Social Networking in the Enterprise: Benefits and Inhibitors
By: Cisco Systems, Inc. View more from Cisco Systems, Inc. >>
Download this next:
ESG analyst report: Securing multi-channel collaboration tools
By: SlashNext
Type: ESG Showcase
47% of organizations surveyed by TechTarget’s Enterprise Strategy Group (ESG) leverage 6 to 10 formally sanctioned communication and collaboration tools.
Additionally, 36% of companies experience multi-vector, socially engineered attacks weekly, according to ESG research.
You may have some questions, including:
- How can organizations defend their many tools against multi-vector attacks?
- What attack tactics are threat actors employing?
- And more
Find answers in this 6-page ESG Showcase report, penned by Principal Analyst at ESG, Dave Gruber.
These are also closely related to: "Social Networking in the Enterprise: Benefits and Inhibitors"
-
How to maximize hybrid work through audio quality
By: Shure Inc
Type: Blog
With so many organizations now operating with hybrid or remote teams, 38% of companies indicate that collaboration is a key driver for office redesign.
However, this collaboration can’t happen without the proper chat and meeting tools, meeting that video and audio quality must be top-notch.
These findings from the latest IDC Future of Work Survey can provide you with expert insight into the current hybrid work landscape, as well as the top vendors that can help you improve your processes.
Browse the article to learn more.
-
IT Channel Guide to the Untapped Audio-Visual Market Opportunity
By: Shure Inc
Type: White Paper
With 44% of today’s employees reporting that they’re not satisfied with their communication equipment for teamwork, it has become critical for organizations to invest in more advanced collaboration technologies. This demand has made audiovisual (AV) competency a critical skill for IT service providers and an opportunity to plug gaps in their solution offering.
Browse this white paper to discover how forward-thinking MSPs and VARs are capturing new business potential by internalizing AV expertise.
Find more content like what you just read:
-
44-page e-book: CPaaS trends in 2024
By: Kaleyra
Type: eBook
By 2025, Gartner predicts, 95% of global enterprises will leverage API-enabled CPaaS (communication platform as a service) offerings. With the prevalence of CPaaS in mind, what trends should you expect in the CPaaS landscape throughout 2024? Find out in this e-book, “Scaling Communications: CPaaS and Global Expansion.”
-
The necessity of office spaces in the era of hybrid work
By: Shure Inc
Type: Blog
Since remote work became mainstream, 1 out of 3 organizations have seen productivity diminish over time as employees suffer from digital fatigue and loss of corporate culture. But with so many now comfortable with hybrid work models, one question arises: are office spaces really necessary? Access this article to learn more.
-
Why do you need to prioritize your employee audio?
By: Shure Inc
Type: Infographic
With 50% of today’s organizations agreeing that poor audio quality leads to reduced decision-making ability, it has become critical for leaders to prioritize improving the tools they use to collaborate during meetings. So, how can you do so? Browse this infographic to learn more.
-
Educator technology: Can you keep up with growing needs?
By: Schneider Electric
Type: White Paper
The technology needs of educators are evolving at breakneck speed. Can you keep up? Download this white paper to learn how you can evaluate your current educational technology deployment, and what improvements you can make to provide superior education.
-
The secret to hybrid work? Improving your audio quality
By: Shure Inc
Type: Webcast
In order to run an effective hybrid workspace, you must have effective technology. So, for organizations that struggle to enable successful collaboration and communication, what steps should be taken to ensure improved experiences for everyone, no matter where they work? Tune into this webinar to learn more.
-
UC & AV: Your Keys to Capturing the Growing Video Conference Market
By: Shure Inc
Type: Blog
With it being predicted that by 2024 only 9% of organizations anticipate that all employees will work in formal office spaces and that 38% plan to have more geographically dispersed offices, it has become clear that hybrid work isn’t going anywhere. Browse this article to learn more.
-
Maximising return on digital investments
By: TechTarget ComputerWeekly.com
Type: Research Content
What impact do digital technology transformations have on productivity? This in-depth study from the World Economic Forum offers some answers.
-
AI security study: 1,800 security practitioners’ insights
By: Darktrace
Type: Research Content
With the participation of 1,800 security leaders and practitioners, Darktrace recently conducted a study with the aim of better understanding the state of AI in cybersecurity, understanding the role AI is playing in threat ideation and development, as well as security implementation. Download the report now to learn more.
-
The digital enterprise: Moving from experimentation to transformation
By: TechTarget ComputerWeekly.com
Type: Research Content
This in-depth report from the World Economic Forum explains how companies can make sure their digital transformation projects are a success.
-
Untapped Value: What Every Executive Needs to Know About Unstructured Data
By: Box
Type: Analyst Report
While unstructured content is often spread across systems and siloed, it’s also full of untapped value. Check out exclusive research around unstructured data in this Box-sponsored IDC white paper, learn the impact of content sprawl on security and productivity, and see how GenAI helps unlock your content’s value.
-
A Computer Weekly Buyer's Guide to Enterprise social networking
By: TechTarget ComputerWeekly.com
Type: eGuide
Companies are discovering the many advantages of communicating through social networking platforms. In this 14-page buyer's guide, Computer Weekly looks at how they can revolutionise collaboration, the options available for retailers and the pitfalls of communication overload
-
Identity trends for 2023
By: TechTarget ComputerWeekly.com
Type: eGuide
Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
-
IAM: Managing identity remains key to cyber security
By: TechTarget ComputerWeekly.com
Type: eGuide
IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
Hacking the Human Operating System
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
Enterprise Strategy Group analysis of Sprinklr Social Ultimate for omnichannel CX
By: Sprinklr
Type: ESG Technical Validation Report
How can companies like yours streamline social media CX while reducing tool sprawl? Examine this ESG Technical Validation to discover how Sprinklr Social Ultimate fills this need, unifying customer and prospect engagement, reporting, and marketing across social, chat, review, and messaging.
-
Enterprise Strategy Group report: Mature data innovation
By: FCN
Type: ESG Research Report
Surveying 2,000 IT decision makers, Enterprise Strategy Group (ESG) sought to track the business benefits of optimizing data innovation. Explore the findings in this report.
-
CW Europe – March 2017
By: TechTarget ComputerWeekly.com
Type: Ezine
Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.
-
CW APAC: Trend Watch - business response to coronavirus
By: TechTarget ComputerWeekly.com
Type: Ezine
With countries the world over reeling from the Covid-19 coronavirus outbreak, which has meant sweeping changes both economically and socially, Computer Weekly looks at how firms in the Asia-Pacific region have adapted to what has so quickly become the new normal.
-
MicroScope: Grasp the social networking opportunity
By: MicroScope
Type: Ezine
An issue looking at the issues around social media, the growth in unclouding and some security industry predictions for the year ahead.
-
The 5 key dimensions of digital-led sustainability
By: Fujitsu
Type: eBook
In this exclusive e-book, discover the 5 key dimensions of digital-led sustainability, and why, for many organizations, sustainable transformation is already underway.
-
CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs
By: TechTarget ComputerWeekly.com
Type: Ezine
Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.
-
CW Benelux - November 2021-January 2022: Dutch IT company rips up the HR rule book for better work-life balance
By: TechTarget ComputerWeekly.com
Type: Ezine
One Dutch tech firm has used learnings from the pandemic to rip up its HR rule book and implement an official work-from-home policy. In fact, Infolearn has gone further than hybrid working, with a personal mobility budget for staff and a four-day working week.
-
A Computer Weekly buyer's guide to graph databases
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.
-
Computer Weekly 16 July 2019: Reaping the benefits of digital transformation at Defra
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.
-
CIO Trends #8: Nordics
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we take a look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at a pace. This e-guide features an article about each.
-
CIO Trends #8: Nordics
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we take a look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at a pace. This e-guide features an article about each.
-
CIO Trends #10: Nordics
By: TechTarget ComputerWeekly.com
Type: eGuide
Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.
-
CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
By: TechTarget ComputerWeekly.com
Type: Ezine
Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
-
CW Nordics February 2019
By: TechTarget ComputerWeekly.com
Type: Ezine
In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.
-
Are we trusting social networks too much?
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
5 Cybersecurity Best Practices
By: Advanced
Type: Research Content
Along with highlighting trends and major risks in cybersecurity in 2023, this report maps out 5 best practices for security success. #1: Reduce your attack surface by segmenting your network and removing any SaaS applications that are no longer necessary for your organization. Continue on to uncover the rest.
-
Computer Weekly - 1 December 2020: How retailers are using technology to survive
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, with high-street retailers struggling to survive, we look at how technology can keep stores relevant. Everyone is focusing on flash storage, but hard disk drives are still an essential part of the IT toolkit. And we examine the latest developments in the ongoing Post Office Horizon IT scandal. Read the issue now.
-
How to use technology to respond to buyer’s behaviors
By: Nomios
Type: White Paper
There have been many factors over the past few years that have changed consumer buying behaviors. Because of these shifts to digital, there is now an increased emphasis on data collection to understand customers and tailor your marketing efforts. Read on to learn more about the changes in retail digital buying and the benefits of harvesting data.
-
Staying relevant as a retailer: The role of the network
By: Nomios
Type: eBook
As more customers embrace digital shopping, retailers must adopt to meet shoppers’ needs and stay relevant. This e-book explores the critical role that network technology plays in achieving these goals. Continue reading to discover 6 benefits that a strong network infrastructure can deliver for retailers.
-
A Computer Weekly buyer's guide to CIO leadership
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.
-
Computer Weekly 26 November 2019: Why thousands of IT contractors face 'life-changing' tax bills
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue of Computer Weekly, we investigate HMRC's loan charge policy, a retrospective tax grab that has left thousands of IT contractors facing financial ruin. We compare the cloud storage offerings from AWS, Microsoft and Google. And we find out how retailers are turning to tech to deal with a new generation of shoppers.
-
CW Nordics - May-July 2022: How the Estonian government created a digital assistant to support citizens
By: TechTarget ComputerWeekly.com
Type: Ezine
As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services.
-
Marketing automation platforms: 5 key features
By: Marketo
Type: eGuide
Read this comprehensive list of features you should look for before choosing a marketing automation platform. See this breakdown of five key automation areas, with specific clusters of features outlined.
-
Computer Weekly - 30 November 2021: Digital beats - how Warner Music turned to the cloud
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the CIO of Warner Music about how cloud computing helps it meet the needs of music lovers. AstraZeneca discusses how its enterprise social media system helped through the pandemic. And we assess the tech sector's response to the government's plans to tackle digital skills shortages. Read the issue now.
-
Counter-strategy: How to conquer APT-style attacks
By: Dimension Data
Type: eGuide
In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
-
CW Europe March-May 2019: Robots deliver savings for Dutch postal service PostNL
By: TechTarget ComputerWeekly.com
Type: Ezine
European businesses have bought into the digital revolution, with the adoption of the latest technologies like automation enabling companies to transfer their internal operations.
-
Computer Weekly – 9 July 2019: Steering a voyage to the cloud at Maersk
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how the world's largest shipping company, Maersk, is steering a course to public cloud. We analyse SAP's latest attempts to ease customers' software licensing concerns. And we hear how one London borough, Hackney, is taking a lead in transforming digital government across the capital. Read the issue now.
-
A Computer Weekly Buyers Guide to IoT
By: TechTarget ComputerWeekly.com
Type: eGuide
In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
-
Upstack Digest Cybersecurity
By: Upstack, Inc.
Type: White Paper
This complimentary digest is filled with advice from UPSTACK experts in the trenches of today’s cyberwar.
-
Global IT Priorities Report 2016
By: TechTarget ComputerWeekly.com
Type: Research Content
Benchmark your IT spending plans with our in-depth study of IT spending priorities from around the world.
-
CW ANZ: Trend Watch - communications infrastructure
By: TechTarget ComputerWeekly.com
Type: Essential Guide
In this handbook, Computer Weekly looks at how Australia's bushfires impacted its telecoms networks and the increase in SD-WAN adoption in Asia-Pacific
-
Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
By: TechTarget ComputerWeekly.com
Type: eGuide
Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
-
Computer Weekly – 5 July 2022: How to get the right level of cyber insurance
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.
-
CW Nordics: Bergen's tech hub seeks global success
By: TechTarget ComputerWeekly.com
Type: eGuide
Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.
-
CW Nordics - August-October 2020: Bergen's tech hub seeks global success
By: TechTarget ComputerWeekly.com
Type: Ezine
Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.
-
Protecting your organisation from itself
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
-
Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.
-
Computer Weekly - 16 March 2021: Containers play a key role in post-pandemic IT architectures
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our latest buyer's guide examines the key role that container technology will play in post-pandemic IT architectures. The UK government is under fire for its opaque approach to gigabit broadband strategy. And we assess the storage options for the growing volumes of unstructured data. Read the issue now.
-
Computer Weekly - 11 January 2022: How Pepsi is taking digital to the max
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to PepsiCo's digital director about delivering innovation in customer experience. Our first buyer's guide of 2022 examines hybrid cloud storage. And we find out how Arkwright and Granville from the BBC sitcom Open All Hours are inspiring retailers 40 years on. Read the issue now.
-
Beyond your company boundaries
By: TechTarget ComputerWeekly.com
Type: Research Content
Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.
-
Royal Holloway: Attack mapping for the internet of things
By: TechTarget ComputerWeekly.com
Type: Research Content
The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.