• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

research activities

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name
By: VSP     Published Date: Sep 08, 2017
Research shows that wellness plans are extremely important to your clients. Employers have very solid reasons for embarking on a wellness program, including increased productivity and lower health costs for their employees. They are struggling to achieve their goals, however. Many employers aren’t sure how to begin a program; even the most advanced employers in terms of wellness are seeking ways to improve their wellness activities
Tags : 
    
VSP
By: Cisco     Published Date: Jul 01, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale, storage virtualization, server virtualization, cloud computing
    
Cisco
By: Cisco     Published Date: Jul 27, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale, business integration, cloud computing
    
Cisco
By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
By: athenahealth     Published Date: Jun 08, 2015
We convened top academic medical center leaders for our AMC Advisory Roundtable in October of 2013. We also conduct regular discussions with a wide array of health care executives, including leaders of health systems, medical groups, insurance companies, and academic institutions. This whitepaper shares some of the key themes that have emerged from those meetings.
Tags : 
academic medical center, clinical activities, research activities, education
    
athenahealth
By: NAVEX Global     Published Date: Apr 20, 2018
Discover how organisations similar to your own are developing an effective ethics and compliance programme to improve workplace culture and reduce compliance risk. Our new research will help you identify the most appropriate activities to consider for your own programme, provide the data to help benchmark your results, and the guidance to improve buy-in and programme resources. What you'll learn: How are new regulations changing potential ethics and compliance risks? What challenges do compliance professionals face when trying to improve company culture? How are organisations investing in compliance activities? What results are compliance programmes achieving?
Tags : 
    
NAVEX Global
By: LogMeIn     Published Date: Oct 08, 2015
This paper reveals how Europeans have significantly increased their use of mobile as a channel to regularly perform both shopping and support functions, with particular spikes in growth in research and purchasing activities.
Tags : 
mobile engagement, mobile engagement in europe, mobility, mobile devices, use of mobile, online shopping, mobile computing, mobile data systems, mobile workers, smart phones, wireless phones
    
LogMeIn
By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
    
Flexera
By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device
    
Webroot
By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications
    
Intralinks
By: Adobe     Published Date: Apr 13, 2015
This Gigaom Research study aims to help technology decision-makers better understand the role of IT in supporting the need for business agility and pace. In this report you will gain insight into: - How to increase business agility with the best tools for your workforce - Strategies to speed up new tool adoption so the workforce has a range of work tools that match different sorts of work activities and interactions - The shifting role of IT to create a technology landscape in which productivity and innovation flourish Download this Gigaom Research white paper to learn more.
Tags : 
adobe, it tools, modern workforce, business agility, it productivity, business intelligence, collaboration, intranets, productivity, cloud computing
    
Adobe
By: LeapFrog Interactive     Published Date: Jul 09, 2009
The links below will provide you with access to the latest research and expert recommendations. This information has been customized by industry to best reflect the ways in which you can improve your marketing campaigns by integrating landing pages into your offline marketing activities. Learn more today!
Tags : 
leapfrog, utilize, online, offline, advertising, integration, marketing, consumer, industry, success, messaging
    
LeapFrog Interactive
By: Asure Software     Published Date: Nov 06, 2013
Based on third party research and our own experience, we know that organizations that have successfully implemented automated technology and reporting tools to support their HR activities have seen real workforce productivity benefits. This white paper will provide you with an in-depth analysis of the top 8 ways you can improve your workforce productivity using the latest advances in HR technology.
Tags : 
workforce management, workforce management solutions, workforce software solutions, workforce software, workforce productivity
    
Asure Software
By: Oracle     Published Date: Sep 30, 2014
B2B transactions are no longer driven by sales. At least not during the first half of the engagement process. Research shows that more than half of the product and solution information gathering has been done online before a prospect even talks to someone in sales. To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Tags : 
digital, body, language, b2b, transaction, buyers cues, intentions, networking
    
Oracle
By: Oracle     Published Date: Sep 05, 2014
B2B transactions are no longer driven by sales. At least not during the first half of the engagement process. Research shows that more than half of the product and solution information gathering has been done online before a prospect even talks to someone in sales. To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World"
Tags : 
digital, body language, sales, responses, transactions, b2b, body language, downloads, engagement, business, climate, product, solution
    
Oracle
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter