RSS feed Get our RSS feed

News by Topic

business data

Results 1 - 25 of 2129Sort Results By: Published Date | Title | Company Name
By: Hewlett Packard Enterprise     Published Date: May 04, 2018
Multicloud Storage for Dummies consists of five short chapters that explore the following: - How the multicloud storage model aligns with modern business and IT initiatives - Common barriers to cloud adoption and how a multicloud storage model addresses them - How to build a multicloud data center - What to look for in multicloud storage services - Real-world multicloud use cases
Tags : 
     Hewlett Packard Enterprise
By: Dell EMC     Published Date: May 04, 2018
Digital transformation has become a business imperative as most aspects of economic engagement have become digital. Around the globe, businesses and government agencies are re-engineering their technology infrastructures to keep pace with customer demands, spur innovation and stay competitive in an ever-evolving digital economy. Hyper-Converged Infrastructure (HCI) systems bundle multiple technology components together into single systems, enabling IT departments to spend less time managing separate data center components and more time proactively delivering value to the business. In this white paper, we compare the portfolio offerings of Dell EMC and HPE, and highlight significant benefits to be realized when partnering with the HCI market leader: Dell EMC. Dell EMC provides a tightly integrated software ecosystem and the flexibility to run multiple workload types, providing solutions to a broader customer base than HPE.
Tags : 
     Dell EMC
By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : monitor, optimize, validate, digital, experiences
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : monitor, optimize, validate, digital, experiences
     Akamai Technologies
By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
     Aberdeen
By: Akamai Technologies     Published Date: Apr 13, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : monitor, optimize, validate, digital, experiences
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : monitor, optimize, validate, digital, experiences
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : monitor, optimize, validate, digital, experiences
     Akamai Technologies
By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
     DigiCert
By: DigiCert     Published Date: Jun 19, 2018
Regulatory compliance is more than a series of rules to adhere to, and getting it right could save you time and money. Historically, compliance has been regarded as a checklist of fixed requirements. But this reactive outlook risks being too short-sighted. It can lead to higher compliance costs, audit deficiencies, greater business downtime and an increased risk of data loss. Furthermore, it can lead to missed opportunities to achieve greater levels of operational effectiveness for your business. The only way to achieve a greater level of operational efficiency is to adopt a proactive strategy and stay ahead of the compliance curve.
Tags : 
     DigiCert
By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : monitor, optimize, validate, digital, experiences
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Oracle     Published Date: May 15, 2018
More than 75% of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. To help you navigate your own journey to modernization, we’ve crafted this handbook series to share the knowledge gained working with many thousands of companies using both legacy and modern ERP systems.
Tags : 
     Oracle
By: Butler Technologies     Published Date: Jul 03, 2018
Data centers have become the epicenters of the digital world, and thus continue to grow in speed, complexity, and importance. Whether an efficiently-run data center is a means to deliver a service, e.g an Internet Content Provider (ICP), or if the data center is the primary business, e.g. a multi-tenant data center (MTDC) - testing is a critical element in meeting customer SLAs and/ or internal performance objectives.
Tags : 
     Butler Technologies
By: Dell PC Lifecycle     Published Date: May 15, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
     Dell PC Lifecycle
By: Pindrop Security     Published Date: Apr 26, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
     Pindrop Security
By: Pindrop Security     Published Date: Apr 26, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
     Pindrop Security
By: TIBCO Software APAC     Published Date: May 31, 2018
With data the new competitive battleground, businesses that take advantage of their data will be the leaders; those that do not will fall behind. But gaining an advantage is a more difficult technical challenge than ever because your business requirements are ever-changing, your analytic workloads are exploding, and your data is now widely-distributed across on-premises, big data, the Internet of Things, and the Cloud. TIBCO® Data Virtualization is data virtualization software that lets you integrate data at big data scale with breakthrough speed and cost effectiveness. With TIBCO Data Virtualization, you can build and manage virtualized views / data services that access, transform, and deliver the data your business requires to accelerate revenue, reduce costs, lessen risk, improve compliance, and more.
Tags : 
     TIBCO Software APAC
By: TIBCO Software APAC     Published Date: May 31, 2018
Ask the average business user what they know about Business Intelligence (BI) and data analytics, and most will claim to understand the concepts. Few, however, will profess to know how analytics works or to have the skills needed to put it into practice. Despite being knowledgeable about their industry and experienced in running their organizations, the majority of business users lack expertise in analytics and visualization techniques—but that doesn’t stop them from wanting to have a go. This situation has led to ease of use and accessibility becoming the main focus for recent updates from all the leading BI vendors—but making tools easier and more widely accessible is only part of the answer. A better approach is to work both sides of the gap. To make tools that can empower business users to discover and unlock value in their data—and that extend capabilities for experts, so they can share the analytics workload, improve efficiency, and focus on higher level work. Unfortunately, the
Tags : 
     TIBCO Software APAC
By: Workday     Published Date: Mar 02, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : cloud-based system, data analytics, real time
     Workday
By: Workday     Published Date: May 09, 2018
How can you put the power of real-time analytics into the hands of business users? Watch this video to learn about the technologies surrounding self-service analytics and data integration, and how you can use them to lead a data-driven organization.
Tags : 
     Workday
By: Groove     Published Date: May 16, 2018
HotSchedules is a technology company that streamlines several aspects of running a business in the service industry. The sales team at HotSchedules had been using Salesforce for several years, but they were spending a lot of time on data entry and other manual tasks. They needed a way to simplify recordkeeping so they could spend more time talking to prospects. The HotSchedules sales team is taking advantage of the full suite of features in Groove to enhance their sales operations at every turn — from Salesforce integration to multi-step campaigns to analytics. Let’s take a look.
Tags : 
     Groove
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : data analytics, data storytelling, business intelligence
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics