RSS feed Get our RSS feed

News by Topic

analysis

Results 301 - 325 of 1199Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 14, 2017
Today’s CMO is responsible for selling experiences, not just products. Two-thirds of our respondents regard developing deeper, richer customer experiences as their top marketing priority. Learn how Torchbearer CMOs are meeting these expectations and expanding their roles by putting the entire customer journey first.
Tags : technology advances, convergence, personalized customer experience, customer interaction, predictive analysis
     IBM
By: IBM     Published Date: Jul 14, 2017
Today’s CMO is responsible for selling experiences, not just products. Two-thirds of our respondents regard developing deeper, richer customer experiences as their top marketing priority. Learn how Torchbearer CMOs are meeting these expectations and expanding their roles by putting the entire customer journey first.
Tags : cloud computing, mobile solutions, convergence, technology advances, predictive analysis, business value
     IBM
By: IBM     Published Date: Nov 03, 2017
Ironically, the most important business decisions are too often based not on the best available data and analysis, but on the judgment calls of HIPPOs — the highest-paid people in the organization. In large part, these individuals became HIPPOs in the first place because, over the course of their professional careers, their intuition and gut feel has tended to be more right than wrong. This approach may have sufficed in simpler, slower-moving times. But modern enterprises are too connected and too fast-paced for important business decisions to be made strictly on individual intuition and gut feel. For better-informed decision-making, your organization’s decision-makers need timely access to information they can rely on.
Tags : hippo, ibm, decision-makers, modern enterprise
     IBM
By: Datastax     Published Date: Mar 06, 2018
Ever since the invention of the abacus, the banking industry has been on the leading edge of technological innovation. Today more than ever, the industry relies on game-changing software to provide high-performing business-critical operations, analysis, and insights for retail banking, loans, credit cards, and more.
Tags : 
     Datastax
By: AppDynamics     Published Date: Apr 04, 2018
Application performance monitoring (APM) companies are quickly becoming some of the most important players in the IT landscape as enterprises strive to deliver best-in-class customer experiences. Download Gartner’s 2018 Magic Quadrant for APM to see: • Gartner's updated evaluation criteria • Evaluations of each recognized vendor • An analysis of current trends in the APM market
Tags : 
     AppDynamics
By: Alteryx, Inc.     Published Date: Apr 21, 2017
Analysts struggle to incorporate new sources of data into their analysis because they rely on Microsoft Excel or other tools that were not designed for data blending. Deleting columns, parsing data, and writing complicated formulas to clean and combine data every time it changes is not an efficient way for today’s analysts to spend their time. Download The Definitive Guide to Data Blending and: Understand how analysts are empowered through data blending Learn how to automate time-consuming, manual data preparation tasks Gain deeper business insights in hours, not the weeks typical of traditional approaches
Tags : 
     Alteryx, Inc.
By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : mobile, security, technology, deployment, enterprise, crow sourced, intelligence
     Symantec
By: Reputation.com     Published Date: Oct 02, 2017
1.Meet the new consumer The migration to mobile and social media will challenge — and change — everything we know about consumer marketing. 2. Who owns your brand? Brand equity can no longer be bought. Online reviews now generate total market transparency for location-based businesses. Reviews tilt the balance of branding power away from companies and into the hands of customers. 3. The battle for brick-and-mortar customers is won or lost on the social web. To win, marketers must actively enlist customers as online advocates. Those who scale online review volume and quality will be rewarded with higher search visibility and more business at street level. 4. “Dark data” provides priceless operational insights Vast amounts of unstructured, unmined sentiment data on social media provides feedback about the customer experience that you can filter using thematic analysis and use to improve operations at the national or location level. 5. Business implications Online reputation stands betwee
Tags : 
     Reputation.com
By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
While being the backbone of many organization’s Offices of Finance and Accounting, it is now commonly acknowledged that this overreliance on Excel spreadsheets coupled with the lack of visibility associated with its use represents a very real risk. With automation available to improve both process efficiency and effectiveness, the challenge many companies face isn’t why they should transform their process but how. The key to overcoming this challenge is creating a strong business case for investment. One that not only sets out the objectives of the project but is also underpinned by a robust financial analysis, in the form of qualitative and quantitative ROI, and a thorough understanding of risk.
Tags : account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software
     Trintech EMEA ABM Pilot
By: IBM     Published Date: Jul 02, 2018
Cloud has evolved from a technological innovation to an integral part of business. Companies in every industry are investing in Digital Transformation initiatives to evolve and grow; often, cloudbased platforms are foundational elements of these transformations, as businesses increasingly seek the flexibility and agility to roll out new software services in days or weeks, versus months or years. As Digital Transformation initiatives unfold, one key challenge is to modernize the data center to facilitate rapid delivery of new applications and services—while still ensuring that existing missioncritical applications remain high performing, available, and secure. Another challenge relates to new requirements for accelerating the analysis of organizational data to near real time, much faster than previously possible with earlier incarnations of Business Intelligence (BI). Agile businesses are demanding faster access to the information contained within operational and business data stores to
