RSS feed Get our RSS feed

News by Topic

professional

Results 376 - 400 of 1278Sort Results By: Published Date | Title | Company Name
By: BrightWave Marketing     Published Date: Mar 13, 2008
In August 2007, EmailStatCenter.com launched its First Annual State of Email Metrics survey. Approximately 55% of respondents were from client side and 45% from agencies or ESPs. Download this study to find out what the email professionals want and need in the coming years.
Tags : brightwave, email, ctr, click through, click-thru, conversion, email marketing, email marketing services/software
     BrightWave Marketing
By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : data center technology, emc, esg, customer service, cloud computing, it as a service
     EMC
By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : data center technology, emc, esg, customer service, cloud computing, it as a service
     EMC
By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : data center technology, emc, esg, customer service, cloud computing, it as a service
     EMC
By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : data center technology, emc, esg, customer service, cloud computing, it as a service
     EMC
By: EMC     Published Date: May 21, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : data center technology, emc, esg, customer service, cloud computing, it as a service
     EMC
By: Cornerstone OnDemand     Published Date: Mar 31, 2011
The challenge with being a consistent performer is, while they typically get more work done, they get less attention from their managers, and they have fewer professional opportunities available to them.
Tags : performance management, talent mobility, cornerstone ondemand, saas, talent management, human capital management, hcm
     Cornerstone OnDemand
By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology, security
     Comcast Business
By: Schneider Electric     Published Date: May 31, 2019
Colocation facilities are rapidly designing and building new facilities in order to capitalize on market opportunity. Getting the facility up and running is the first challenge. The second? Recruiting, training, and retaining qualified data center staff. In this webinar, co-hosted by Tony DeSpirito, VP & General Manager Data Center Operations at Schneider Electric, & Brian Gisi, Infrastructure Management & Services Manager at IBM, to access field-tested methods & strategies that can help you: 1. Overcome the worldwide shortage of experienced data center professionals 2. Understand how out-tasking data center operations can benefit you & your clients 3. Identify key characteristics of a strong data center operations partner
Tags : data center, business growth, schneider electric
     Schneider Electric
By: Symantec     Published Date: Oct 25, 2012
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.
Tags : symantec, security, best practices, endpoint security, security detection, security education
     Symantec
By: Symantec     Published Date: Jan 31, 2013
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.
Tags : endpoint protection, security, best practices, survey
     Symantec
By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
     Kaseya
By: Symantec Corporation     Published Date: Mar 21, 2014
This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: Jive     Published Date: Feb 12, 2015
Remember getting your first box of LEGOS as a kid? How fun it was putting the pieces together, collaborating with your friends to create something new? Now, as an IT professional, assembling and maintaining a Lego-like collaboration infrastructure isn’t what you signed up for. Piecing together disparate systems of record for email, web meetings and other applications is about as painful as stepping on a pile of Legos. Download the e-book to learn how implementing a collaboration system connects systems of record the easy way.
Tags : enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication
     Jive
By: Icertis     Published Date: Aug 06, 2019
Professional services providers are taking an enterprise approach to contract management to better manage obligations and improve service delivery to their customers.
Tags : enterprise contact management, contract management software
     Icertis
By: Oracle Corp.     Published Date: Oct 15, 2012
This survey, conducted by the Independent Oracle Users Group, examined more than 350 data managers and professionals regarding planned and unplanned downtime, database high availability, and disaster recovery solutions.
Tags : enterprise data, cloud computing, high availability, downtime, database infrastructure, database availability
     Oracle Corp.
By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
     CA Technologies
By: Kaseya     Published Date: Nov 18, 2013
The BYOD trend is now mainstream and growing rapidly in acceptance. Gartner now estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018.
Tags : kaseya, byod, technology trends byod, mobile, mobility, mdm, mobile device managment
     Kaseya
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: HP     Published Date: May 14, 2014
This paper is the outcome of a series of in-depth interviews ESG analysts performed with senior IT professionals in various industries. The objective was to determine the direct and indirect value customers derive from using HP Converged Storage solutions to address their primary storage needs, and more specifically their returns on information—such as gaining more value from corporate data for better decisions; infrastructure—in the form of lowering costs and increasing infrastructure agility; and individuals—including time savings and reduced management complexity.
Tags : storage, real world roi, hp 3par, hp converged storage, storage solutions
     HP
By: EMC Corporation     Published Date: May 27, 2011
This ESG white paper confirms that momentum continues to build around server virtualization. Learn about an in-depth survey of 463 senior IT professionals in both large midmarket and enterprise-class organizations in North America and resulting trends.
Tags : enterprise strategy group, esg, emc, backup and recovery, enterprise applications, vmware, mark bowker, david a. chapa
     EMC Corporation
By: Esker     Published Date: Jun 29, 2015
Read the new independent research report from Ardent Partners, ePayables 2015: State of the Market Report. Drawing on the feedback of hundreds of AP and finance professionals, this unique report offers a comprehensive snapshot into what’s happening in AP, including insights on: • How the role of AP is continuously evolving • Key drivers that shape AP leaders’ plans and priorities • How automation technology is impacting AP • Operational benchmark statistics and recommended strategies
Tags : epayables, accounts payable, exception-handling, root cause analysis, ap operations, ap strategy
     Esker
By: HighJump Software     Published Date: May 11, 2010
The question for today's supply chain professional isn't whether your ERP offers warehouse management functionality. The question is whether you'll actually be able to achieve efficient order fulfillment operations when using it.
Tags : highjump, erp, warehouse, supply chain, wms, warehouse management, tco
     HighJump Software
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics