RSS feed Get our RSS feed

News by Topic

business

Results 251 - 275 of 14133Sort Results By: Published Date | Title | Company Name
By: Adecco     Published Date: Oct 02, 2017
Great creative and marketing teams are made up of smart, agile and motivated people who are tech savvy and innovative. People who never stop learning, take risks and deliver incredible work. Our 2018 Salary Guide provides the most accurate data you need to recruit, retain and pay these talented professionals. We hope this year’s Salary Guide will give you an edge as you align your business with the right creative and marketing talent.
Tags : 
     Adecco
By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
     Fortinet EMEA
By: Ahead     Published Date: Nov 30, 2018
Over the past seven years, we’ve surveyed more than 30,000 technical professionals around the world to explore the relationships between IT performance, DevOps practices, culture, organizational performance and other elements that affect business outcomes. In the process, we’ve built the deepest and most widely referenced body of DevOps research available. The 2018 State of DevOps Report breaks new ground in our understanding of the DevOps evolutionary journey. We have identified the five distinct stages of DevOps evolution, and the critical practices at each stage that help you achieve success and progress to the next phase of your journey.
Tags : 
     Ahead
By: WorkWave     Published Date: Apr 18, 2019
Whether you are focusing on growth, customer satisfaction, or are looking to free up your time – your end goal should be finding a pest control software solution that drives smarter business decisions. In order to find the right solution you’ll have to review your current software and processes, define your goals, and evaluate and compare your options. Choosing the right pest control software is crucial to reach your end goal. This guide will help you determine whether your existing software solution (if you have one) offers everything you need to make smarter business decisions.
Tags : 
     WorkWave
By: Adobe     Published Date: Jun 26, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. Key topics that you’ll read more about in this year’s report: • Optimising customer experience and delivering personalised experiences in real time. • Using data better for smarter audience segmentation and targeting. • Be wary of walled gardens. Control and own the data, and always be compliant. • Automation is the future. Understand the benefits, learn how to use it.
Tags : 
     Adobe
By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
     Experian
By: Anaplan     Published Date: Sep 07, 2018
Sie können sich sicherlich noch an den Planungsprozess der letzten Jahre erinnern. An die vielen Spreadsheets, die vielen Überstunden und die Tatsache, dass die Pläne der verschiedenen Unternehmensbereiche und Abteilungen nicht wirklich miteinander vernetzt waren. Lesen Sie nach, warum Sie sich nicht mehr auf altmodische, unübersichtliche und überkomplizierte Spreadsheets verlassen sollten, wenn es um Ihre Planung geht. Anaplan wurde in der Studie “The Planning Survey 2017” von BARC in 21 von insgesamt 31 Bewertungskategorien auf den 1. Platz gewählt. In den übrigen 10 Kategorien hat Anaplan den 2. Platz erreicht – zum Teil weit vor den anderen Mitbewerbern. Speziell in den Kategorien “business benefits”, “planning functionality”, integrated planning” und “flexibility” konnte Anaplan durch erste Plätze überzeugen. Laden Sie sich Ihr persönliches Exemplar der Studie herunter und lesen Sie selbst nach, warum Anaplan so herausragende Ergebnisse bei den Anwendern erzielen konnte.
Tags : 
     Anaplan
By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
     Carbonite
By: IBM Business Analytics     Published Date: Jun 23, 2011
Companies globally must determine the approach to compliance with mandated use of XBRL and significantly accelerating financial reporting. Here are 23 reasons to why an integrated approach towards external reporting is required by organizations today.
Tags : ibm business analytics, integrated xbrl tagging, extensible business reporting language, bolt-on, tag once, taxonomy collaboration, validation, xhtml
     IBM Business Analytics
By: Intel     Published Date: Apr 15, 2019
There’s never been a more urgent need for comprehensive security and surveillance solutions. GeoVision Inc. has built its business on helping meet this need, providing digital and networked video surveillance solutions to customers in 110 countries. To succeed in its highly competitive and fast-changing industry, GeoVision must always be on the lookout for ways to give its customers leading-edge performance. Find out how GeoVision is working closely with Intel to maximize the performance of the hardware using the tools in Intel® System Studio, a comprehensive development tool suite to optimize the computer vision and deep learning workloads.
Tags : 
     Intel
By: Salesforce Pardot     Published Date: Sep 09, 2014
From social selling to personalized sales messages, the tips on the following pages will help your sales reps prioritize the automation features that they’ll find the most useful. Understand the benefits for the different types of sales team members, including Business Development Reps (or cold-callers), Account Executives, and Sales Managers — then get ready to put what you’ve learned into practice!
Tags : marketing automation, marketing team, sales team, b2b, lead nurture, lead qualification, social data, selling process
     Salesforce Pardot
By: Salesforce     Published Date: Nov 09, 2018
The pillars that are driving a superior customer service experience are changing. It used to be that just answering a customer’s question correctly and in a somewhat timely manner would cut it — but in 2016 that’s not so. Your customers carry more devices, and are more connected, informed and empowered. Today’s ultra-smart customer demands connected, seamless interactions, experiences where they can choose the service that best suits their needs and consistently offers personalized journeys across all devices. More often than not, the future of business success often depends on whether companies can deliver on those expectations.
Tags : 
     Salesforce
By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2015
When evaluating which app and desktop virtualization solution you should adopt, it is important to start your comparison using information you can trust. Learn how 3 companies benefited from true mobility and IT efficiency with Citrix Desktop Virtualization.
Tags : citrix, desktop virtualization, vmware, efficiency, virtualization, mobile computing
     Citrix Systems
By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn 3 critical legacy application evaluation activities to ensure cloud migration success. Activity #1: Determine if there is a cost justification Activity #2: Conduct a cloud readiness study to better understand the business and technical factors Activity #3: Conduct a pre- and post-migration study to understand how the app will behave in the cloud
Tags : legacy application evaluation, cloud migration, cloud readiness, mobile, security
     Riverbed
By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
As humans, we are driven to find ways of making an increasingly complex world simpler. For both customer and marketing leaders - technology helps us to do that. For marketers particularly in Financial Services, the focus shifts from a supply-led, to a demand-led economy; the trust economy, where customer demands continue to diversify and the fastest to deliver value wins.
Tags : 
     INT_AstuteIT_ABM_DoubleTouch_BENELUX
By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware
     Dell
By: IBM     Published Date: Mar 13, 2014
3 factors are needed by an infrastructure to optimize cloud performance, this eBook shows how IBM System x uses all 3 to increase business agility and reduce costs.
Tags : ibm, server design, memory, processor, software, processing power, data, cloud performance
     IBM
By: Viavi Solutions     Published Date: Apr 01, 2015
Ready to effectively monitor in the cloud? It’s time to go beyond vendor provided data and establish performance metrics and baselines that matter. The 3 Key Cloud Monitoring Metrics IT Brief helps you identify cloud monitoring challenges while providing the strategies to succeed.
Tags : cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics
     Viavi Solutions
By: Hyland Software     Published Date: Dec 17, 2013
Businesses are discovering how to create efficiencies and meet constantly evolving business needs with an enterprise content management (ECM) solution. Make ECM work for your organization by researching best practices and knowing your options.
Tags : emc, enterprise content management, emc solution, automated processing, workflow, integration, emc strategy, onbase
     Hyland Software
By: OnBase by Hyland     Published Date: Jun 09, 2015
You’ve determined how ECM can help your organization automate manual tasks, improve workflows and eliminate paper-based processes. Next is developing an ECM solution based on your business needs.
Tags : enterprise content management, ecm, automation, workflow, paperless
     OnBase by Hyland
By: White Horse     Published Date: Mar 24, 2010
Poorly run Web site redesign RFPs are costing B2B companies significant time and budget. Get your RFP process off to the right start using proven framework that provides critical insight on a vendor's core capabilities and creativity relative to your business needs.
Tags : white horse, b2b, redesign, rfps, b3b, scope, purpose, template
     White Horse
By: Datto Inc.     Published Date: Jan 31, 2013
This IT solutions provider’s experience with enterprise storage vendors taught his one thing; you can’t cram an enterprise storage solution into a small to midsize business.
Tags : backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
     Datto Inc.
By: Kindred Hospital Rehabilitation Services     Published Date: Aug 26, 2019
Research has demonstrated enhanced technology can improve communication between patients, families and care providers, improve motivation, and has the potential to effect better outcomes and higher levels of patient satisfaction. Additionally, better technology also makes the workplace more appealing to employees. With the investment and complexity involved, how can health systems utilize technology in the most efficient and effective ways to drive business results?
Tags : 
     Kindred Hospital Rehabilitation Services
By: Akamai Technologies     Published Date: Jun 27, 2017
Traditional remote access technologies were created twenty-years ago, before businesses were distributed, mobile, and users of cloud. View this slideshare to learn 3 reasons why now is the time for a new remote access model.
Tags : 
     Akamai Technologies
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics