usage

Results 201 - 225 of 306Sort Results By: Published Date | Title | Company Name
Published By: Bazaarvoice     Published Date: Aug 01, 2014
How do shopping holidays like Cyber Monday and Boxing Day affect review usage? What does review traffic reveal about back-to-school shopping? Download The Conversation Index to see how customer conversations impact the global shopping seasons.
Tags : 
bazaarvoice, holiday sales, growth, cyber monday, boxing day, review usage, traffic, emerging marketing, social media, marketing research
    
Bazaarvoice
Published By: MoreVisibility     Published Date: Jan 18, 2010
The potential rise in usage and value of mobile search has been evident to Search Marketers for several years now, with the question always hanging in the balance - When will technology and usage reach its tipping point? The answer is fast becoming: Soon.
Tags : 
mobile search, more visibility, search marketers, b2b, b2c, applications, seo, google, social media, advertising, search marketing agencies
    
MoreVisibility
Published By: SAS     Published Date: Apr 13, 2011
BI usage among organizations with mobile BI has doubled compared to those companies that have not mobilized their BI. Learn about these results, the emerging best practices for mobile BI usage and the framework by which you can assess your own management capabilities for enterprise mobile BI adoption.
Tags : 
mobile bi, business intelligence, andrew borg, david white, aberdeen, performance management, data management, knowledge management, maturity, data security
    
SAS
Published By: SAS     Published Date: Mar 01, 2012
Learn about the emerging best practices for mobile BI usage and the framework by which you can assess your own management capabilities for enterprise mobile BI adoption.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: Osterman Research, Inc.     Published Date: Aug 01, 2011
A recent survey by Osterman Research has confirmed that social media usage by employees has dramatically increased over the past few years. In short, you will leave this Webinar with a better understanding of the usage, trends, and diverse risks posed by social media.
Tags : 
osterman research, social media, commvault, mcafee, live event, web 2.0 security, policies, archiving, compliance, malware
    
Osterman Research, Inc.
Published By: Coveo     Published Date: Nov 13, 2013
Where does a Fortune 500 bank with 15,000 employees and a $90 billion in assets under management turn when it’s looking to unlock the potential in its internal knowledge base? KeyBank turned to Coveo.
Tags : 
enterprise search, unified search solutions, internal knowledge base
    
Coveo
Published By: IBM     Published Date: Mar 04, 2014
Customers’ expectations have never been so high. Yet, leaders at many banks and financial institutions still fail at providing a smooth, personalized, timely and relevant experience throughout channels. By leveraging the increasing amount of data about customers, bankers can create information to constantly improve their understanding of product usage, profitability, risk, buying behavior and financial needs. Access this white paper today to learn about expert solutions that can help you reinvent your business operations and create a customer-focused company. Read on now to explore more.
Tags : 
business operations, business process management, bpm, process automation, smarter process, banking, financial services, business process automation, corporate portals, document management, information management, records management, search and retrieval, search engines
    
IBM
Published By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : 
endpoint performance, software security, endpoint security products, performance metrics
    
Webroot Inc
Published By: Polycom     Published Date: Jun 08, 2016
"Over the next few years, advanced collaboration products and services will make their way into the millions of smaller meeting rooms (a.k.a. huddle rooms) in order to create flexible, productive work environments. Wainhouse Research believes that huddle rooms should be an integral part of every organization’s meeting room and collaboration strategy. Download this study by Wainhouse Research to get insights into how to maximize usage of small meeting spaces."
Tags : 
best practices, business optimization, business management, collaboration
    
Polycom
Published By: IBM     Published Date: Nov 12, 2013
Customers’ expectations have never been so high. Yet, leaders at many banks and financial institutions still fail at providing a smooth, personalized, timely and relevant experience throughout channels. By leveraging the increasing amount of data about customers, bankers can create information to constantly improve their understanding of product usage, profitability, risk, buying behavior and financial needs. Access this white paper today to learn about expert solutions that can help you reinvent your business operations and create a customer-focused company. Read on now to explore more.
Tags : 
business operations, business process management, bpm, process automation, smarter process, banking, financial services
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: IBM     Published Date: Dec 01, 2014
With the rise of mobile usage and increased mobile banking functionality, cyber criminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.
Tags : 
mobile malware, mobile usage, mobile security, cybercrime
    
IBM
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security
    
IBM MaaS360
Published By: IBM     Published Date: Jan 07, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, cloud, security, threats, usage, application
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, security, cloud applications, cloud, cloud-based threats
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
As the corporate landscape becomes increasingly mobile, and workers collaborate across a growing range of devices, organizations are implementing an agile and secure unified communications infrastructure. Active deployment of UC technology solutions has been on the rise among enterprises; however, adoption among midsize businesses has been notably slower. Yet in seeking ways to do more with less, midsize organizations are increasingly turning to the cloud and converged networks to provide UC solutions. In October 2013, Cisco commissioned Forrester Consulting to dive deeper into the current usage trends and perceptions of unified communications among midsize organizations (100 to 999 employees) across North America, Asia, and Europe.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Johnsonville Sausage uses SAP HANA analytics on UCS to build market share. In 1945, Ralph and Alice Strayer opened a butcher shop in Johnsonville, Wisconsin. With help from an old family recipe, Johnsonville Sausage has become the number-one sausage brand in the United States. In fact, three out of every four brats sold in the United States are Johnsonville brats.
Tags : 
    
Cisco
Published By: IBM     Published Date: Oct 03, 2017
The demand for new data about customers, customer behaviour, product usage, asset performance, and operational processes is growing rapidly. Almost every industry wants new data. Some examples of this are: • Financial services organisations want more data to improve risk decisions, for ‘Know Your Customer (KYC) compliance and for a 360 degree view of financial crime. • Utilities companies want smart meter data to give them deeper understanding of customer and grid usage and to allow them to exploit pricing elasticity. They also want sensor data to monitor grid health, to optimise field service and manage assets. Download now to learn more!
Tags : 
scaling data, big data, customer behavior, product usage, data integration
    
IBM
Published By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
    
SAS
Published By: IBM     Published Date: Apr 17, 2013
IBM has used the Storwize architecture to produce multiple storage systems across different usage segments to meet different customer needs. The ability to scale with a common underlying architecture has proven to deliver multiple benefits to IBM customers. Features developed for high-end enterprise systems now meet customer needs in other, more price conscious segments. The leverage from a common base for systems helps reduce development and support costs which are reflected in product costs for customers. The Storwize architecture also builds on Intel-based hardware, which provides continued advances with each new generation yet retains the same fundamental architecture. Customers also benefit from a storage architecture that provides a consistent experience across multiple products and generations.
Tags : 
storwize, storage systems, benefits, high-end enterprise, intel-based hardware, customers, development
    
IBM
Published By: Esker     Published Date: Jun 29, 2017
Accounts receivable (AR) is no second-rate department. Not only is it usually the largest company asset, it deals directly with customers and cash flow — things businesses can’t do without. You'd think internal AR processes would be on the cutting edge of innovation, right? Yeahhh … not so much. While departments like sales, marketing and payroll have embraced the use of software solutions, AR has been slow to catch up, with many still relying on sticky notes, calendar reminders and spreadsheets to manage post-sale collections activities. Read this eBook to discover how automation can: • Be a complementary tool that eliminates tedious tasks • Be multi-dimensional, in that its usage can be extended into other areas of AR • Drive repeat sales and allow you to get paid faster Download the eBook now to discover more about Accounts Receivable Automation!
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: HP and Intel ®     Published Date: Jul 26, 2013
Without the proper policies governing cloud usage, a shared infrastructure design, and without a comprehensive yet effective cloud service portfolio, your organization will end up spending more time and money fixing issues rather than delivering desired results to the business.
Tags : 
cloud, converged infrastructure, cloud design
    
HP and Intel ®
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.