Skip to main content
 

analysis

Results 201 - 225 of 1247Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software APAC     Published Date: Aug 15, 2018
Produced in collaboration with INFOPRO Digital with participation from Capgemini MAINTENANCE MADE EASY WITH THE HELP OF DATA Predictive maintenance involves gathering targeted data for analysis, the results of which will help anticipate potential failures before they occur. Companies opt for this type of maintenance to avoid predictable incidents and repair equipment, assembly lines, or machinery with minimum impact on their operations.
Tags : 
    
TIBCO Software APAC
Published By: Splunk     Published Date: Aug 17, 2018
Imagine a world where incident alerts arrive 30 minutes before problems even begin — you’d actually have the power to prevent outages and deliver a truly seamless experience to your customers. Sound impossible? Think again — the right AIOps (Artificial Intelligence for IT Operations) solution can help you maintain uptime, reduce manual incident-management tasks and increase productivity.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations are now responsible for delivering seamless customer experiences while preventing outages and managing an increasing number of systems. With growing responsibility placed on IT, there is an opportunity to drive strategy for company-wide business processes and operations. Companies using machine data powered platforms like Splunk collect disparate data types to quickly troubleshoot and monitor systems. By adding predictive capabilities, IT can glean critical insights for the business and develop strategic initiatives on issues that matter. Download the white paper “Embracing the Strategic Opportunity of IT” to learn how to: Enable a business aware IT organization Unlock operational efficiencies Solve problems with predictive analytics
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 22, 2018
The world of artificial intelligence (AI) has finally arrived at the doorstep of IT operations. As organizations move toward using both big data and machine learning functionality to support a variety of IT operations, processes and tasks, artificial intelligence for IT operations (AIOps) platforms have emerged as a one-stop solution. Gartner has released a “Market Guide for AIOps Platforms” that provides findings about the AIOps industry and its latest developments. Download your complimentary copy to: *Gain insight into the developing industry of AIOps and its future *Learn how to optimize IT operations powered by machine learning to drive business value *Compare different AIOps platform vendors and their range of capabilities
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
    
Splunk
Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
Marketing automation is quickly becoming a competitive necessity for most organizations. According to a recent Demand Gen Report, 42% of b2b marketers identified marketing automation as the tool they plan to test or deploy in 2016—beyond predictive analysis, account-based marketing, lead nurturing, and attribution modeling. Download this white paper to discover how to use marketing automation to attract, engage, and convert buyers across all marketing channels by streamlining workflow, monitoring social, and managing content.
Tags : 
    
Oracle Marketing Cloud
Published By: Aberdeen Group     Published Date: Aug 04, 2015
The practice of using predictive analytics for marketing is becoming much more commonplace, but, in many ways, this field is still immature. Marketers are using analytics to identify new prospects, qualify leads, predict close rates, and optimize pricing, but there are still many ways to refine these methods -- along with many pitfalls to avoid. Download this white paper to learn how to win the B2B marketing analytics poker game.
Tags : 
predictive analytics, leads, pricing, close rates, public data, social media, data analysis, internet marketing, marketing research
    
Aberdeen Group
Published By: McAfee     Published Date: May 07, 2014
A Gartner report showing its key findings, recommendations and analysis of endpoint protection platforms.
Tags : 
endpoint protection platforms, gartner, mcafee, epp analysis
    
McAfee
Published By: McAfee     Published Date: May 07, 2014
A report into the findings after the testing of 11 enterprise level endpoint protection (EPP) products.
Tags : 
    
McAfee
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
It is important to understand the different business situations where traditional predictive analytics can be best applied and where anticipatory analytics may be a more appropriate approach to solve the business problem. One is not necessarily superior to the other – it’s about which methodology is best utilized in solving the specific business problem. Conventional response modeling, revenue potential modeling, wallet share analysis, traditional risk scoring and other analytic practices will always be important tools for businesses far-and-wide, but as more companies focus on analytics to inform growth, they’ll have employ the right team and identify the right partners to work with in order to successfully leverage anticipatory analytics to gain a competitive advantage. Looking forward, we anticipate anticipatory analytics playing an important role in your future. Download this white paper to learn more.
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Feb 02, 2016
Take the mystery out of business credit data The modern-day explosion in data has presented new challenges for interpreting financial reports to uncover meaningful insight. We often struggle to be efficient with the resources we have and the data we use to make our decisions, whether we’re talking with a new customer or an existing one.
Tags : 
hoovers, credit data, data analysis, credit report, evaluation, risk assessment
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Apr 21, 2016
When the right approach is applied, analytics can drive more effective marketing strategies. While marketers understand the role analytics plays within the organization, most are not leveraging analytics to really drive enterprise performance. We surveyed 100+ business leaders to understand the state of analytics maturity across today’s leading organizations, uncovering common challenges teams are facing in their quest to use data and analytics to deliver a competitive advantage. What We Uncovered: - 73% of analytic professionals claim to work for an analytically-driven company - Only 42% of companies have a strategy for using analytics across the enterprise - Just 38% of companies share results of their analytic insights outside their department - 81% of organizations rely on 3rd parties for at least some portion of their analysis Download the report to learn how marketers, like yourself, view themselves in light of using analytics to drive their business.
Tags : 
hoover's, marketing strategies, analytics, data, internet marketing, sales
    
Dun & Bradstreet
Published By: Hitachi Vantara     Published Date: Mar 20, 2018
ESG Lab performed hands-on evaluation and testing of the Hitachi Content Platform portfolio, consisting of Hitachi Content Platform (HCP), Hitachi Content Platform Anywhere (HCP Anywhere) online file sharing, Hitachi Data Ingestor (HDI), and Hitachi Content Intelligence (HCI) data aggregation and analysis. Testing focused on integration of the platforms, global access to content, public and private cloud tiering, data quality and analysis, and the ease of deployment and management of the solution.
Tags : 
    
Hitachi Vantara
Published By: Arbor     Published Date: Sep 15, 2014
This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.
Tags : 
ddos attacks, it security, ddos mitigation
    
Arbor
Published By: RelayHealth     Published Date: Apr 01, 2013
RelayHealth's Vice President, Business Analytics, Jason Williams examines how healthcare organizations can better set strategies by focusing on key decision points and adding data from real-time sources to what they have already collected.
Tags : 
ecosystem, healthcare, real-time data, data, analysis, decision making, business analytics, electronic health records, business intelligence, enterprise content management, data warehousing
    
RelayHealth
Published By: Dell EMC     Published Date: Apr 18, 2017
In this paper the case for Hyper-Converged Appliances, and in particular the Dell EMC VxRail Appliance, is made from both cost and measurable effort perspectives. Strict reliance on measurables was used in lieu of anecdotal observations or customer quoted benefits in order to provide realistic and repeatable analysis.
Tags : 
emc, vxrail, hyper-convergence, converged infrastructure, performance
    
Dell EMC
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : 
security. ibm, ibm i2, cyber-intelligence, fraud, malware
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
This white paper is intended for: • Potential users such as analysts and investigators who want information about i2 Analyst’s Notebook Premium and the benefits it provides • System administrators who wish to gain a high-level understanding of the product and the system prerequisites that are needed to install and run the application • Users who wish to learn how to exploit the maximum value of i2 Analyst’s Notebook Premium. This document provides an overview of the i2 Analyst’s Notebook Premium product. For more information on product features and capabilities in specific versions visit: ibm.com/smartercities.
Tags : 
ibm product, analyst notebook premium, product capabilities, information analysis
    
IBM
Published By: Concur     Published Date: May 07, 2012
Download our full Benchmark Report 2012 analysis and learn best practices on how your business can ensure money is not leaking away undetected.
Tags : 
concur, finance, business, travel and expense management, budget
    
Concur
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: Taleo     Published Date: Apr 11, 2011
Create an environment where employee and managers can track assigned activities, communicate job performance expectations, and define goals that are aligned to business objectives. Performance management ensures that everyone is focused on the right initiatives to deliver results.
Tags : 
taleo, performance review, business strategy, performance management, goal management, reporting, analysis, compensation, saas, qualitative goals, quantitative goals, organizational objectives, hr professionals
    
Taleo
Published By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : 
renewable energy, customer profile, emc, risk management, best practices, storage, technology
    
EMC Corporation
Published By: EMC Corporation     Published Date: Feb 13, 2015
The latest research from IT analysts consistently rank XtremIO all-flash array at the top.
Tags : 
it analysis, xtremio, all-flash array
    
EMC Corporation
Published By: EMC Corporation     Published Date: Feb 13, 2015
This IDC study provides detailed insights into the rapidly growing market for enterprise storage systems that leverage flash storage media. This study segments this market into the following two technology segments: AFAs and HFAs. Insights into these two market segments are provided historically. Market shares and IDC analysis are provided for each of the top vendors in these two segments along with detailed market-level analysis.
Tags : 
all-flash-array, enterprise storage systems, flash storage, market-level analysis, hybrid flash array
    
EMC Corporation
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.