perception it

Results 1 - 25 of 83Sort Results By: Published Date | Title | Company Name
By: Group M_IBM Q418     Published Date: Nov 13, 2018
Wherever an organization is in the world today, it relies on IT in its quest to drive revenues, improve profit margins, and service customers. Yet most small- to mid-sized businesses (SMBs) and government agencies select IT infrastructure solutions that drive higher costs and limit the business' ability to respond to changes in the marketplace. This is driven by perceptions that many IT executives running Linux and open source applications have regarding server platforms. Specifically, they erroneously believe that their best option is to execute the applications either on standalone or virtualized on x86 servers. RFG finds that there are 10 compelling reasons why an IBM LinuxONE solution is superior to an x86 one, including the fact that LinuxONE is a better, more economical choice.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q119     Published Date: Jan 18, 2019
Wherever an organization is in the world today, it relies on IT in its quest to drive revenues, improve profit margins, and service customers. Yet most small- to mid-sized businesses (SMBs) and government agencies select IT infrastructure solutions that drive higher costs and limit the business' ability to respond to changes in the marketplace. This is driven by perceptions that many IT executives running Linux and open source applications have regarding server platforms.
Tags : 
     Group M_IBM Q119
By: Microsoft Azure     Published Date: Apr 10, 2018
Prepare your business for the future of customer service. In a world where price and product can easily be matched, customer experience has become a key brand differentiator. It’s never been more important to understand customer expectations, perceptions, preferences, and trends. The 2017 Microsoft State of Global Customer Service report found that customer service impacts brand choice and loyalty for 96% of consumers around the globe. The 32-page report offers insights from 5,000 survey participants. Learn how you can stay ahead of the competition and earn customers for life with intelligent customer service. Find trend details and actionable data on: The growing importance of service in a customer’s choice of or loyalty to a brand The most important aspects of a good customer service experience The most frustrating aspects of a poor customer service experience Expectations of the millennial customer segment Channel preferences based on geography Customer expectations for self-serv
Tags : 
     Microsoft Azure
By: LogRhythm     Published Date: Jun 19, 2018
As uncertainties—cybersecurity and otherwise—swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions.
Tags : cybersecurity, survey, security, leaders, data, industry
     LogRhythm
By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
     Great Bay Software
By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
     Great Bay Software
By: Reputation.com     Published Date: Oct 02, 2017
The new year is underway, but your organization’s online reputation precedes you. It’s time to take a look at what’s influencing public perception to prepare for the year ahead. In this report, we examine four key trends guiding the direction of Online Reputation Management strategies in 2017, and provide recommendations for capitalizing on those trends moving forward.
Tags : 
     Reputation.com
By: Mitel     Published Date: Apr 07, 2017
Une solution hyperconnectée. Disponible 24 heures sur 24, 7 jours sur 7. Activée en permanence. Tous les acteurs économiques ont des opinions très différentes au sujet de l'environnement commercial actuel. Cependant, quelle que soit leur perception, la rapidité du monde des affaires actuel exerce une pression sans précédent sur les entreprises. La réussite ou l'échec de votre entreprise dépend de votre capacité à identifier les bonnes personnes, à communiquer, à accéder aux données et à échanger des informations rapidement.
Tags : 
     Mitel
By: Ahead     Published Date: Jun 05, 2019
Digital Requires a New Level of Insight and Control Digital strategies have caused business executives to intensify their scrutiny of how technology affects bottom line performance. With a growing emphasis on differentiating the customer experience in highly competitive markets, these executives want to understand how their IT systems affect everything from brand perception to customer acquisition and loyalty. 3 | A Guide to Intelligent Operations Meanwhile, those same demanding business leaders lack appreciation and patience for the complexity of today’s digital technology environment. While applications and user experiences are simpler and more intuitive, the backend processing, application interdependencies, and underlying infrastructure are more complex than ever, even in light of the benefits of abstraction, virtualization, and cloud computing (see Figure 1.) While CIOs have long been expected to improve stability and uptime - and done a pretty good job of it - the stakes are much
Tags : 
     Ahead
By: SmartBrief     Published Date: Apr 26, 2011
Find out the role that employment brands play in SmartBrief on Workforce readers' recruiting efforts, how top companies use their employment brand to attract top talent, and how recruiting strategies are changing.
Tags : smartbrief, recruiting report, employment brands, workforce, key talent, employment branding, recruiting climate, employment brand perception, employee reputation, recruitment strategy, staffing
     SmartBrief
By: Silverpop Engage B2B     Published Date: Mar 24, 2009
B2B marketers, like their B2C colleagues, have diligently worked at perfecting the art of shaping customer and prospect perceptions. They have years of experience developing precisely targeted communications comprised of finely tuned content directed at the specific audiences they want to influence. Traditional brand marketing requires the engineering of messages that engender the right impressions about the company’s products in the marketplace. The traditional art of branding has grown and flourished for many years. But that’s all begun to change.
Tags : silverpop b2b, b2b, engagement marketing, engagement marketing, online customer engagement, crm, push marketing, pull marketing, monitoring marketplace, uniform messaging, online engagement marketing, measuring engagement, marketing value
     Silverpop Engage B2B
By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
     Carbonite
By: SAS     Published Date: Jun 06, 2018
The Internet of Things (IoT) is rapidly emerging as a core transformational technology of the digital era. The ability to gather data from sensors embedded throughout an enterprise can drive insights and operational efficiencies from the supply chain to the customer. But IoT and Industrial IoT (IIoT) implementations require high degrees of IT/OT convergence - collaboration and integration between information technology and operational technology groups - to succeed. These two groups, however, often have different goals, performance metrics, and perspectives on both the collaboration and the outcome. This SAS/HPE-sponsored paper helps readers get a better understanding of the relationship, either real or perceived, between these two groups. Futurum Research surveyed the state of the relationship between IT and OT teams as it pertains to the design, implementation, and creation of value through IoT technologies.
Tags : 
     SAS
By: Kaspersky     Published Date: Feb 06, 2017
Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.
Tags : kaspersky, cyber crime, data loss, business security
     Kaspersky
By: ServiceNow     Published Date: Oct 18, 2013
To reach the customers of IT services, you have to abandon long-entrenched models of IT thinking & replace them with a customer-focused model that focuses on value, experience & context. Join the webinar to understand the issues internal customers face with IT, & see how IT can evolve from being the department of no to the department of now.
Tags : servicenow, enterprise it, service automation, applications, webinar, customer relationships, perception of it, change management, customer value, marketing it, it service management, service relationship management, evolution of service, applications, custom applications, it management
     ServiceNow
By: SAP     Published Date: Apr 13, 2011
Compliance and Traceability in Manufacturing has traditionally been viewed as "cost of business" but this perception is changing as automation and integration gains traction across industries. This report will benchmark the ways manufacturers are using compliance and traceability programs as a competitive advantage in the market place.
Tags : compliance, traceability, operational metrics, real-time visibility, technology integration, performance visibility, mes, qms, erp, pat, mature quality program
     SAP
By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
     Microsoft Office 365
By: Qualtrics     Published Date: Oct 02, 2018
Customer journey mapping is a major component of any customer experience program. Of course, a key part of mapping the customer experience includes identifying key moments of truth or moments of consumer brand interaction that shape brand perception and loyalty. In the digital age, many key moments of truth for your customers are happening online. This means that more and more of your consumers, brand perceptions and attitudes will be based on purely digital interactions (in-app, website, wearable tech, etc.). This has made understanding your customers’ digital interactions an essential part of any customer experience program. “It has been said that VOC programs without a web presence engage only 2% to 10% of those who interact with their website” (marketing sherpa). As we move into the future, this trend will continue. We know that mobile is an inherent part of today’s digital experience. Global mobile and tablet internet usage just exceeded desktop use for the first time (GS StatCoun
Tags : 
     Qualtrics
By: Kaon     Published Date: Jul 07, 2011
In this white paper, learn why the marketer's primary mission is to clarify that differentiation and how to find successful marketing tools and techniques to do just that.
Tags : kaon interactive, differentiation, competitive advantage, marketing challenge, perception, key product information, interactivity
     Kaon
By: Cisco     Published Date: Feb 23, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video
Tags : cloud computing, cisco, contact center, best practices, cloud network, data center
     Cisco
By: Cisco     Published Date: Dec 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact cen
Tags : 
     Cisco
By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
     Lookout
By: NetApp     Published Date: Nov 13, 2017
Are these misperceptions keeping you out of the cloud? Discover the advantages of cloud-integrated backup versus traditional approaches.
Tags : 
     NetApp
By: NetApp     Published Date: Jun 01, 2017
Are misperceptions preventing your company from taking advantage of the cloud? Discover why common objections to cloud backup are based on myths rather than reality.
Tags : netapp, database performance, flash storage, data management, cost challenges, cloud storage
     NetApp
By: NetApp     Published Date: Nov 13, 2017
Are misperceptions preventing your company from taking advantage of the cloud? Discover why common objections to cloud backup are based on myths rather than reality.
Tags : 
     NetApp
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com