it statistics

Results 1 - 25 of 74Sort Results By: Published Date | Title | Company Name
By: Adecco     Published Date: Sep 27, 2017
With the unemployment average decreasing across the nation and new jobs continually evolving, long-term growth projections are promising for the IT industry. As the tech industry booms, so does the tech job market. We took a deep dive into the latest annual job market data from Bureau of Labor Statistics to better understand how both the nation and the IT sector advanced and what this means for the future of tech.
Tags : 
     Adecco
By: AdMob     Published Date: Jul 20, 2009
Devices like the iPhone have made the mobile Internet a massively valuable new advertising medium, with a worldwide audience of 546 million consumers and 10 times higher brand awareness and 10 times higher click-through rates than online advertising. The mobile Internet is changing the face of advertising, and marketers must adapt to stay ahead of the competition. This White Paper is an introduction to mobile advertising and the key things marketers need to know to run successful mobile campaigns. What you'll learn: 1) The Basics: An introduction to mobile advertising; 2) Who you can reach: Demographics and statistics; 3) Spotlight on the iPhone: What it means for marketers; 4) Results you can expect with mobile advertising; 5) Case studies: Examples of Brand and Performance mobile campaigns; 6) What you need to know to extend your campaigns to mobile.
Tags : iphone, mobile, internet, pda, mobile phone, cpc, cost per click, blackberry
     AdMob
By: AtTask     Published Date: Feb 11, 2012
It really doesn't matter if you are leading an army into battle or a product into market, sometimes the best solutions seem counter-intuitive. The same is true with project management. This document will safeguard your success.
Tags : project management mistakes, project management failures, it project failures, project failure statistics, project failure reasons, project failure examples, reasons for project failure, project failure rates
     AtTask
By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
     Avi Networks
By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : security, business, cyber security
     Blue Coat Systems
By: Brightcove     Published Date: Sep 17, 2014
Internet users are spending more time than ever with digital video, and marketers have noticed. To help you stay on top of the latest trends in video content, eMarketer has curated a roundup of some of our latest coverage on the subject, including statistics, insights and interviews.
Tags : digital video, video content, digital video trends
     Brightcove
By: CA Technologies EMEA     Published Date: May 25, 2018
The APM market is one of the largest subsegments of the IT operations management market, with 2016 revenue of approximately $3.7 billion and a growth rate exceeding 18% over the prior year. Given these statistics, it is no surprise that Gartner observes continuing investment. Interestingly, while Gartner has observed many new startups appearing on the radar screen, we've also seen large software organizations such as CA Technologies, IBM, Oracle and Microsoft (re)investing at the same time. Other non-APM companies are also expressing potential interest in the market — almost all of the current APM suite providers expect to see companies like Google and Amazon boost their primarily infrastructure monitoring capabilities with increased support for application visibility. Yet these (and other large) cloud companies will pose another challenge for the traditional APM players — the battle for talent acquisition. There is some concern within the APM market that highly skilled individuals may
Tags : ca technologies, monitoring, programs, applications
     CA Technologies EMEA
By: Dell     Published Date: May 09, 2017
Productivity has become synonymous with revenue for many organizations. The theory is simple: The more your employees can get done, the more income they can generate. And yet data from the Bureau of Labor Statistics shows that the productivity level in the United States is actually fairly low, topping out at 3.1% in one quarter and going into negative digits in others over the past few years.1 This means labor productivity, measured in output per hour of labor, is low or—in many quarters—shrinking. Download this white paper from Dell and Intel® to learn more. Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
     Dell
By: Dell EMC     Published Date: Oct 10, 2019
Security leaders have been in front of boards and executive committees long enough to know that security metrics that simply portray statistics from monitoring tools, or count the number of malware attacks, add relatively little value to strategy and budget decisions. Protecting sensitive customer and company data shouldn’t be just a compliance obligation, it should be a business imperative. This is exactly why the right technology partners will help push security, risk, and compliance objectives forward. In March 2019, Dell commissioned Forrester Consulting to evaluate the evolving security trends and technology needed to protect and enable employees. Our study found that empowering employees while adhering to security protocols improves employee productivity. Forrester conducted an online survey of 887 senior business and IT decision makers to explore this topic. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC
By: Dell Storage     Published Date: Apr 21, 2011
Enterprise Manager provides a single storage resource management (SRM) interface for one or more Compellent SANs. The software also integrates with VMware vCenter to enhance server and storage visibility and manageability. This demo video shows how to use Enterprise Manager to collect VM host and guest storage statistics from vCenter, create, map and rescan storage volumes, and then format the volumes with VMFS to create datastores or assign the volumes as RDMs to a virtual machine. (3 min)
Tags : dell compellent, vcenter integration, compellent enterprise manager, storage resource management, srm, vmware vcenter, server, storage
     Dell Storage
By: DNN Corp.     Published Date: May 14, 2014
What do the most valuable online communities have in common? Research from The Community Roundtable says deeper engagement, ability to measure impact, and seeking external guidance are key. Download now for essential statistics and best practices for building a top-performing community that delivers business results.
Tags : dnn, online communities, marketing communities, community management, email marketing
     DNN Corp.
