RSS feed Get our RSS feed

News by Topic

data intelligence

Results 151 - 175 of 587Sort Results By: Published Date | Title | Company Name
By: HERE Technologies     Published Date: Aug 08, 2019
The overall supply chain is becoming increasingly complex. When running smoothly, this global system lowers costs and improves quality, but as more moving parts are introduced the potential for inefficiency increases. Greater visibility is key to preventing disruptions and gaps in the supply chain - and location data is the key to enhancing visibility. By reading this eBook, you will discover: How location intelligence can help identify areas that are ripe for optimization How real-time data can provide useful insights on supply chain health and help identify waste in your processes How HERE helped a car manufacturer identify millions in savings annually by adding location awareness to its supply chain planning
Tags : supply chain, transport and logistics, mapping
     HERE Technologies
By: HERE Technologies     Published Date: Aug 28, 2019
Mapping, tracking, positioning and real-time data arekey to supporting defense and intelligence initiatives. Governments and agencies need location data they can trust to track and adjust fixed and mobile resources to address rapidly changing events and circumstances. With Ovum's Location Platform Index: Mapping and Navigation, agencies can assess location platform industry leaders and identify the platform that best meets their product development demands. This year, HERE Technologies cemented its role as the industry leader, earning the highest ranking, and besting Google, for the second time in a row. Download your free report to learn: The relative strengths and weaknesses of each vendor, including data, enablers and features Vendor strategies to keep up with changes in technologies and trends The specific workings of the location platform market, and to better understand what constitutes a healthy location platform and which provider offers the correct portfolio and the necess
Tags : data, platform, mapping, developers, index, vendors, capabilities, maps
     HERE Technologies
By: Hitachi Vantara     Published Date: Mar 20, 2018
ESG Lab performed hands-on evaluation and testing of the Hitachi Content Platform portfolio, consisting of Hitachi Content Platform (HCP), Hitachi Content Platform Anywhere (HCP Anywhere) online file sharing, Hitachi Data Ingestor (HDI), and Hitachi Content Intelligence (HCI) data aggregation and analysis. Testing focused on integration of the platforms, global access to content, public and private cloud tiering, data quality and analysis, and the ease of deployment and management of the solution.
Tags : 
     Hitachi Vantara
By: Hitachi Vantara     Published Date: Aug 14, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : data infrastructure, big data, internet of things
     Hitachi Vantara
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
     Cisco Umbrella EMEA
By: IBM     Published Date: Jul 26, 2017
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base. High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-centric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : customer analytics, data matching, big data, competitive advantage, customer loyalty
     IBM
By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
     IBM
By: IBM     Published Date: Jul 26, 2017
While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.
Tags : data security, threat intelligence, security operations, advanced security analysts
     IBM
By: EMC Corporation     Published Date: Jul 07, 2013
Forward-looking enterprises know there's more to big data than strong and managing large volumes of information. Big data presents an opportunity to leverage analytics and experiment with all available data to derive value never before possible with traditional business intelligence and data warehouse platforms. Through a modern, big data platform that facilitates self-service and collaborative analytics across all data, organizations become more agile and are able to innovate in new ways.
Tags : enterprises, storage, information management, technology, platform, big data analytics, emc, self service
     EMC Corporation
By: EMC Corporation     Published Date: Jul 07, 2013
Competitive enterprises that embark on big data strategies do so with the expectation that their businesses will transform. They don't just want answers from the data they collect and analyze, they want results. Be it with small, fledgling trials or large, cross-functional efforts, these enterprises want to see clearly how big data can make a difference - with their customers, their processes, their bottom lines and, most important, with growing the business.
Tags : storage, enterprises, information management, technology, platform, big data analytics, emc, self service
     EMC Corporation
By: Oracle     Published Date: Apr 10, 2014
The very best CFOs are becoming “technology evangelists”, investing in the latest mobile, social, analytical and cloud technologies to modernize their finance organizations and become more strategic partners to the business. Find out more – download the report, “Empowering Modern Finance: The CFO as Technology Evangelist.”
Tags : cloud, finance, saas, big data, social, mobile, analytics, modernization
     Oracle
By: Drillinginfo     Published Date: Nov 26, 2015
In this PDF you’ll learn how Drillinginfo (DI) provides accurate, current rig data in the Permian Basin. From permitting and leasing information to rig locations and pricing trends, you’ll find products and solutions to help transform how OFS companies drive leads. Tracking prospects can be a lucrative opportunity, but rigs move on a daily basis, so you need the latest information. See how DI can drive a company’s success by gathering up-to-the-minute rig intelligence from a single, comprehensive software solution. The Permian Basin Play is seeing a surge of O&E activity, with reports indicating that almost 30% of future oil reserve growth in the U.S. will come from the formation. Does your oilfield service team have an innovative approach to your data source detailed enough to support competitive decision-making? See how to get the most accurate, timely drill-site and well event information to make better, faster decisions and drive the best leads — that can turn into opportunities.
Tags : ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
     Drillinginfo
By: Drillinginfo     Published Date: Nov 26, 2015
OFS companies in the Bakken Play need fast, accurate rig intelligence from one comprehensive source to stay competitive. With Drillinginfo (DI) you’ll gain a competitive edge in the Bakken Play by using the best data and the broadest intelligence available. In this PDF you’ll learn how DI provides everything you need, from permitting and leasing information to rig locations, pricing trends, and more. While tracking prospects can be a lucrative opportunity, rigs move on a daily basis, so you need timely, accurate information. In this PDF you’ll see how Drillinginfo can drive your success by gathering the very latest rig intelligence from a comprehensive, easy-to-use SAS solution. Learn how to prepare for the next well event with DI Rigs Mobile App. With this invaluable tool you can enjoy the luxury of having your own office on the road. Easy access to rig and well event coordinates and driving directions via GPS units located on over 1,800 rigs make the DI Rigs Mobile App a must.
Tags : ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
     Drillinginfo
By: ClearStory     Published Date: Oct 07, 2014
When it comes to “big data,” Gartner boils it all down to “value.” In their 2014 Cool Vendors for Big Data report, ClearStory Data was among 4 companies profiled. According to Gartner, ClearStory is “for companies looking at big data business intelligence and analytics from a data variety perspective.”
Tags : big data, value, business intelligence, analytics, data variety
     ClearStory
By: ClearStory     Published Date: Oct 07, 2014
Written by Stephen McDaniel, Chief Data Officer, Freakalytics, Learn why Data Intelligence is the new way. Easy access, quick answers, more data, more people.
Tags : data analysis, chief data officer, data intelligence, easy access, freakalytics
     ClearStory
By: FICO     Published Date: Jun 07, 2016
With the increasing mainstream adoption of big data infrastructure — highly distributed file storage and query tools — more businesses are taking a new look at what business intelligence and analytics can do to grow revenue, increase profits and ultimately develop strategic relationships with customers.
Tags : 
     FICO
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: Beqom     Published Date: Jun 14, 2019
New Techniques That Will Drive Revenue in 2019 If you’re ready to move beyond simple calculations and realize the vast potential of data driven selling, you’re ready to explore the next generation of SPM platforms. Download the report to learn how the modern technologies like Artificial Intelligence and Machine Learning, can give your sales reps a roadmap to better performance and give sales management insights that will enable them to achieve more profitable sales.
Tags : 
     Beqom
By: GFT USA, Inc.     Published Date: Jun 26, 2019
Stream is GFT’s architectural framework on GCP that enables real time processing and analysis of structured and unstructured data using AI and Machine Learning (ML) to extract intelligence from data.
Tags : 
     GFT USA, Inc.
By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
     IBM APAC
By: Teradata     Published Date: Jan 16, 2015
Companies that use SAP® need to have a method to access all valuable information that is recorded in order to make the best business decisions and establish a sustainable competitive advantage. With Teradata Analytics for SAP®, Lamb Weston, a global frozen potato product producer, has been able to generate their business intelligence reports quickly and effortlessly. BI that lets you focus on running the business…Download now!
Tags : teradata, sap, product producer, sap success
     Teradata
By: Teradata     Published Date: Jan 16, 2015
Teradata® Analytics for SAP® Solutions performs high-value business analytics on integrated data.
Tags : data analytics, high-value, integrated data, intelligence
     Teradata
By: Dassault Systčmes     Published Date: Jul 21, 2017
Project management relies primarily on past performance to predict future results, however many companies still lack forward-looking capabilities to predict project outcomes and ensure success. Enhancing project management with PLM analytics offers the opportunity to switch from task-based activities to performance-driven ones to improve success rates. Use PLM Analytics to: • Gain actionable insight and valuable intelligence • Dramatically boost business value and improve project management performance • Reduce error-prone behavior like manual data collection • Leverage big-data capabilities and project intelligence Learn how to extend the value of your PLM investment and improve business performance for your company.
Tags : product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed
     Dassault Systčmes
By: Pure Storage     Published Date: Jul 18, 2017
OTS' experiences with all-flash technology mirror what many customers have experienced over the past several years. Hesitatingly optimistic, OTS deployed its first AFA in a limited environment to prove the system out, and when it performed and/or exceeded the company's expectations, it quickly started moving more workloads to it over time. Like OTS, many customers do not immediately retire their legacy storage, but in moving the more demanding workloads off of their existing environments, they provide better application performance both for those applications on the AFA and for those that stay on the legacy storage. And like OTS, the majority of AFA customers have in the past year in particular come to the conclusion that all-flash technology is the future of primary storage for performance, reliability, ease of management and expansion, and economic (as measured by total cost of ownership) reasons.
Tags : external storage systems, flash arrays, scale-up, scale-out, managing it infrastructure, data center, idc, market intelligence
     Pure Storage
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics