is fierce and the power has clearly shifted from employers to the candidate. Today’s job candidates expect to be treated like consumers, and the most successful marketing teams know that consumers are increasingly suspicious of brands. These marketing teams implement strategies to foster trust and loyalty among their target audience. Just like marketers, recruiters must have the ability to not only attract but engage candidates as well, and they are tasked with fostering that same trust and loyalty among the candidates they hire as well as the ones they don’t. It’s not enough to just leverage the latest tools and implement trend-setting processes in the recruiting department. Recruiters must also live the employer brand every day. Living the brand encompasses demonstrating the EV
Tags : ibm, ibm smarter workforce, work trends, employee acquisition, recruiting, recruiters
     IBM
By: VMware AirWatch     Published Date: May 19, 2016
The mobile office is a reality in today’s world. According to the Philadelphia Business Journal, telecommuting has increased more than 73 percent since 2005, meaning a burgeoning number of employees are accessing corporate documents and data on their mobile devices. In a recent IDG Enterprise survey, 82 percent of respondents reported that at least some colleagues have completed tasks from mobile devices, whether those devices are managed or not.
Tags : technology, telecommuting, mobile data, mobile workforce, best practices
     VMware AirWatch
By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : black duck, application security, security, open source, code, enterprise applications
     Black Duck Software
By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : ibm, c-suite study, cybersecurity, security, enterprise applications
     IBM
By: SAS     Published Date: Mar 31, 2016
Analytics is more important to success than ever before, and it’s a business practice that has momentum. Fifty-eight percent of the respondents in a recent survey published in the MIT Sloan Management Review stated that the use of analytics gave their companies a competitive advantage, up from 37 percent the prior year. Enterprise-scale companies report dramatic successes with analytics.
Tags : analysis, development management, data management, business intelligence, best practices
     SAS
By: Oracle     Published Date: Mar 08, 2016
In this survey report, we analyze the goals and directions retailers are taking to deliver on the promise of omnichannel customer satisfaction. To that end, retail companies — including traditional retailers, wholesalers and hospitality/ restaurant businesses — are assessing each delivery channel as it provides overall value to omnichannel goals. Yes, the brick-and-mortar store continues to be the most prevalent selling channel for our survey respondents (86.8%) but online sites are in relatively equal standing (79.0%)
Tags : 
     Oracle
By: NetSuite     Published Date: Feb 17, 2016
Frost & Sullivan surveyed 1,500 senior executives (CEOs, CFOs, CIOs and other senior managers) in seven countries (Australia, Hong Kong, Japan, Philippines, Singapore, the UK and the US). Respondents spanned all major industry sectors, ranging from manufacturing to retail. The research shows that most executives not only agree that their industry is rapidly undergoing transformation, but that flexibility and adaptability are increasingly becoming key factors for survival.
Tags : industry change, retail, manufacturing, flexibility, adaptability
     NetSuite
By: Oracle     Published Date: Feb 10, 2016
Based upon the experiences of over 600 respondents, this report examines the importance of innovation management. Specifically, how successful companies systematize the fuzzy front-end of ideation to portfolio and execution processes to outperform their peers.
Tags : oracle, innovation management, best practices, execution process, successful leaderhip, it management, data management
     Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com