Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it professional

Results 126 - 150 of 961Sort Results By: Published Date | Title | Company Name
Published By: Brainshark     Published Date: Oct 16, 2013
With the proliferation of the iPad and other tablets and mobile devices among sales and account managers, a new generation of enabling technologies and best practices has offered the opportunity to get more out of the out-of-office experience. This research brief examines the use of video tools by sales professionals within best-in-class companies, specially within a mobile environment.
Tags : 
sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing
    
Brainshark
Published By: Brainshark     Published Date: Oct 16, 2013
"Getting employees to understand and take advantage of benefits during open enrollment periods is big challenge for many HR managers. This paper looks for new ideas on communicating benefit plans from professional marketers, knowledge management experts, and social media gurus."
Tags : 
human resources, training, compliance, onboarding, new hire, orientation, open enrollment, employee benefits
    
Brainshark
Published By: Bridgeline Digital     Published Date: Jan 10, 2013
Designed to help companies assess their B2B eCommerce maturity, this report outlines a general framework that B2B eCommerce professionals can use to gauge how they are developing with respect to a similarly situated peer group.
Tags : 
b2b, b2b ecommerce, b2b ecommerce maturity, b2b ecommerce strategy
    
Bridgeline Digital
Published By: Bridgeline Digital     Published Date: May 17, 2013
Digital touchpoints support an increasingly large percentage of the overall customer experience. 2012 saw the emergence of several important digital customer experience trends that will gain momentum as firms look to unify the cross-touchpoint experiences they deliver in 2013. This report outlines key trends that will make up the landscape that customer experience professionals will be working in as they take strides to improve their digital customer experiences in 2013.
Tags : 
forrester, digital customer experience, customer experience management, customer experience trends, digital experiences
    
Bridgeline Digital
Published By: Bright Horizons     Published Date: Jul 24, 2017
A prefect storm is brewing for employees in the “Sandwich Generation.” It’s a critical juncture: child care needs colliding with elder care demands right when employees are in key professional roles – and so exceptionally valuable to employers. Download our eBook to learn how to reduce absenteeism and improve productivity for employees managing their careers and care for both their children and aging parents.
Tags : 
elder care, child care, employee retention, dependent care, back-up care, sandwich generation, work-life, absenteeism
    
Bright Horizons
Published By: BrightWave Marketing     Published Date: Mar 13, 2008
In August 2007, EmailStatCenter.com launched its First Annual State of Email Metrics survey. Approximately 55% of respondents were from client side and 45% from agencies or ESPs. Download this study to find out what the email professionals want and need in the coming years.
Tags : 
brightwave, email, ctr, click through, click-thru, conversion, email marketing
    
BrightWave Marketing
Published By: Brother     Published Date: Nov 23, 2015
Brother conducted a series of interviews with value-added resellers (VARs) that work closely with businesses to select the right technology solutions. These VARs have a unique understanding of how IT professionals think; as a result, they have witnessed many missteps that have led to “less than optimal” IT technology integrations. What follows are five common - yet significant - mistakes identified during these discussions.
Tags : 
it management, brother, productivity, cost reduction, value-added resellers, technology integration
    
Brother
Published By: Brother     Published Date: Nov 23, 2015
Many CIOs may be surprised to find a significant business loss caused by their own departments. How does your company compare? Run through these questions and find out.
Tags : 
it management, brother, cios, optimization, it professionals, scanners, printers
    
Brother
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Business.com     Published Date: Jun 03, 2009
Download B2B search marketing tips from over 140 top B2B search marketing agencies and the experts at Business.com. This whitepaper offers key insights and tips to help B2B marketing professionals quickly deliver better search marketing ROI.
Tags : 
business.com, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle
    
Business.com
Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe
    
CA Mainframe
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 20, 2017
e-book which lays out the case for machine learning and artificial intelligence for mainframe operational analytics. The mainframe is now part of a highly complex connected ecosystem driving trillions of mobile and web transactions critical to the functioning of the application economy. The emergence of new workloads and apps on the mainframe means that the status quo isn’t enough when it comes to Mainframe management. IT professionals alone – whether mainframe skilled or not – simply can’t keep up with the onslaught of performance alerts, false alarms. Machine learning deliver mainframe intelligence a more proactive and automated approach to handle this challenge.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
In our 28-criteria evaluation of application performance management (APM) solutions, we identified the 14 most significant vendors — AppDynamics, AppNeta, BMC Software, CA Technologies, Dell, Dynatrace, Hewlett Packard Enterprise (HPE), IBM, ManageEngine, Microsoft, Nastel Technologies, NetScout, New Relic, and Riverbed Technology — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice for their organization.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Welcome to the very first edition of Modern Monitoring, a collection of articles and insights designed to help IT operations and DevOps professionals deliver more resilient, supportable and high-performance IT services. It’s perhaps a sign of the times that monitoring as a discipline is receiving much more attention within the biz tech community. And deservedly so. The new distributed application architectures being built, together with the dizzying pace of software delivery, demand new approaches in what’s traditionally been perceived as a “keeping the lights on” IT practice. Of course, there’s no better way to consider monitoring than to draw parallels with other practices in related fields. It’s why we’ve included a couple of pieces with a distinct aeronautical flavor that discuss importance of instrumentation and contextual awareness.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Suddenly, the network is cool again. Tech trends such as the Internet of Things, software-defined networking and growing end-user expectations all add up to a demand for “dialtone” network performance and reliability. But as the data deluge continues to accelerate, and as organizations continue to rely on multiple clouds to achieve business goals, how can the network keep up, much less meet tomorrow’s demands? This e-book looks at the trends that are impacting the enterprise network—the modern network—the issues it creates for NetOps professionals, and how organizations can act today to plan for tomorrow.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
In the 26-criteria evaluation of continuous delivery and release automation (CDRA) providers, we identified the 15 most significant — Atlassian, CA technologies, Chef Software, Clarive, CloudBees, electric Cloud, Flexagon, Hewlett packard enterprise (Hpe), IBM, Micro Focus, Microsoft, puppet, Red Hat, VMware, and Xebialabs — and researched, analyzed, and scored them. We focused on core features, including modeling, deploying, managing, governing, and visualizing pipelines, and on each vendor’s ability to match a strategy to these features. this report helps infrastructure and operations (I&o) professionals make the right choice when looking for CDRA solutions for their development and operations (Devops) automation.
Tags : 
    
CA Technologies_Business_Automation
Published By: Carbonite     Published Date: Oct 12, 2017
Carbonite provides data protection solutions for businesses and the IT professionals who serve them. Our product suite provides a full complement of backup, disaster recovery, and high availability solutions for any size business in any location around the world, all supported by a state-of-the-art global infrastructure.
Tags : 
draas, data recovery, recovery capability, cloud support, infrastructure
    
Carbonite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.