RecruitingBlogscom

Follow Us:

 

it search

Results 1476 - 1500 of 1596Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: May 13, 2015
The Adobe Digital Index provides its key insights, recommendations and predictions of both Social and Search in this Digital Advertising report
Tags : 
adobe digital advertising, social advertising, search advertising
    
Adobe
Published By: Crowdtap     Published Date: Jul 03, 2012
New from Crowdtap, learn why influence is the hottest topic in marketing and social media. We'll show you how to tap your brand's peer influencers to drive advocacy and boost word-of-mouth online and off with 5 Keys to Success in Influencer Marketing.
Tags : 
influence, influencer, influence marketing, influencer marketing, influence score, social marketing, social roi, social media, word-of-mouth, wom, word-of-mouth marketing, wom marketing, advocacy, brand advocates, brand advocacy, digital marketing, buzz marketing, product sampling, marketing research, marketing insights
    
Crowdtap
Published By: Workday     Published Date: Mar 01, 2018
Despite slower initial adoption, more finance leaders are now turning to public cloud SaaS for their applications. This joint video between Gartner Research and Workday explores why the financials market is shifting and what advantages await finance leaders in the cloud.
Tags : 
gartner, public cloud, saas, financial market
    
Workday
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management, storage, data management, business technology
    
Symantec
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Diversity within device fleets means rethinking mobility management. Learn more with this complimentary Gartner research paper.
Tags : 
smartphone, tablet, mobility management, mobility, security, enterprise applications, electronics, business technology
    
Good Technology Corporation
Published By: McAfee     Published Date: Sep 17, 2013
How Cybercriminals Make Money With Your Email, An Osterman Research Whitepaper
Tags : 
email protection, security, mcafee, solution, technology, research, cyberprotection, business technology
    
McAfee
Published By: Silverpop     Published Date: Feb 04, 2013
Strategies, tactics, videos and worksheets aimed at educating and empowering you to tackle the six biggest digital marketing trends in 2013 and giving you a leg up on the competition.
Tags : 
digital marketing, email marketing, automation, mobile, user experience, social media, search, optimization, analytics, sales
    
Silverpop
Published By: NETIQ     Published Date: Mar 12, 2013
Regulatory compliance has become an important corporate initiative as the complexity and scope of the regulatory environment increases. Organizations are searching for an effective, sustainable, and scalable approach that will achieve their compliance
Tags : 
security, compliance, it security, sustainable compliance, security management, it management, business technology
    
NETIQ
Published By: TIBCO     Published Date: Oct 28, 2013
When a business event occurs, or a priority request for intelligence comes down the pipe, the modern enterprise has to be able to quickly deliver the right information to the right people. Unfortunately, many organizations continually struggle with accomplishing this task, as the size and complexity of their IT infrastructure rapidly expands. In this latest research, Aberdeen recommends actions for organizations currently involved in data integration, or contemplating the adoption of such practices.
Tags : 
tibco, data integration, infrastructure, aberdeen, data management
    
TIBCO
Published By: Logicalis     Published Date: Aug 20, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage, and how successful progression can improve an organization’s IT effectiveness.
Tags : 
logicalis, it transformation, it strategy, it budget, it solutions, it system, it priorities, networking, security, software development, it management, knowledge management, data management, virtualization, converged infrastructure, draas, cloud computing, automation, automation & orchestration, protection
    
Logicalis
Published By: HP and Intel ®     Published Date: May 02, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtualization technologies, the expected and realized benefits, ensuing infrastructure decisions, future outlook of the data center, and best practices for deployment.
Tags : 
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtual technologies, the expected and realized benefits, ensuing infrastructure decisions,future outlook of the data center, and best practices for deployment.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure, desktop virtualization
    
HP and Intel ®
Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks, security
    
Dell SecureWorks
Published By: CareCloud     Published Date: Jan 26, 2015
Somerset Orthopedic Associates (SOA) has always been on the cutting edge of medicine. In fact, SOA opened the first orthopedic-specific ambulatory surgical center (ASC) in the state of New Jersey in 1997. However, like many medical groups, SOA came to realize that when it came to practice management (PM) software, it had been holding onto an outdated system for too long. Although the seven-surgeon group was growing, so too were the frustrations and costs associated with its client-server system, not to mention concerns about keeping up with industry change. Determined to make the group more nimble, SOA’s Administrator of over 16 years, Alexandra Archibald, set out in search of a new PM-EHR solution.
Tags : 
carecloud, modern practice management, orthopedic specific, outdated systems, asc, soa, client server system, information technology, practice management
    
CareCloud
Published By: IBM     Published Date: Sep 27, 2013
Analyst Joe Clabby writing about HP's flawed Itanium strategy states that continued investment in a converged Itanium/x86 infrastructure is a huge waste of research and development money. Itanium should be treated as a specialty processor that performs certain workloads. Read it here.
Tags : 
hewlett packard, itanuim, converged infrastructure, feint, x86 server, servers, data management, business technology
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking, security, data management, servers, operating system, infrastructure, ibm puresystems, storage, business technology
    
IBM
Published By: Oracle     Published Date: Jul 05, 2017
The fast-evolving digital landscape is changing the game for all organizations. The way we consume content, conduct research, consume video and music, and drive efficiency in our work environment is raising the bar for digital experience. Organizations that rely on the internet to reach customers and drive revenue increasingly turn to cloud-based infrastructure and content delivery networks (CDNs) to achieve the reach and global footprint needed to keep up with customer demands. Delivering these services with high availability and performance across an unpredictable internet over which you have very little visibility and control is a major challenge.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, dns
    
Oracle
Published By: Oracle     Published Date: Mar 22, 2018
Paris Lodron University Salzburg is the biggest educational institution in the Salzburg region of Austria. The university undertakes innovative research and sees itself as an internationally networked knowledge hub at the heart of Europe. An Oracle Exadata Database Machine was deployed for these applications in 2012. The objectives pursued at the time—uninterrupted operation, resource conservation, and reduction of the CO2 footprint—were fully achieved. Facing increasing growth and with the undertaking of specialized projects, Paris Lodron University was faced with the task of adapting its IT infrastructure to new requirements.
Tags : 
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : 
data loss prevention, data breaches, threats and mobility, security executives, corporate data, security
    
Symantec
Published By: IBM     Published Date: Feb 05, 2014
Companies increasingly rely on IT discovery to provide a complete picture of the infrastructure for IT optimization and migration initiatives. But current methods are costly, and they can take too long to deliver results. ALDM (analytics for logical dependency mapping), a new service from IBM Research, is changing all of that. In this interview, Larry Thompson, IBM offering development executive, explains how ALDM reengineers IT discovery with analytics, automation and cloud computing technologies and delivers a more complete and accurate view of your IT environment. Listen to the full 8-minute podcast interview or read the two-page encapsulated version to learn how ALDM is lowering the cost of IT discovery while speeding results.
Tags : 
    
IBM
Published By: Cisco     Published Date: Jan 16, 2014
With maturity comes clarity, and the choice between public, private or hybrid cloud deployments is a prime example. According to a recent IDG Research Survey, private and hybrid cloud adoption is gaining strength at organizations of all sizes, and has the power to serve as a competitive advantage. However IT leaders must address certain barriers to fulfilling the promise of a private or hybrid cloud initiative.
Tags : 
cisco, private cloud, idg research survey, hybrid cloud, networking
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
The Internet of Things may be a hot topic in the industry but it’s not a new concept. In the early 2000’s, Kevin Ashton was laying the groundwork for what would become the Internet of Things (IoT) at MIT’s AutoID lab. Ashton was one of the pioneers who conceived this notion as he searched for ways that Proctor & Gamble could improve its business by linking RFID information to the Internet. The concept was simple but powerful. If all objects in daily life were equipped with identifiers and wireless connectivity, these objects could be communicate with each other and be managed by computers.
Tags : 
communication, internet, network management
    
Cisco
Start   Previous    50 51 52 53 54 55 56 57 58 59 60 61 62 63 64    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top