RSS feed Get our RSS feed

News by Topic

professional

Results 551 - 575 of 1277Sort Results By: Published Date | Title | Company Name
By: Workday     Published Date: Jul 30, 2019
Professional services automation (PSA) can empower your firm to respond quickly to new opportunities by automating critical processes and increasing visibility into capacity and capability.
Tags : 
     Workday
By: Workday     Published Date: Jul 30, 2019
In this report, Aberdeen Group explores the performance and capabilities of leading professional services firms to help you understand how PSA can help you better manage resources and inspire employees.
Tags : 
     Workday
By: Workday     Published Date: Jul 30, 2019
To help you find the PSA tools best suited for your firm, Forrester’s report “Now Tech: Professional Services Automation Tools, Q2 2018” separates vendors by size, functionality, geography, and vertical market focus.
Tags : 
     Workday
By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : security, tripwire, security management, security based management
     Tripwire
By: Aria Systems     Published Date: May 03, 2016
In Forrester’s 40-criteria evaluation of subscription billing platform solutions, we identified the eight most significant vendors in the category — Apttus, Aria Systems, Digital River, goTransverse, Recurly, SAP hybris, Vindicia, and Zuora — and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help eBusiness professionals select the right partner as they seek to develop and support alternative business models for both existing and new products and services.
Tags : 
     Aria Systems
By: LogRhythm     Published Date: Jan 24, 2013
An IANS Custom Report that details how and why SIEM tools today need to more intuitive and combine multiple functionality to help IT professionals detect and defend against today's more sophisticated threats.
Tags : blind spots, security intelligence, big data, analytics, big data analytics, custom report, security
     LogRhythm
By: Sponsored by HP     Published Date: Feb 26, 2013
Savvy IT professionals are finding that blade servers are less expensive than traditional rack servers for most new deployments, while also delivering improvements in agility, scalability and manageability.
Tags : blade servers, virtualization, network, storage, datacenter, cost of ownership, roi
     Sponsored by HP
By: ProfitBricks     Published Date: Jan 01, 2013
Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.
Tags : cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance
     ProfitBricks
By: Tripp Lite     Published Date: May 15, 2018
As organizations pursue improvements in reliability and energy efficiency, power design in data centers gets substantial attention—particularly from facilities and engineering personnel. At the same time, however, many IT professionals tend to spend little time or energy on the specific products they use to deliver and distribute electrical power. In?rack power is often considered less strategically important than which servers or databases to deploy, and it is often one of the last decisions to be made in the overall design of the data center. But choosing the right in-rack power solutions can save organizations from potentially crippling downtime and deliver significant up-front and ongoing savings through improved IT efficiency and data center infrastructure management.
Tags : 
     Tripp Lite
By: Adobe     Published Date: May 15, 2018
See your peers' biggest priorities, most important KPIs, and marketing spending for mobile devices and experiences. Between September and October 2017, Adobe surveyed close to 500 marketers and IT professionals to explore current mobile trends and priorities, get a glimpse of where they're going with their mobile efforts, and learn what the most advanced organizations are doing to create the next wave of transformative mobile experiences. Read our findings and see how mature your mobile strategies are in comparison to your peers'.
Tags : 
     Adobe
By: Adobe     Published Date: May 15, 2018
Mobile capabilities have grown up. Strategies should, too. Over the last ten years, smartphone usage among adults has grown to 95 percent. Surprisingly, 90 percent of marketers say they’ve only had a mobile strategy for five years or less. Read The Next Mobile Decade: Adobe 2018 Mobile Maturity Study, and learn: - How 500 marketing and IT professionals tackled mobile marketing last year - Which mobile strategies the most advanced organizations put into practice - What you can do to make your brand a mobile leader in the next decade Fill out the form to get the report
Tags : 
     Adobe
By: Adobe     Published Date: Oct 24, 2018
in our 24-criteria evaluation of experience optimization platform (EoP) providers, we identified the eight most significant ones — Adobe, dynamic Yield, Evergage, Monetate, optimizely, oracle, sAs, and sitespect — and researched, analyzed, and scored them. this report shows how each provider measures up and helps customer insights (Ci) professionals make the right choice.
Tags : 
     Adobe
By: Polycom     Published Date: Mar 13, 2015
The Dominion Group of Companies offers clients a wide range of professional services, including investment advising, trust services, wealth management, and insurance. Based in Virginia Beach, Virginia, the company has three main offices as well as independent affiliate offices in multiple locations throughout the United States. Dominion is a small but growing company, currently employing 40 people. A recent opportunity for expansion of the trust side of the business required Dominion to branch out from its Virginia Beach headquarters, opening an office in Florida and relocating one of the firm’s principals to that location. A top priority during that transition was maintaining effective communication, despite the distance, to limit any disruption to existing client services and workflows.
Tags : investment, security, financial transmission, profits, innovative technology, unified communication
     Polycom
By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
     Great Bay Software
By: Equinix     Published Date: Oct 20, 2015
In real estate, the most important factor is location, location, location! Your services are not quite as sensitive to the physical position of your technology, but location certainly can be a pivotal factor in optimizing your service design and service delivery. Ideally, location shouldn’t matter; however, it does have an e?ect on customer experience. When technology services were simpler, location was largely irrelevant, but now the complexity of new services demands a strategy more in line with your BT agenda than your former IT agenda. The e?ects of regulatory, cost, risk, and performance factors will vary based on the physical location of your technology resources. Colocation providers, cloud service providers, and even traditional hosting services o?er plenty of evolving options to help infrastructure and operations (I&O) professionals balance these factors to optimize service design and delivery.
Tags : data center, optimizing service, infrastructure and operations, service design and delivery, cloud service, hosting services
     Equinix
By: Acronis EMEA     Published Date: May 18, 2015
This book is a guide to modern data protection for IT professionals that covers the simplest file backup scenarios to comprehensive protection strategies for businesses with complex IT environments.
Tags : backup, data protection, data security, protection strategies, recovery, cloud computing, virtualization, backup types
     Acronis EMEA
By: Mimecast     Published Date: Jun 03, 2019
Knowing where to look and what to watch out for is half the battle. Download this report to understand the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them. Most importantly, you’ll walk away with actionable steps to improve your organization’s email security and cyber resilience. Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
Tags : 
     Mimecast
By: Pega     Published Date: Sep 11, 2015
This paper is intended for customer service professionals who are considering the next CRM application for their enterprises. It compares two popular solutions, Pegasystems’ Pega Customer Service and Salesforce.com’s Service Cloud, across five areas of functionality essential to meeting the complex customer service needs of the enterprise.
Tags : 
     Pega
By: Factiva     Published Date: Nov 13, 2015
No longer is it enough for knowledge centers to have highly-skilled information professionals providing the best, most authoritative information to clients. Now, you have to take a more strategic approach to the role of the knowledge center within your larger organization.
Tags : factiva, enterprise, mobile, knowledge center
     Factiva
By: HP Software     Published Date: Feb 02, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : security, bios, threat prevention, threat detection, malware, hacking
     HP Software
By: Workterra     Published Date: Nov 10, 2017
Mid-market HR today is being asked to be a business partner in areas that range from compliance to employee engagement. They need to be able to connect the dots among various sources of employee data to deliver better-informed business decisions to help achieve strategic goals. Connecting those dots and delivering those results demands more HR firepower and greater data visibility than the manual or homegrown processes and systems often used by mid-market organizations can deliver. On the other hand, most mid-market companies aren’t ready for the intricacies or expense of human capital management (HCM) systems designed for enterprise-level organizations. The answer for forward-thinking HR leaders who want to boost their team’s capabilities and play a greater role in their company’s future is having core HR functionality designed into an integrated benefits administration solution. Automated HR that delivers core HR features as part of its architecture — not as an afterthought or a separate, stand-alone module — gives HR leaders: • The tools they need to better handle their administrative work • The data and analytics necessary to better coordinate programs and more confidently make strategic decisions • A user experience that makes life easier for HR and employees
Tags : 
     Workterra
By: Genesys     Published Date: Jul 13, 2018
Ease, effectiveness and emotion drive great customer service, but top-line growth requires that application development and delivery (AD&D) professionals keep an eye on trends. Forrester Research has identified 10 customer service trends in 2018 for AD&D and others who support customer service. Before you strategize on improving your quality of service, read this Forrester Report by Vice President and Principal Analyst Kate Leggett. You’ll learn which investments are critical and the advantages of: • Focusing on context and inquiry type to deliver the best customer experience • Using automation and AI to uncover new revenue streams and transform operations • Exploring new labor models to maximize human connections in a digital world
Tags : 
     Genesys
By: Adobe     Published Date: Mar 08, 2017
This report, based on a survey of more than 2,000 digital marketers and ecommerce professionals in Asia Pacific, Europe and the US, explores the extent to which organisations are stepping up to the customer-centric approach.
Tags : adobe, survey, omnichannel, customer experience, customer experience management, customer-centric approach, marketing
     Adobe
By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
     CA Technologies EMEA
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics