RSS feed Get our RSS feed

News by Topic

analysis

Results 51 - 75 of 1198Sort Results By: Published Date | Title | Company Name
By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
     Oracle CX
By: Oracle CX     Published Date: Oct 20, 2017
With the growing size and importance of information stored in today’s databases, accessing and using the right information at the right time has become increasingly critical. Real-time access and analysis of operational data is key to making faster and better business decisions, providing enterprises with unique competitive advantages. Running analytics on operational data has been difficult because operational data is stored in row format, which is best for online transaction processing (OLTP) databases, while storing data in column format is much better for analytics processing. Therefore, companies normally have both an operational database with data in row format and a separate data warehouse with data in column format, which leads to reliance on “stale data” for business decisions. With Oracle’s Database In-Memory and Oracle servers based on the SPARC S7 and SPARC M7 processors companies can now store data in memory in both row and data formats, and run analytics on their operatio
Tags : 
     Oracle CX
By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
     Oracle CX
By: Gigamon     Published Date: Oct 19, 2017
Download the Forrester Total Economic Impact™ of Gigamon: Cost Savings and Business Benefits Enabled by Gigamon to see how customers benefit from comprehensive and scalable visibility across their networks. This study delves into a cost-benefit analysis of the Gigamon security delivery platform, network visibility and traffic monitoring solutions that enable companies to see what matters in order to meet their security objectives, increase productivity and keep hardware, software and personnel costs in check without affecting performance.
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 25, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
     Gigamon
By: Persicope Data     Published Date: Mar 07, 2018
Some brands are great at connecting with new audiences. They might have a killer marketing campaign, demonstrably fulfill a gap in the marketplace, or just have that certain “it factor.” Being able to get new customers on board can lead to fantastic short-term financial gains.
Tags : 
     Persicope Data
By: Dell EMC & Intel     Published Date: Aug 03, 2018
When running core workloads, consider hyper-converged infrastructure. Solutions like Dell EMC VxRail simplify operations and significantly reduce TCO. Recent research from Evaluator Group shows how VxRail compares to AWS On-Demand: Learn how to lower TCO with Evaluator Group’s full analysis
Tags : 
     Dell EMC & Intel
By: IBM APAC     Published Date: Apr 27, 2018
To make the best treatment decisions, doctors at Memorial Hermann required rapid, reliable access to patients medical records and fast insight into changing health indicators. Deploying IBM FlashSystem, physicians at Memorial Hermann can now rapidly access healthcare information and perform sophisticated analysis to identify early signs of illness and take appropriate action for patients 99% faster.
Tags : 
     IBM APAC
By: Workday Netherlands     Published Date: Sep 19, 2018
Looking for a trusted partner in financial management who has what it takes to lead your organisation today and into the future? Get an analysis of the market, key recommendations for evaluating vendors, and more. Download your complimentary copy of Gartner Magic Quadrant for Cloud Core Financial Management Suites.
Tags : 
     Workday Netherlands
By: IBM APAC     Published Date: Nov 22, 2017
Glossary:Terms You Should Know Take your data analysis and deep learning expertise to the next level with these industry terms.
Tags : api, application, programming, interface, artificial intelligence, base, encoding, chrome
     IBM APAC
By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : industry, advantage, linguistic, grammatical, statistical analysis, content
     IBM APAC
By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
     Delphix
By: Dell     Published Date: Aug 11, 2015
Read this report to learn discover the five key areas in which enterprise customers highly value a notebook vendor.
Tags : 
     Dell
By: Dell EMC     Published Date: Nov 09, 2015
Download this whitepaper and learn how the Dell Genomic Data Analysis Platform can accelerate discovery and insights through optimized infrastructure and support.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 19, 2015
Read this whitepaper to learn how to make better credit worthiness decisions in less time.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper for: • An overview of how manufacturing can benefit from the big data technology stack • A high-level view of common big data pain points for manufacturers • A detailed analysis of big data technology for manufacturers • A view as to how manufacturers are going about big data adoption • A proven case study with: Omneo
Tags : 
     Dell EMC
By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
     Dell
By: Collaborative Consulting     Published Date: Dec 20, 2013
A company's products needed constant updates due to changing business rules and regulations, as well as new functionality. However, tasks such as regression testing took too long and consumed too many resources. Collaborative helped to dramatically speed up the process through automation and process analysis, leading to increased customer satisfaction.
Tags : collaborative consulting, testing performance, testing process, case study, financial services, performance boost, technological advantage, trade details
     Collaborative Consulting
By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue
     Collaborative Consulting
By: Micro Focus     Published Date: Jun 07, 2018
As businesses look for new ways to create value for customers through digital experiences, it's clear that some firms are more advanced than others. This report analyzes the characteristics that distinguish the more advanced innovative companies from those just starting their digital journey. Digital leaders can use this analysis to help benchmark their own progress toward becoming a digital business.
Tags : 
     Micro Focus
By: SAS     Published Date: Apr 20, 2015
This report offers recommendations and best practices for implementing analytics in an organization. It provides in-depth analysis of current strategies and future trends for next-generation analytics.
Tags : 
     SAS
By: SAS     Published Date: Jul 14, 2015
With sophisticated analytics, government leaders can pinpoint the underlying value in all their data. They can bring it together in a unified fashion and see connections across agencies to better serve citizens.
Tags : anayltics, data analysis, management, knowledge pooling, data infrastructure
     SAS
By: SAS     Published Date: Oct 22, 2015
The Internet of Things (IoT) presents an opportunity to collect real-time information about every physical operation of a business. From the temperature of equipment to the performance of a fleet of wind turbines, IoT sensors can deliver this information in real time. There is tremendous opportunity for those businesses that can convert raw IoT data into business insights, and the key to doing so lies within effective data analytics. To research the current state of IoT analytics, Blue Hill Research conducted deep qualitative interviews with three organizations that invested significant time and resources into their own IoT analytics initiatives. By distilling key themes and lessons learned from peer organizations, Blue Hill Research offers our analysis so that business decision makers can ultimately make informed investment decisions about the future of their IoT analytics projects.
Tags : 
     SAS
By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : data visualization, sas, big data, visual analytics, data exploration, analysis
     SAS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics