mine

Results 1276 - 1300 of 1613Sort Results By: Published Date | Title | Company Name
Published By: Clicktale     Published Date: Sep 26, 2016
In this first paper of the Clicktale Psychology and Customer Experience Series, we examine how retailers can leverage personality type to reach visitors more effectively, raise conversions, and keep customers coming back. Learn how you can harness buyer personality insights to grow your online business.
Tags : 
clicktale, psychology, customer experience, customer reach, conversions, customer retention
    
Clicktale
Published By: Clicktale     Published Date: Sep 26, 2016
In this second paper of the Clicktale Psychology and Customer Experience Series, we examine how retailers can put inherent differences between the cognitive styles of men versus women to work for online businesses like yours.
Tags : 
clicktale, psychology, customer experience, cognitive styles, gender differences, online business
    
Clicktale
Published By: Clicktale     Published Date: Sep 26, 2016
In this third paper of the Clicktale Psychology and Customer Experience Series, we examine how retailers can identify intentionality of shopper behavior and differentiate between goal-oriented buyers and casual browsers. Learn how to increase conversions by building diverse purchase paths for your diverse visitors.
Tags : 
clicktale, psychology, customer experience, shopper behavior, conversions, purchase paths
    
Clicktale
Published By: Cisco     Published Date: Aug 24, 2015
The Cisco 2015 Midyear Security Report examines these intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.
Tags : 
malware, network defenses, detection, security gaps, threat defenses, trends, networking, security, it management
    
Cisco
Published By: Sponsored by Spredfast     Published Date: May 11, 2015
This report examines the market for enterprise social media management software (ESMMS) and the considerations involved in implementing ESMMS platforms.
Tags : 
social media management, social media, facebook, twitter, instagram, esmms
    
Sponsored by Spredfast
Published By: Optimizely     Published Date: Nov 05, 2015
Statistics are the underpinning of how Optimizely’s customers use data to make decisions. We use experiments to understand how changes we make affect the performance of our online experiences. To do this, we need a framework for evaluating how likely those changes are to have an impact, positive or negative, on a business over time. To run great experiments, investing in an understanding of statistics is one of the most important skills you can develop. Statistics provide inference on your results and help to determine whether you have a winning variation. Using statistical values to decide leads to stable, replicable results you can bet your business on. Lack of understanding can lead to errors and unreliable outcomes from your experiments.
Tags : 
statistics, experiments, data, customers, results, variation
    
Optimizely
Published By: Internap     Published Date: Nov 11, 2015
This benchmark analysis examines the relative performance of major VM components including virtual cores, memory, block storage, and internal network for Internap AgileCLOUD and Amazon Web Services (AWS) ECS/EBS.
Tags : 
internap, virtual machine, public cloud, servers
    
Internap
Published By: Affirm     Published Date: Jan 05, 2016
Tradesy is a leader in designer fashion resale for women. The company recently partnered with Affirm to offer installment financing at the point of sale. It's been a perfect fit, with Tradesy seeing a 14% increase in conversions and a 34% increase in revenue per customer thanks to Affirm. This case study examines how Tradesy was able to get such positive results and whether this can work for other online retailers.
Tags : 
affirm, tradesy, financing, user experience, revenue, ecommerce, purchase, enterprise applications, business technology
    
Affirm
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ study to examine the potential return on investment (ROI) businesses can receive through the deployment of Office 365. To better understand the benefits, costs, and risks associated with an Office 365 implementation, we interviewed four existing customers and surveyed 72 midsized organizations (with 150 to 2,000 users) about the use of Microsoft business products the SaaS platform, including Office Professional Plus, Exchange, Skype for Business (formerly Lync), SharePoint, Yammer, and OneDrive. Our research found that a sample composite organization (which switched from an on-premises 2010 version solution to Office 365) had total present value benefits of $3.4 million versus total present value costs of $1.3 million, resulting in a net present value (NPV) of $2.1 million.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) organizations may realize by deploying Office 365. The purpose of this study is to provide readers at small and medium-sized businesses (one to 250 users) with a framework to evaluate the potential financial impact of Office 365 on their organizations.
Tags : 
    
Microsoft Office 365
Published By: Lenovo and Intel®     Published Date: Nov 03, 2017
The power of digital transformation (DX) is delivered through devices. But too many digital transformation initiatives focus entirely on broad cloud, app, and software solutions. While end-user computing devices account for only a fraction of DX investments, underestimating their importance can risk your entire initiative. To ensure the success of your DX initiative, you need to have the right devices in the right hands to deliver your transformative experience. In this white paper, you’ll see how to avoid the pitfalls of DX, and how to evaluate your device requirements to maximize the potential of your DX investment. Download the white paper to find out more!
Tags : 
    
Lenovo and Intel®
    
Dotmailer
Published By: DocuSign     Published Date: Aug 09, 2016
This white paper displays how Forrester examines the range of solutions available to digitize operational processes.
Tags : 
docusign, techradar, client satisfaction, technology, electronic contract, paperless, reduce costs
    
DocuSign
Published By: DocuSign     Published Date: Aug 09, 2016
This white paper examines the bottlenecks and explores how organisations can move past them to turn digitisation of their organisation into a competitive advantage.
Tags : 
docusign, digital, digital transaction management, papeless, paper cost
    
DocuSign
Published By: Auth0     Published Date: May 16, 2016
The pre-eminent medical education and research organizations in the U.S. combine forces to help find cures to the most complex medical mysteries - with medical identity secured by Auth0.
Tags : 
medical, medical mysteries, medical identity, medical security, security
    
Auth0
Published By: AVI-SPL     Published Date: Sep 01, 2016
There are a few factors that are influencing the complexity of enterprise collaboration. In this tech brief, we’ll examine three issues that often surface when we work with IT teams on a Collaboration Program Assessment.
Tags : 
collaboration, enterprise collaboration, video conferencing, video meetings, video
    
AVI-SPL
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and e ectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
BlackBerry Cylance commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying CylancePROTECT and CylanceOPTICS. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed a representative customer currently using CylancePROTECT and CylanceOPTICS. Read the Forrester TEI to learn more about the customer’s benefits, along with the overall ROI that was achieved.
Tags : 
    
BlackBerry Cylance
Published By: Domino     Published Date: Oct 05, 2018
Industry 4.0 promises a whole host of benefits to food manufacturers — from reduced errors and more uptime to unprecedented visibility into operations at every step in the process. But for many food manufacturers out there, this is uncharted territory. Getting machines of various vintages connected and communicating seamlessly with each other and with existing control systems can seem like an expensive and difficult proposition. Coding and marking is a great place to start for many companies, since SKU proliferation is putting greater demands on packaging lines and introducing additional opportunities for human error. In this brief white paper, Domino examines five key issues with integrating coding and marking systems that often present challenges for food manufacturers along the road to Industry 4.0.
Tags : 
    
Domino
Published By: S.Himmelstein     Published Date: Jun 13, 2019
Inaccurate torque readings can lead to product inefficiencies and shortened overall product life. Learn how to accurately determine the perfect torque sensor for your application.
Tags : 
torque, torque sensor, torque readings, product life
    
S.Himmelstein
Published By: IBM     Published Date: Mar 31, 2016
"Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action. "
Tags : 
ibm, ibm operational decision manager, ibm odm advanced, process improvement, business analytics, business insights
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : 
ibm, odm, middleware, ibm operational decision manager, application services, networking, enterprise applications, business technology
    
IBM
Published By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: IBM     Published Date: Aug 08, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
fraud prevention, malware detection, threat intelligence, cybercrime, technology
    
IBM
Start   Previous    45 46 47 48 49 50 51 52 53 54 55 56 57 58 59    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee