X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 survey questionaire


Symantec 2011 SMB Disaster Preparedness Survey Report
Discover how to protect your company in the Symantec 2011 SMB Disaster Preparedness Survey Report.

survey questionaire  2011 SMB Disaster Preparedness Survey Report Symantec 2011 SMB Disaster Preparedness Survey Report Is your company prepared if a disaster strikes your network or computer systems? It could be hackers, disgruntled employees, system upgrade problems, viruses, malware, power outages, or natural disasters. And they all seem to be happening with greater frequency than ever before. Discover how to protect your company in the Symantec 2011 SMB Disaster Preparedness Survey Report . You'll learn about the five

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » survey questionaire

Sage Mobile Device Survey Shows Interesting Findings


Sage recently announced the results of its second annual mobile device survey, which polled 1,090 small- and medium-sized businesses (SMBs) in the U.S. The results include findings about the adoption of mobile devices in the business world and what positive effects mobile device usage is providing for SMBs today.

survey questionaire  Mobile Device Survey Shows Interesting Findings Sage recently announced the results of its second annual mobile device survey , which polled 1,090 small to medium businesses (SMBs) in the U.S. Only slightly more than half of the businesses (54 percent) responding to the survey supply their employees with mobile devices, down from 69 percent in the 2013 survey.   When asked about the positive effect mobile technology has had on their businesses, the majority of respondents somewhat expectedly said Read More

Survey: Women in Business Intelligence


Are you a woman working in BI? Do you work with women in BI? Take our survey. This is part of the research for a special report I’m preparing on the role of women in the field of business intelligence (BI). I previously summarized some of the thinking behind this research (Are You a “Data Geekette”?), and I’ve received a wide range of comments on the blog and via Twitter: Most

survey questionaire  in BI? Take our survey . This is part of the research for a special report I’m preparing on the role of women in the field of business intelligence (BI). I previously summarized some of the thinking behind this research ( Are You a “Data Geekette”? ), and I’ve received a wide range of comments on the blog and via Twitter: Most ridiculous thing I've read in weeks... I have been a woman in IT for over 15 years, the last 6 as a contractor effectively ‘on the market’ every 6 months. I would be Read More

Mobile BI Market Survey


Take our mobile BI survey. The business intelligence (BI) space is finally seeing mainstream adoption of mobile capabilities, and increasing numbers of software providers are developing mobile BI capabilities to meet the demands of their customers. This evolution is shifting the way people consume and use data. TEC is currently preparing a report that captures the landscape of mobile BI.

survey questionaire  BI Market Survey Take our mobile BI survey.  The business intelligence (BI) space is finally seeing mainstream adoption of mobile capabilities, and increasing numbers of software providers are developing mobile BI capabilities to meet the demands of their customers. This evolution is shifting the way people consume and use data. TEC is currently preparing a report that captures the landscape of mobile BI. Mobile BI applications enable anytime, anywhere access to data for analysis, improving the Read More

Case Study: Survey Applications


A global marketing information firm was conducting paper- and telephone-based employee exit surveys. However, its manual process was time-consuming and costly. There was also the challenge of obtaining honest, accurate data from the employees in a completely confidential manner. Thus, the firm needed to automate its manual employee exit survey process, and replace it with a web-based application.

survey questionaire  Study: Survey Applications A global marketing information firm was conducting paper- and telephone-based employee exit surveys. However, its manual process was time-consuming and costly. There was also the challenge of obtaining honest, accurate data from the employees in a completely confidential manner. Thus, the firm needed to automate its manual employee exit survey process, and replace it with a web-based application. Read More

Are You Doing Enough to Prevent Access Risk and Fraud?


A recent survey of enterprise resource planning (ERP) customers reveals that they are serious about protecting their critical applications from the risks associated with user access, and that managing access risks is very important to senior leadership in their organizations. In fact, the top driver for these programs is internal policies, whereas traditionally, access risk programs have been driven more by regulatory compliance. Read this white paper to learn more.

survey questionaire  and Fraud? A recent survey of enterprise resource planning (ERP) customers reveals that they are serious about protecting their critical applications from the risks associated with user access, and that managing access risks is very important to senior leadership in their organizations. In fact, the top driver for these programs is internal policies, whereas traditionally, access risk programs have been driven more by regulatory compliance. Read this white paper to learn more. Read More

TEC 2012 WCM Market Survey Report: What Organizations Want in Web Content Management


This report is based on aggregate data collected from more than 340 WCM software comparisons performed using Technology Evaluation Centers' (TEC's) TEC Advisor software selection application. According to TEC survey data, organizations today are commonly seeking these functionalities from a WCM system: authentication and security, import and export functionality, search and indexing, and personalization management.

survey questionaire  2012 WCM Market Survey Report: What Organizations Want in Web Content Management This report is based on aggregate data collected from more than 340 WCM software comparisons performed using Technology Evaluation Centers' (TEC's) TEC Advisor software selection application. According to TEC survey data, organizations today are commonly seeking these functionalities from a WCM system: authentication and security, import and export functionality, search and indexing, and personalization management. Read More

TEC 2012 ECM Market Survey Report: What Organizations Want in Enterprise Content Management Software


This report is based on data collected from more than 750 enterprise content management (ECM) software comparisons performed using Technology Evaluation Centers’ (TEC’s) TEC Advisor software selection application. TEC data show that organizations currently seeking ECM solutions value security management, a wide variety of pricing options, document management, on-premise functionality, and workflow management.

survey questionaire  2012 ECM Market Survey Report: What Organizations Want in Enterprise Content Management Software This report is based on data collected from more than 750 enterprise content management (ECM) software comparisons performed using Technology Evaluation Centers’ (TEC’s) TEC Advisor software selection application. TEC data show that organizations currently seeking ECM solutions value security management, a wide variety of pricing options, document management, on-premise functionality, and workflow Read More

How to Get More Value from Your Survey Data


This white paper introduces four types of advanced analysis—cluster, factor, reliability, and regression—that can help you gain insights that you might miss using basic methods. By expanding your survey analysis toolkit, you can delve deeper into data to increase understanding of survey responses and respondents, create better measures of concepts, and make more accurate predictions about behaviors and attitudes.

survey questionaire  More Value from Your Survey Data This white paper introduces four types of advanced analysis—cluster, factor, reliability, and regression—that can help you gain insights that you might miss using basic methods. By expanding your survey analysis toolkit, you can delve deeper into data to increase understanding of survey responses and respondents, create better measures of concepts, and make more accurate predictions about behaviors and attitudes. Read More

Trigo Helps Suppliers Connect


Trigo believes that suppliers want help in managing online customers and has the survey results to prove it.

survey questionaire  Event Summary In a survey of two dozen suppliers, Trigo found that a majority of them are being asked by their customers to sell online and that a large proportion of them - over 70% - feel that complete management of online sales processes is the most important criterion in selecting a sell-side solution. These results bode well for Trigo, a provider of solutions to suppliers for sell-side channel management, content management, order management, and connectivity. Market Impact The current discipline of Read More

Netsize Mobile Marketing Survey 2009


Can your company and brand rise to the challenge and cash in on mobile marketing opportunities? Companies are often bullish about mobile marketing benefits, but lack the skill set to execute campaigns. And, though the interest in targeting consumers is high, the concern that opt-in databases won’t deliver is also high. Learn more about the dos and don’ts of mobile marketing, so you can ensure more effective campaigns.

survey questionaire  Mobile Marketing Survey 2009 Can your company and brand rise to the challenge and cash in on mobile marketing opportunities? Companies are often bullish about mobile marketing benefits, but lack the skill set to execute campaigns. And, though the interest in targeting consumers is high, the concern that opt-in databases won’t deliver is also high. Learn more about the dos and don’ts of mobile marketing, so you can ensure more effective campaigns. Read More

Market Focus Report: The Value of Mobile and Social for CRM


Nucleus Research surveyed 223 CRM decision makers to analyze the benefits of adding mobile device access and social capabilities to CRM. Respondents included small, medium, and large enterprises using both on-demand and on-premise CRM applications. Results show that adding mobile access and social collaboration to CRM delivers significant benefits to organizations. See why you should consider mobile and social CRM adoption.

survey questionaire  for CRM Nucleus Research surveyed 223 CRM decision makers to analyze the benefits of adding mobile device access and social capabilities to CRM. Respondents included small, medium, and large enterprises using both on-demand and on-premise CRM applications. Results show that adding mobile access and social collaboration to CRM delivers significant benefits to organizations. See why you should consider mobile and social CRM adoption. Read More

Unified Human Capital Management and Talent Technology Survey Report: How Human Capital and Talent Technology Are Influencing Global Business


This Unified Human Capital Management and Talent Technology Survey Report addresses how businesses are using human capital management (HCM) to meet their growth goals. The survey results are representative of large and smaller enterprises and reflect the input of 126 respondents.

By downloading this document, you agree to provide contact information and other data to select sponsors of this content.

survey questionaire  Management and Talent Technology Survey Report: How Human Capital and Talent Technology Are Influencing Global Business This Unified Human Capital Management and Talent Technology Survey Report addresses how businesses are using human capital management (HCM) to meet their growth goals. The survey results are representative of large and smaller enterprises and reflect the input of 126 respondents. By downloading this document, you agree to provide contact information and other data to select sponsors of Read More

BI on the Go . . . So, Who’s Using Mobile BI?


In this first of two posts, TEC senior BI and data management analyst Jorge García presents some of the main findings of the TEC 2014 mobile survey on the usage of mobile BI offerings by enterprises—who's using mobile BI offerings and from which vendors, and which industry is showing the interest in mobile BI solutions.

survey questionaire  took the opportunity to survey users of mobile business intelligence (BI) applications and collect their impressions in regard to these tools. Most of the results of this survey with more than 250 respondents were captured in an Infographic . Additional information garnered from the survey, while not conclusive, may provide a glance into the sentiment of the respondents on their use of mobile BI applications. In this post, I’ll describe some of those results, which may be useful for those organizations Read More

Are You Doing Enough to Prevent Access Risk and Fraud?


A recent survey of enterprise resource planning (ERP) customers reveals that they are serious about protecting their critical applications from the risks associated with user access, and that managing access risks is very important to senior leadership in their organizations. In fact, the top driver for these programs is internal policies, whereas traditionally, access risk programs have been driven more by regulatory compliance. Read this white paper to learn more.

survey questionaire  and Fraud? A recent survey of enterprise resource planning (ERP) customers reveals that they are serious about protecting their critical applications from the risks associated with user access, and that managing access risks is very important to senior leadership in their organizations. In fact, the top driver for these programs is internal policies, whereas traditionally, access risk programs have been driven more by regulatory compliance. Read this white paper to learn more. Read More