Tags : 
     IBM
By: IBM     Published Date: Jul 09, 2018
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions. In search of instant analytical insights, businesses often prioritize data access and analysis over governance and quality. However, without ensuring the data is trustworthy, complete and consistent, leaders cannot be confident their decisions are rooted in facts and reality
Tags : 
     IBM
By: OracleSMB     Published Date: Jan 04, 2018
Finance has grown beyond recording and reporting. Leaders in fast-growing companies need not only the raw financial data, but the sophisticated analysis to make sense of it all. In today’s digital world, Finance must move out of the back-office and help drive the direction of the business, as well as improve the bottom line through more efficient processes and increased responsiveness. With the right tools, your finance team can simplify processes and fulfill its goal of adding value.
Tags : 
     OracleSMB
By: LogMeIn     Published Date: Feb 27, 2018
Most customer engagement solutions on the market require complex data analysis and months of implementation before you start seeing results. But Bold360 ai uses Natural Language Understanding to start learning your customers’ needs from the very first interaction. Its smart routing capability directs customers to the best resource available, and captures data in an intuitive dashboard. Start seeing results now with Bold360 ai.
Tags : bold360, engagement, customer, market, data, analysis
     LogMeIn
By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
     Menlo Security
By: Palo Alto Networks     Published Date: Jun 09, 2014
The Modern Malware Review presents an analysis of 3 months of malware data derived from more than 1,000 live customer networks using WildFire™ (Palo Alto Networks™ feature for detecting and blocking new and unknown malware). The review focuses on malware samples that were initially undetected by industry-leading antivirus products.
Tags : palo alto, security, network security, threats, malware, zero trust, breach, security breaches
     Palo Alto Networks
By: ESET, LLC.     Published Date: Sep 21, 2011
This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors
Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
     ESET, LLC.
By: Symantec.cloud     Published Date: Aug 03, 2011
This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.
Tags : symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com, cta, converged threat analysis, email security
     Symantec.cloud
By: Active Power     Published Date: Aug 30, 2011
This paper provides an analysis of the reliability of Active Power's flywheel-based UPS system vs. a battery-based double-conversion UPS system.
Tags : flywheel, ups, double conversion, batteries, ups, reliability, backup power, backup power supply
     Active Power
By: Xactly     Published Date: May 11, 2016
Read on to discover how companies are designing and administering their sales compensation plans, and to get additional considerations and summary findings from Xactly analysts based on an analysis of the results.
Tags : sales, sales planning, business management
     Xactly
By: Schneider Electric     Published Date: Feb 17, 2017
This white paper provides a quantitative TCO analysis of the two architectures, and illustrates the key drivers of both the capex and opex savings of the improved architecture.
Tags : data center, power, cooling, data center architecture, power and cooling infrastructure, tco, total cost of ownership
     Schneider Electric
By: VMware Dell     Published Date: Jul 02, 2008
In this case study, you'll discover the tangible benefits to IRMC when they used VMware Virtual Desktop Infrastructure to virtualize their call center operations and support multiple call centers from a central data center. Their IT staff achieved increased flexibility, faster provisioning, redeployed IT staff, reduced IT costs, and improved competitiveness. Finally, review a detailed financial analysis to back up IRMC's 73% annual ROI, and see how they saved.
Tags : call center, vmware, virtual, virtualization, virtual machine, callcenter, it savings, cost savings
     VMware Dell
By: BMC ESM     Published Date: Nov 09, 2009
Gartner assesses the vendor landscape in their latest Magic Quadrant for IT Event Correlation and Analysis, and positions BMC in the Leaders' Quadrant. Read the report
Tags : bmc esm, magic quadrant, consolidation, eca, event correlation and analysis, business service management, event management, deduplication
     BMC ESM
By: SAS     Published Date: Nov 10, 2014
Learn about the four benefits of interactively creating, running, and evaluating high-performance analytic models and see how this will allow your organization to get a fast, interactive interface without all the tedious experimentation.
Tags : sas, visual statistics, analytics, interactive interface, statisticians, business analysis, business management, interactive modeling
     SAS
By: Facebook     Published Date: Mar 07, 2012
The following white paper offers an in-depth analysis of how social media brand impressions reach Fans and Friends throughout Facebook, as opposed to just on brand Fan pages.
Tags : facebook, social media, emergeing marketing, digital marketing, online marketing, social media marketing, interactive marketing, web analytics
     Facebook
By: ESET     Published Date: Sep 07, 2011
A lengthy analysis that considers many of these questions, as well as discussing some of the characteristics of this fascinating and multi-faceted malicious code.
Tags : eset, virus, scada, plcs, stuxnet, malware, siemens, code
     ESET
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics