RSS feed Get our RSS feed

News by Topic

respondents

Results 1 - 25 of 129Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Mar 21, 2017
The 2017 Digital Trends in Retail report is based on a sample of almost 500 retail respondents who were among more than 14,000 digital professionals taking part in the annual Digital Trends survey carried out in November and December 2016.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 21, 2017
The 2017 Digital Trends in Financial Services and Insurance report is based on a sample of almost 850 FSI respondents1 who were among more than 14,000 digital professionals taking part in the annual Digital Trends survey carried out in November and December 2016.
Tags : 
     Adobe
By: IBM     Published Date: Mar 30, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
     IBM
By: Mimecast     Published Date: Apr 18, 2017
Mimecast research finds that Office 365 adoption is growing quickly around the globe with 87% of respondents already using Exchange Online or planning to use it within the next twelve months. The survey also finds that email is an important communication channel with over 85% viewing email as critical to the organization. Whether your organization is already on Office 365, executing or planning a migration, this report reveals insights that can help make email more secure and resilient.
Tags : mimecast, office 365. email communication, email security, client communication
     Mimecast
By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : cloud, cloud computing, hybrid environment
     F5 Networks Inc
By: Amazon Web Services     Published Date: Jun 02, 2017
Read the IDG Research whitepaper to see why 54% of respondents plan to adopt and use AWS to help them execute their cloud strategies. Learn how AWS can help you: - Increase business agility - Rapidly deploy and scale new business applications - Reduce total cost of ownership (TCO)
Tags : cloud, cloud computing, business agility, business applications, microsoft, microsoft apps, aws, amazon web service
     Amazon Web Services
By: Palo Alto Networks     Published Date: Apr 25, 2017
SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? 2. What measures not necessarily implemented do respondents consider preventive? 3. What barriers have stopped respondents from doing what they should be doing?
Tags : 
     Palo Alto Networks
By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
     IBM
By: Neolane, Inc.     Published Date: Nov 17, 2010
Marketing is evolving and B2B Marketers that fail to embrace this change will become irrelevant. While shocking to some, this perspective is not new; it's simply becoming increasingly apparent to the B2B marketing community.
Tags : neolane, b2b, marketing, sirius, analytics, sales 2.1, tlbm, respondents
     Neolane, Inc.
By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
     SAP
By: SAP     Published Date: Nov 17, 2016
Culture has become one of the most important business topics of 2016. CEOs and HR leaders now recognize that culture drives people's behavior, innovation, and customer service: 82 percent of survey respondents believe that "culture is a potential competitive advantage." Knowing that leadership behavior and reward systems directly impact organizational performance, customer service, employee engagement, and retention, leading companies are using data and behavioral information to manage and influence their culture.
Tags : sap, human resources, employee, deloitte, culture
     SAP
By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mobility is being approached by mid-market and enterprise organizations globally Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and Business leaders’ views, priorities and objectives align and differ • Building a global and local view from over 1400 respondents across 14 countries in every geography
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mid-market organizations globally are approaching mobility. Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and business leaders’ views, priorities, and objectives align and differ • Building a global and local view from over 1400 total respondents and over 570 who consider themselves mid-market, across 14 countries in every geography
Tags : 
     Cisco
By: HPE     Published Date: Feb 11, 2015
According to ESG’s 2014 IT Spending Intentions Survey, improving data backup and recovery is the most often mentioned priority for midmarket organizations for the third year in a row. It is the third most frequently cited priority by enterprises and midmarket organizations overall. Additionally, business continuity and disaster recovery (BC/DR) also appear in the top-ten priority lists of both midmarket and enterprise respondents.
Tags : 
     HPE
By: VMware AirWatch®     Published Date: Feb 24, 2017
The VMware 2016 State of the Digital Workspace Report was performed in July 2016 and is a study that examined digital workspace adoption among global organizations across industries. Data represents a survey of 1,263 business decision makers (BDMs) and IT influencers to examine the worldwide progress in transitioning from the client-server era to the mobile-cloud era. Respondents acknowledged that game-changing IT relies on organizations adopting a digital workspace that includes security and identify management as vital components. With realistic prospects of achieving astounding return on investment (ROI), even businesses that cited obstacles to adoption may want to consider taking another look at business mobility initiatives.
Tags : 
     VMware AirWatch®
By: Dell EMC     Published Date: Nov 04, 2016
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue. The impact of hyper-converged infrastructures on IT has been profound. In fact, 85% of respondents to a recent ESG survey already use or plan to use a hyper-converged solution in the coming months. Though that number appears high, it is not all that surprising. ESG also asked organizations to identify which factors drove them to deploy or considering deploying a hyper-conv
Tags : ubuntu, performance, windows, hyper-convergence
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : data, software-defined, hyper-convergence, hdd, sddc
     Dell EMC
By: CA Technologies     Published Date: Jan 09, 2015
This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.
Tags : byod, identity, byoid benefits
     CA Technologies
By: Dell EMC     Published Date: Feb 23, 2017
In ESG research conducted shortly after the announced acquisition of EMC by Dell, 65% of the respondents indicated that they expected to benefit from more complete and innovative solutions from the combined company. That’s not surprising, given the complementary strength of their respective portfolios. Perhaps the most potential synergy is in the Converged Platforms and Solutions division, where servers, networking, storage and software come together.
Tags : 
     Dell EMC
By: Bill.com     Published Date: May 14, 2012
This Insight focuses on the 74 SMBs within that group and provides a comparison with respondents from larger businesses. Given the different volumes of invoices and payments these groups handle, what do they have planned for future? Find out!
Tags : cloud invoice, cloud, smb, management, invoices, bill.com, small business
     Bill.com
By: Akamai Technologies     Published Date: Mar 09, 2017
ENGAGE AND SATISFY FINANCIAL SERVICES CUSTOMERS In order to stay relevant and retain today’s “always-on”, mobile customers, financial institutions must prioritize and innovate. According to a recent Akamai FinServ industry survey conducted by TechValidate, almost half of the respondents are “behind” or “slightly behind” their peers with regard to their mobile capabilities. Download a free report with detailed findings and takeaways from the survey to find out how to maximize customer acquisition, increase retention, and drive card usage. You’ll also learn: - Current mobile strategies and barriers to adoption - The right metrics to measure success - The most important factors in a mobile banking experience
Tags : financial services customer engagement, customer service, mobile customers, akamai, mobile strategies, mobile banking
     Akamai Technologies
By: Adobe     Published Date: Aug 22, 2013
Web Content Management is becoming the focal point for companies who wish to deliver a truly seamless multichannel customer experience. The strategic importance of WCM is increasingly referenced in analysts' reports such as Forrester, which stress the importance for companies to move beyond using a CMS as a means to simply manage content and strategically utilise it to create digital experiences. With that said, it is concerning that just 38% of this survey's respondents agree that their CMS facilitates a 'brand enhancing digital presence.' Download this report to learn more.
Tags : content management, customer experience management, web content management, content management systems, customer experience/engagement
     Adobe
By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : data, non-malicious, malicious, ponemon, solera network
     Blue Coat Systems
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Juniper APAC DWA Cloud Leads July 2017
Start   Previous   1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics