research

Results 301 - 325 of 2448Sort Results By: Published Date | Title | Company Name

Benchmark report on Business Intelligence

Published By: Gleanster Research     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 229 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions and analysis of 32 solution providers. Most organizations today have business intelligence (BI) tools or at least some way of churning out reports. Fewer have a true business intelligence strategy or a well-architected BI platform for generating actionable insights. Broadly considered, BI encompasses all aspects of gathering, storing, cleansing, analyzing and distributing data. This Gleansight benchmark report reveals how Top Performers are justifying their investments in next-generation BI capabilities, how they're overcoming implementation and organizational hurdles, and how, as a result of their investments, they're now able to make more timely and better informed business decisions across multiple organizational functions.
Tags : 
gleanster, business, benchmark, business intelligence, roi
    
Gleanster Research

Benchmark Report on Online Customer Community Solutions

Published By: Gleanster Research     Published Date: Nov 21, 2013
This benchmark report from Gleanster Research showcases the benefits of Online Customer Community Solutions. You'll learn what to look for, how to overcome challenges, as well as analyst commentary on the full vendor landscape.
Tags : 
    
Gleanster Research

Benchmark Report: Best Practices in Social Media Marketing

Published By: Gleanster     Published Date: Jan 30, 2011
Written by the former VP of Social Media at Barnes & Noble, and based on the experiences of 284 companies, this report benchmarks best practices in social media marketing.
Tags : 
social media marketing, research paper, best practices
    
Gleanster

Benchmark Report: Data Drives Social Media Performance

Published By: SocialFlow     Published Date: Oct 30, 2014
Research shows that Data-Driven Social Media publishing delivers a 91% increase in reach and a 26% increase in engagement. This report is based on 1.6 M posts on Facebook, Twitter and Google Plus, and proves that how you distribute your social posts is more important to improving your engagement than what you’re posting.
Tags : 
social media, social media management, social performance, social best practices, social publishing, social media results, earned media, facebook results, twitter, google +
    
SocialFlow

Benefits of Automating Workforce Management

Published By: Workforce Software     Published Date: Feb 02, 2015
There’s lots of great research on the cost savings that better time, attendance, scheduling, and leave management solutions can bring to your business. Problem is, you may not have the time to dig that research up… even when it can help make the case for new investments. If you’re stretched for time but still looking for answers, this paper’s for you.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk, attendance, work ours, pay rate, absence, alerts, support, policies, integration, human resource technology
    
Workforce Software

Bericht von Forrester: Building A Customer-Obsessed IAM Team

Published By: Akamai Technologies     Published Date: Jul 25, 2019
Das Customer Identity and Access Management (CIAM) spielt für Marken, die ihren anspruchsvollen Kunden ein nahtloses, sicheres digitales Erlebnis bieten wollen, eine immer größere Rolle. Als Teil des Identity and Access Management Playbook bietet Forrester Research Unterstützung beim Aufbau eines kundenorientierten IAM-Teams, das über die nötigen technischen Fähigkeiten, Geschäftspraktiken und zwischenmenschlichen Eigenschaften verfügt, um eine CIAM-Strategie zu entwerfen und sie über verschiedene Funktionsgruppen hinweg zu implementieren. Lesen Sie den vollständigen Bericht, um zu erfahren, was Sie bei der effektiven Gestaltung eines CIAM-Teams berücksichtigen sollten. Die Kernpunkte des Berichts: ? Vier wichtige Rollen für Ihr CIAM-Team ? Warum die gemeinsame Nutzung und Integration von Kundendaten über Unternehmensgrenzen hinweg entscheidend für den Erfolg ist ? Die wichtigsten technischen, geschäftlichen und zwischenmenschlichen Fähigkeiten, die die Mitglieder Ihres CIAM-Teams mit
Tags : 
    
Akamai Technologies

Bericht von Forrester: Gauge Your Data Privacy and Security Maturity

Published By: Akamai Technologies     Published Date: Jul 25, 2019
In der heutigen Datenschutzlandschaft steht für Verbrauchermarken viel auf dem Spiel. Ausgeklügelte Cyberangriffe und aufsehenerregende Datenschutzverletzungen können Kundendaten gefährden und das Vertrauen in Ihre Marken schädigen. Um heute erfolgreich zu sein, müssen Ihre Marken eine Strategie für Datensicherheit und Datenschutz implementieren, bei der das Vertrauen der Kunden priorisiert wird. Sind Sie dieser Herausforderung gewachsen? Nutzen Sie die „Datensicherheits- und Datenschutzreifebewertung“ von Forrester Research, um die Kompetenzen Ihrer Marke zu beurteilen und verbesserungswürdige Bereiche zu ermitteln. Dabei erfahren Sie Folgendes: Die vier wichtigsten Kompetenzen für B2C-Marken im Bereich Datensicherheit und Datenschutz ? Ob Sie die empfohlenen Best Practices von Forrester Research erfüllen ? Tipps, wie Sie Ihre Datensicherheitskultur und Ihre Datenschutzkultur zu einem Wettbewerbsvorteil machen können
Tags : 
    
Akamai Technologies

Bersin by Deloitte- The Definitive Buyers’ Guide for LMS 2013

Published By: SumTotal     Published Date: May 24, 2013
Download this abridged version of the Guide that not only shows SumTotal as #1 in Learning, but also includes comprehensive 2013 research covering the role of the Learning Management System, LMS Functionality and Features, The State of Learning Management Systems and more.
Tags : 
lms, learning management systems, sumtotal, human resources
    
SumTotal

Best of Both Worlds- Can Enterprises Achieve Both Scalability and Control When it Comes to Cloud?

Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Very little data is available on how effectively enterprises are managing private cloud deployments in the real world. Are they doing so efficiently, or are they facing challenges in areas such as performance, TCO and capacity? Hewlett Packard Enterprise commissioned 451 Research to explore these issues through a survey of IT decision-makers and data from the Cloud Price Index.
Tags : 
    
Hewlett Packard Enterprise

Best Practices for Becoming a Successful Social Brand

Published By: Brandwatch     Published Date: Jun 17, 2013
An introduction to using social media in business, this eBook discusses the importance of setting social media goals and how to foster a positive brand experience, along with tips to become a thriving social enterprise.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputatino monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
    
Brandwatch

Best Practices for File Sync & Share & Content Management

Published By: Box     Published Date: Jul 15, 2013
In this Forrester's Wave File Sync and Share Platforms Q3 2013 report, the global research and advisory firm evaluates 16 file sync and share vendors: Accellion, Acronis, AirWatch, Alfresco, Box, Citrix, Dropbox, Egnyte, EMC, Google, Hightail (formerly YouSendIt,) IBM, Microsoft, Novell, Salesforce.com and WatchDox.
Tags : 
best practices, file sync, file share, content management, remote access, business continuity, data protection, content management system, document management, secure content management, cloud computing, mobile device management, data loss prevention
    
Box

Best Practices for Implementing Retail Distributed Order Management Systems

Published By: IBM     Published Date: Apr 25, 2018
Many retailers are investing in distributed order management systems to optimize their consumer order fulfilment performance. Chief supply chain officers can use this research to successfully implement these systems into their business application landscape.
Tags : 
b2c, ibm, order management, supply chain
    
IBM

Better IT Asset Management & Data Quality Empower ITSM, Enterprise Architecture & IT Security Teams

Published By: Flexera     Published Date: May 06, 2019
Using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is a challenge. Enterprise Architecture (EA), IT Service Management (ITSM) and Security teams need enriched technology asset data and accurate analytics so they can keep the enterprise running like a well-oiled machine. Join us to hear R “Ray” Wang, Principal Analyst and Founder of Constellation Research, and Alan Lopez, Senior Director of Global Product Marketing from Flexera, discuss use cases where asset data and analytics are becoming business-critical. Watch the webinar.
Tags : 
    
Flexera

Better IT Decisions

Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks, productivity, project management, service management
    
HP - Enterprise

Beware the Botnets: Botnets Correlated to a Higher Likelihood of Breaches

Published By: BitSight Technologies     Published Date: Jul 23, 2015
Recent BitSight research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach. Download this report to learn how BitSight Security Ratings are a powerful metric for communicating cyber risk across the enterprise.
Tags : 
cyber risk, security, data, network, it operations, it management, knowledge management, enterprise applications, it career advancement, business technology
    
BitSight Technologies

Beyond Borders Identifying Global Sales In A Shrinking E-Commerce World

Published By: Bronto     Published Date: May 18, 2017
The internet has opened up a shopper's paradise where you can find and buy anything right from the living room. With a few simple key strokes, a consumer can choose products and services from merchants around the globe - from that authentic British trench coat to an Australian boomerang to wine straight from the California Coast. But with the gates to cross-country commerce opened wide, have consumers abandoned their local retailers for international merchants abroad? To answer this question, we commissioned a consumer study, conducted by Ipsos Research in the US and Australia and Census wide in UK. We hope this original research helps you better understand the opportunities and challenges of cross-country trade.
Tags : 
    
Bronto

Beyond Borders: Identifying Global Sales in a Shrinking Ecommerce World

Published By: Bronto     Published Date: Jan 20, 2017
Bronto partnered with Ipsos Research and Censuswide to survey more than 4000 US, UK and Australian shoppers about their preferences for cross-border shopping, factors that entice them to shop outside their home country, and remaining barriers to global ecommerce. In this paper we found: - Australian consumers (71%) embrace cross-country commerce more than the UK (44%) and the US (42%). - Women and shoppers over 55 years old are more likely to choose merchants in their home country. - The two top reasons for buying from another country are unique merchandise at a better price. - Barriers include concern about shipping costs, distrust of online payments and security worries. - Download this research report to get more valuable insights and advice to help you be the winner in this growing global competition.
Tags : 
bronto, e-commerce, global sales, customer lifecycle
    
Bronto

Beyond Current Realities: Leveraging Data Analytics to Create Better Benefits Programs

Published By: Artemis Health     Published Date: Feb 05, 2019
Artemis Health teamed up with Employee Benefit News to research the current “benefits landscape.” We surveyed self-insured employers to find useful trends, interesting stats, and info on what leaders like you are doing to improve their benefits strategy. In this whitepaper, you'll discover: • Regional differences in benefits offerings and priorities • What benefit leaders believe they can accomplish with benefits data analytics • The features and functionality your peers are looking for when they evaluate a data solution
Tags : 
    
Artemis Health

Beyond Current Realities: Leveraging Data Analytics to Create Better Benefits Programs

Published By: Artemis Health     Published Date: Aug 08, 2019
Artemis Health teamed up with Employee Benefit News to research the current “benefits landscape.” We surveyed self-insured employers to find useful trends, interesting stats, and info on what leaders like you are doing to improve their benefits strategy. In this whitepaper, you'll discover: • Regional differences in benefits offerings and priorities • What benefit leaders believe they can accomplish with benefits data analytics • The features and functionality your peers are looking for when they evaluate a data solution
Tags : 
    
Artemis Health

Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud

Published By: Trend Micro     Published Date: Sep 05, 2019
“EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed.” Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: • Strategic insight into the current state of threat detection and response, providing you with ESG’s comprehensive research and findings. • Current challenges affecting today’s organizations, including the time and resources required and numerous gaps that EDR exposes. • Valuable foresight into what’s next and how XDR—detection and response across email, endpoint, servers, cloud workloads, and network—can help solve these issues.
Tags : 
    
Trend Micro

Beyond Money: How to Win and Keep Top Performers

Published By: SAP     Published Date: Jul 17, 2012
Loyal and satisfied employees are the foundation of successful business performance, particularly as organizations increasingly look to their employees to drive productivity gains and stir innovation. Yet, new research shows employee loyalty slipping worldwide. The importance of building and rebuilding employee loyalty is paramount for organizations that want to retain their top talent and avoid the high costs associated with high turnover. In this white paper, we offer 10 strategies to foster employee engagement and motivation.
Tags : 
sap, white paper, employees, performance, satisfaction, employee engagement, employee motivation, research
    
SAP

Beyond the Balance Sheet: Assessing the Impact of the New Lease Accounting Standard

Published By: IBM     Published Date: Apr 24, 2012
Get the latest research on how the new lease accounting standard affects your company. Find out what 179 senior executives think about the new lease accounting standard and how it will impact their companies. Read this comprehensive analyst report to learn more.
Tags : 
ibm, lease, lease accounting standard, project management, operations
    
IBM

Beyond the Campaign... Embracing Lead Nurturing

Published By: Gleanster Research     Published Date: Oct 20, 2013
This research study from Gleanster "From Batch-and-Blast to Lead Nurturing: How Top Performers overcame legacy practices to embrace the new dynamics of B2B marketing." outlines how Top Performing organizations made the move to lead nurturing.
Tags : 
    
Gleanster Research

Beyond the Next Generation: Putting Advanced Network Security To Work

Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking, security, it management, knowledge management, data management
    
IBM

Beyond the Next Generation: Meeting the Converging Demands of Network Security

Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges, security, it management, data protection, database security, business technology
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.