Skip to main content
 

data

Results 12501 - 12525 of 12598Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Jan 09, 2019
Speed has become the necessary basis of competition. See how Oracle aims to help clients with this through their vision for autonomous database.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jan 09, 2019
The Accenture Oracle data team has more than 20,000 professionals, who aid in delivering 50 billion transactions a day across more than three exabytes of data for clients globally. Accenture Oracle data specialists recently put the Oracle Autonomous Data Warehouse to a rigorous performance test to provide a real-life application usage experience. The data was then extrapolated and expanded to nine years’ worth of data to test the performance. Learn directly from Accenture experts about testing methodology and results that enable them to deliver more data intelligence faster to the enterprise and transform the way people live and work.
Tags : 
    
Oracle
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Addressing the frustration that people experience with their LMS or TMS does not necessarily mean going through the involved process of selecting and implementing a new system. Often, it simply requires a realignment of business drivers, supporting processes Bluewater experts will lead you through examining User Experience, Administration, Process, Content, Data, Reporting and Technology.
Tags : 
    
Bluewater Learning
Published By: Cohesity     Published Date: Aug 21, 2018
Today's backup and recovery is complex. 68% of organizations find their IT environments more complex than they were 2 years ago! Infrastructure silos are driving unnecessary data copies which can be difficult to manage and inefficient. Organizations need a modern solution that can simplify their backup and recovery global. Download this white-paper to learn more about Cohesity and its advantages!
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Bluecore     Published Date: May 14, 2018
After decades in the limelight, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages. To better understand how retailers are using email, including the extent to which they have embraced individualized messaging opportunities and the effectiveness of those messages, Bluecore turned to the data. Our 2018 Retail Email Benchmark report provides a baseline understanding of these a
Tags : 
    
Bluecore
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Feb 14, 2019
With the new TIBCO Spotfire® A(X) Experience, we are revolutionizing analytics and business intelligence. This new platform accelerates the personal and enterprise analytics experience so you can get from data to insights in the fastest possible way. With the fusion of technology enablers like machine learning, artificial intelligence, and natural language search, the Spotfire® X platform redefines what’s possible for analytics and business intelligence, simplifying for everyone how data and insights are generated, consumed, and acted on. Download this whitepaper to learn more, then check out the new Spotfire analytics. It’s unlike anything you have ever seen. Simple, yet powerful, it changes everything.
Tags : 
    
TIBCO Software
Published By: Turbonomic     Published Date: Nov 12, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how t
Tags : 
    
Turbonomic
Published By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Regulatory compliance is more than a series of rules to adhere to, and getting it right could save you time and money. Historically, compliance has been regarded as a checklist of fixed requirements. But this reactive outlook risks being too short-sighted. It can lead to higher compliance costs, audit deficiencies, greater business downtime and an increased risk of data loss. Furthermore, it can lead to missed opportunities to achieve greater levels of operational effectiveness for your business. The only way to achieve a greater level of operational efficiency is to adopt a proactive strategy and stay ahead of the compliance curve.
Tags : 
    
DigiCert
Published By: Sage Software     Published Date: Oct 23, 2018
Modernise Your Enterprise Management Legacy Enterprise Resource Planning (ERP) solutions are no longer capable of keeping up with today’s fast-moving world – Enterprise Management is the new business reality. Whether you’re a manufacturer, distributor, service provider or mid-market enterprise, we’ll reveal to you a world beyond ERP. • Download our new ‘Move Beyond ERP’ eBook to understand the business challenges you have, and how to meet them. • Understand why businesses are outgrowing traditional ERP and are burdened by its inefficiencies. • Look at the benefits of Enterprise Management, which provides real-time data intelligence, improved forecasting, and accelerated business processes.
Tags : 
bms, erp, bom, enterprise accounting, enterprise intelligence, drp, enterprise, mrp
    
Sage Software
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
With GDPR looming large on the horizon in May 2018 and beyond, there are a number of myths and misunderstandings circulating around the upcoming changes to compliance and data protection. In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system, and delve into topics, like: • GDPR strategies for cloud ECM • Cultural changes for upcoming compliance regulations • Projected fines associated with GDPR • And more
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
There’s more to your content than you might think. Beyond the differences of enterprise vs. web vs. cloud content management, new changes in intelligent machine-to-machine apps are reinventing the content management market. In this expert e-guide, we explore a flexible, API-led approach to cloud-based content management and collaboration. Learn about a platform designed to enable you to: • Power content with machine learning and metadata • Drive intelligent capabilities like smart search • Modernize content-based processes • And more
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
These days, everyone's talking about digital transformation. But exactly how does your company get there? Capture is a great place to start — in fact, it's one of the most critical steps to take as you move your business into the digital age. Whether it’s simply using OCR to make content more easily discoverable, adding and enhancing metadata to drive specific processes, or classifying content from the onset for better information governance, capture adds a ton of value to your existing content assets. This ebook details our key takeaways from AIIM's Industry Watch Report, Improving Business Operations in 2017: Capturing Vital Content. We share how cloud-based capture tools are replacing the longstanding legacy of paper-based processes to streamline and speed up the way you do business. Download the ebook to learn: • How the latest capture innovations can support your digital strategy • 5 business processes that benefit most from advanced capture technologies • The key benefits of c
Tags : 
    
Box
Published By: Butler Technologies     Published Date: Jul 03, 2018
MPO connectors increase your data capacity with a highly efficient use of space. But users have faced challenges such as extra complexities and time required for testing and troubleshooting multi-fiber networks. VIAVI helps overcome these challenges with the industry's most complete portfolio of test solutions for MPO connectivity.
Tags : 
    
Butler Technologies
Published By: KPMG     Published Date: Jul 10, 2018
Modern regulation demands connected thinking, leading-practice processes, optimal data management and insightful reporting – all of which makes the finance function the ideal catalyst for change. Read this report to find out: • how to structure a transformation plan and strategy • how to create the optimal team for transformation • what leading companies are doing to drive transformation through regulatory change.
Tags : 
    
KPMG
Published By: Lenovo and Intel     Published Date: Sep 10, 2019
In today’s rapidly changing security landscape, you simply can’t afford to let your guard down. Studies show that a staggering 4.5 billion records were compromised in the first half of 2018.The total cost of a single data breach is now $3.86 million. Meanwhile, the stealth of recent attacks has increased the time it takes to contain a breach—69 days, on average. To investigate how enterprises are responding to these proliferating threats, Lenovo commissioned a global survey of IT decision makers. The following research looks inside the volatile security landscape and shows us why keeping PCs secure today is harder than ever before.
Tags : 
    
Lenovo and Intel
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Published By: HERE Technologies     Published Date: Sep 26, 2018
Mobile has become the first screen for consumers in terms of internet time spent. Hyperlocal location data is unique to mobile and provides a lot of new, valuable information about consumers. Today’s sophisticated buyers demand more transparency in location data science, better campaign performance and ROI from attribution modeling. Finding the right partner that can help build the bridge between real-world consumer behavior and mobile programmatic advertising in a transparent way is essential. To meet those challenges and address the demand for top quality location data, adsquare integrated a global database of HERE Places in April 2017. By leveraging HERE Places and overlaying raw location data of anonymous users with POI data points, adsquare is able to understand exactly what consumers are doing in the real world: what places they visit, when and how often. To find out more download this paper today.
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 26, 2018
How do you keep people safe in a ‘once in a 1,000 years’ weather event? Hurricane Harvey was a category four hurricane which struck the coast of Texas, eastern Texas and southwestern Louisiana in August 2017. HERE was able to track the storm and accurately report more than 2,100 road closures and blockages in real-time helping people stay out of harm’s way. HERE is the world’s leading provider of traffic incident information to the automotive industry. This eBook shows how HERE’s deploys its people and artificial intelligence to gather the data, check it for accuracy and produce insights which keeps drivers safe.
Tags : 
    
HERE Technologies
Start   Previous    490 491 492 493 494 495 496 497 498 499 500 501 502 503 504    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.