By: DocuSign     Published Date: Jul 12, 2019
If you’re in charge of your company’s recruiting and onboarding, you know that attracting and retaining top talent is more difficult than ever. This is no surprise: Job seekers have an abundant choice of employers. According to the U.S. Bureau of Labor Statistics, today there are fewer unemployed Americans (6.2 million)1 than there are available jobs (7.6 million).2 In order to attract top talent, companies need modern, sophisticated—and digital— recruiting and onboarding processes. Millennials, who now make up the majority of the workforce, and Gen Z are digital natives who expect their work environments to reflect a hyper-connected world.3 In a Microsoft survey, 93 percent of millennials said that the latest technology was important to them when choosing an employer.4 However, despite the increasing need for digitization in recruiting and onboarding, many companies still have highly manual processes and legacy systems of agreement. Consequently, HR staff slogs through hours using ana
Tags : 
     DocuSign
By: Entrust Datacard     Published Date: Jun 09, 2017
Security professionals attribute more than 63% of confirmed breaches to weak, default or stolen passwords. Analysts say more than 80% of all confirmed breaches involve privileged credentials. And the average cost of a data breach totals more than $3.8M. Almost every story reporting statistics like these concludes with “the password is dead.” The world clearly must move on from passwords in the battle to protect data – or at least attempt to phase them out.
Tags : 
     Entrust Datacard
By: Esker     Published Date: Jun 29, 2015
Read the new independent research report from Ardent Partners, ePayables 2015: State of the Market Report. Drawing on the feedback of hundreds of AP and finance professionals, this unique report offers a comprehensive snapshot into what’s happening in AP, including insights on: • How the role of AP is continuously evolving • Key drivers that shape AP leaders’ plans and priorities • How automation technology is impacting AP • Operational benchmark statistics and recommended strategies
Tags : epayables, accounts payable, exception-handling, root cause analysis, ap operations, ap strategy
     Esker
By: Esker     Published Date: Jul 09, 2019
Digital transformation of P2P processes doesn’t just mean using the latest technology to check boxes or implementing automation for automation’s sake. Rather, it is a philosophy that drives action and brings new levels of speed and efficiency to businesses that choose to embrace it.This 2019 Levvel Research report is equipped with valuable insights and powerful statistics about the digital transformation of P2P cycles and will guide you through topics including: Current P2P practices & where they fall short The evolving state of procurement and AP culture, identity & technology Features & benefits of P2P software solutions
Tags : 
     Esker
By: FICO EMEA     Published Date: Aug 30, 2019
Fraud is a serious concern for the communications industry, with proceeds and services used by organised crime and terrorist networks. Whilst reliable statistics are difficult to come by, industry association Communications Fraud Control Association (CFCA) estimates the total global fraud loss at around $29bn annually. Of this, over $7bn is attributed to subscription fraud and account takeover. In an industry which is undergoing widespread digital transformation to streamline customer journeys and reduce operating costs through automation, preventing fraud is critical. Learn More
Tags : telecom subscription fraud, prevent fraud, fight fraud
     FICO EMEA
By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : software, vulnerability, intelligence, data, statistics, application, attacks, action strategy
     Flexera
By: Globoforce     Published Date: Aug 02, 2012
How do you pitch recognition to senior management? Download the guide now and use it to show executives what strategic recognition can do for your company's bottom line. Employee recognition works. But how do you pitch it to your senior managers? Speak their language by talking about the cold, hard numbers. Show them the link between recognition and quantifiable business records. This guide shows five ways strategic recognition impacts the bottom line - supported by industry studies and statistics.
Tags : globoforce, technology, business, strategic recognition, recognition, employee recognition, industry strategies, statistics
     Globoforce
By: GoToMeeting     Published Date: Apr 05, 2011
The purpose of this paper is to quantify the benefits of workshifting -- specifically working from home -- has for employers, employees, and the community.
Tags : citrix gotomeeting, telecommunting, travel, commuter, interview, telecommuting, telecommute, telework
     GoToMeeting
By: GoToMeeting     Published Date: Apr 07, 2010
The purpose of this paper is to quantify the benefits of workshifting -- specifically working from home -- has for employers, employees, and the community.
Tags : citrix gotomeeting, telecommunting, travel, commuter, interview, telecommuting, telecommute, telework
     GoToMeeting
By: GoToMyPC     Published Date: Apr 05, 2011
The purpose of this whitepaper is to quantify the benefits of workshifting -- specifically working from home -- has for employers, employees, and the community.
Tags : citrix gotomeeting, telecommunting, travel, commuter, interview, telecommuting, telecommute, telework
     GoToMyPC
By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
The “Future of Identity” infographic provides highlights and surprising statistics from the "Future of Identity" study that revealed global and generational preferences and concerns on emergent sign-on methods. 3,997 respondents from the United States, European Union, and Asia Pacific regions weighed in.
Tags : 
     Group M_IBM Q4'19
By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : technology, mapping, location data
     HERE Technologies
By: HotSchedules     Published Date: Apr 25, 2018
Successful restaurants know just how important a solid inventory management process is to delivering a great product and experience. Even so, many restaurants today still struggle with ordering the right amount of inventory. Statistics show that restaurants waste about 10% of their food product, that’s money literally thrown in the trash! There’s only so much time in a manager’s day to manually deal with all of it. This ebook will explore the exciting new frontier of intelligent restaurant operating platforms, and how modern inventory management systems can make the process easier and more successful for your managers.
Tags : 
     HotSchedules
By: IBM     Published Date: Jun 02, 2009
Linux reliability has come of age. Several major Linux distributions including Novell SUSE, Red Hat Enterprise Linux and Ubuntu scored high in reliability, improved over 2006 uptime statistics and achieved near parity with Unix distributions. Security incidents plagued Windows Server 2003, which saw uptime decrease by roughly 10% during last year. Corporations must continue to adhere to best practices in configuration, management and security to ensure optimal server operating system and application reliability.
Tags : reliability, uptime, performance, management, service-level agreement, sla, compliance, linux
     IBM
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com