RSS feed Get our RSS feed

News by Topic

intelligence

Results 351 - 375 of 2223Sort Results By: Published Date | Title | Company Name
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
ERP and Business Intelligence are essential to your success. Read this and learn how to improve productivity and decision-making using Blue Coat WAN
Tags : blue coat, wan optimization, resource management, sap, erp, secure web gateway, application performance monitoring, netweaver
     Blue Coat Systems UK
By: Success Factors     Published Date: Jul 08, 2014
From data to intelligence in 5 simple steps. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : success factors, big data, intelligence, hr metrics, practical guidance
     Success Factors
By: LogLogic     Published Date: Mar 15, 2012
"Big Data" is the latest buzzword, yet over 70% of companies don't know what Big Data means and how to solve the data management challenges, finds LogLogic survey.
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage
     LogLogic
By: LogLogic     Published Date: Mar 15, 2012
IANS CUSTOM RESEARCH AND INFORMATION SECURITY INVESTMENT ANALYSIS (ISIA) REPORT on Log data management and compliance products
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage
     LogLogic
By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage
     LogLogic
By: Teradata     Published Date: Jan 28, 2015
Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.
Tags : teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce
     Teradata
By: CAST     Published Date: May 06, 2013
Download the paper to learn about CAST Application Intelligence Platform (AIP), the only enterprise-grade software quality assessment and performance measurement solution available.
Tags : architecturally complex violation, architectural hotspot, architecture of decay, cast, cast aip
     CAST
By: Oracle     Published Date: May 05, 2017
Many companies today have relegated their sales organizations to the end of the line of data intelligence and technology investments.
Tags : 
     Oracle
By: Oracle     Published Date: May 05, 2017
Surperformez sur votre marché grâce aux apports de la Data Intelligence et des technologies d’aide à la décision commerciale.
Tags : 
     Oracle
By: Oracle     Published Date: May 05, 2017
I commerciali vendono. I clienti acquistano. Il digital irrompe. Al giorno d’oggi, ogni persona del business deve gestire l’impatto della digital disruption.
Tags : 
     Oracle
By: Oracle     Published Date: May 05, 2017
Vertriebsmitarbeiter vertreiben. Kunden kaufen. Digitalisierung verändert.
Tags : 
     Oracle
By: Oracle     Published Date: Aug 17, 2017
50% of guests do not want to be served by a robot but 80% of operators say robots will be cleaning restaurants by 2027 50% of guests want to be recognized without giving a name or loyalty card 54% of restaurant operators would like to see artificial intelligence helping with menu planning
Tags : anticipating, consumer trends, seeking innovations, enhance guest experiences
     Oracle
By: CEB     Published Date: Nov 08, 2013
How is your company managing risk? Download the whitepaper to learn how cross-functional groups can work together to uncover broader enterprise-wide risks that might go unforeseen.
Tags : risk, compliance, audit, risk management, cyber security, fraud
     CEB
By: Salesforce Pardot     Published Date: Sep 09, 2014
This white paper will walk you through eight different ways that Pardot can help you supercharge Salesforce CRM, from better sales intelligence to automated lead qualification, and more. Take a look at the next few chapters to see how Pardot and Salesforce differ, what the key benefits of each tool are, and how they can work together to become the ultimate sales and marketing machine.
Tags : integration, key functionality, marketing teams, campaign performance, efficient lead management, improved sales intelligence, better tracking, crm & customer care
     Salesforce Pardot
By: Mimecast     Published Date: Mar 19, 2019
An Executive Strategy Guide Brought To You By The Cyber Resilience Think Tank Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that matters—data that will help mitigate future risks. Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isn’t part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Tags : 
     Mimecast
By: Dynatrace     Published Date: Mar 06, 2017
This new report outlines how today's hyper-scaled, complex application environment has pushed IT Operations to a tipping point, and why a new approach is critical. It outlines why it is not adequate anymore to simply attempt to enable IT better, why you need to start using automation and AI (artificial intelligence), and steps you can take immediately to begin doing that.
Tags : it operations, dynatrace, itoa, automation
     Dynatrace
By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : akamai technology, web application security, http, best practices, security
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
     Akamai Technologies
By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jul 20, 2017
e-book which lays out the case for machine learning and artificial intelligence for mainframe operational analytics. The mainframe is now part of a highly complex connected ecosystem driving trillions of mobile and web transactions critical to the functioning of the application economy. The emergence of new workloads and apps on the mainframe means that the status quo isn’t enough when it comes to Mainframe management. IT professionals alone – whether mainframe skilled or not – simply can’t keep up with the onslaught of performance alerts, false alarms. Machine learning deliver mainframe intelligence a more proactive and automated approach to handle this challenge.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: Evariant     Published Date: Nov 08, 2018
Gone are the days when your physician liaisons called on physicians to discuss referrals and recruit physicians armed with only the “word on the street.” In fact, if your institution is doing this, you can be sure that any competitor is winning the referrals with the help of market intelligence. Download this eBook to get the secrets to unlocking physician liaison ROI and grow market share in this hyper-competitive environment.
Tags : physician relationship management, network utilization, market development
     Evariant
By: GE Power     Published Date: Jan 26, 2017
2016 was a year of accelerating change that will impact the power industry across the entire Electricity Value Network. Power leaders determined to thrive in this rapidly changing landscape must understand these trends, how they will impact their business models and the transformative role of digitalization. In this Executive Brief, GE outlines the trends that warrant consideration by every power and utility executive as they develop strategies for success in 2017.
Tags : 2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids
     GE Power
By: Micron     Published Date: Oct 14, 2016
Today’s IT professionals are well aware that users expect fast, reliable access to ever-growing amounts of data – from web content, to videos, to business intelligence data and more. Meeting the challenges of this exponential growth is nearly impossible with existing, spinning media storage technology. Hard disk drives (HDDs) have been the standard in data storage for decades, but they can no longer satisfy. They create bottlenecks in data access, they fail to meet the growing demands of higher user expectations, and they consume too much power. Download to learn how to solve this issue.
Tags : 
     Micron
By: Epicor Software Corporation     Published Date: Nov 03, 2016
Download the latest ERP Selection Guide designed based on our experience working with thousands of growing businesses all over the world.
Tags : erp, erp system, enterprise resource planning, erp selection, erp evaluation, business system, epicor, tco
     Epicor Software Corporation
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics