RSS feed Get our RSS feed

News by Topic

profile data

Results 1 - 25 of 69Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Aug 02, 2017
Beyond a customer’s digital profile is their real-world identity. Knowing this information and how it fits into the full customer journey is critical. Along with in-store purchase data, you can also gain insight into their brick-and-mortar buying habits, like the time of day they’re most likely to shop, the average time spent in a store, the frequency of their visits or the categories of products for which they shopped.
Tags : digital marketing, personalised content, customer nurturing, cross channel analytics, adobe, in-store interactions
     Adobe
By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : zoominfo, sales, marketing, pipeline, conversion rates
     ZoomInfo
By: IBM     Published Date: Jul 26, 2017
Security incidents have been on the rise for the past few years, and most experts in cybersecurity believe the trend will only continue to intensify. Here, though, our subject is not the high-profile, headline-grabbing attacks we all know about but the everyday struggle of organizations everywhere, in every industry, to protect their data in a world of thieves.
Tags : security, cyber crime, trends, cyber security, data protection
     IBM
By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
     Delphix
By: Collaborative Consulting     Published Date: Dec 23, 2013
There are some surprisingly straightforward reasons behind the glitches, delays, and cost-overruns that can bedevil data warehouse initiatives. ...The first is simply confusing expectations with requirements. But four other troublemakers can also lead to big problems for developers, IT departments, and organizations seeking to maximize the business value of information.
Tags : collaborative consulting, data warehouse, failed projects, business intelligence, business solution, meet expectations, big data, profile importance
     Collaborative Consulting
By: Infor     Published Date: Jan 03, 2011
For CDS Global, Infor CRM Epiphany Interactive Advisor is being used to create real-time customer profiles based on historical, personal, and contextual data. Using a combination of real-time analytics and business rules, the data is analyzed to identify the highest-impact offers in real time so that the CSR can make an attractive offer during the call.
Tags : infor, cds global, interaction advisor, real-time customer profile, analytics and business rules, crm solution, customer relationship management
     Infor
By: Infor     Published Date: Jan 06, 2011
For CDS Global, Infor CRM Epiphany Interactive Advisor is being used to create real-time customer profiles based on historical, personal, and contextual data. Using a combination of real-time analytics and business rules, the data is analyzed to identify the highest-impact offers in real time so that the CSR can make an attractive offer during the call.
Tags : infor, cds global, interaction advisor, real-time customer profile, analytics and business rules, crm solution, customer relationship management, interactive/pr agencies
     Infor
By: Blue Coat Systems     Published Date: Jul 18, 2013
Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view himself or herself as a business enabler. He or she must focus on continuously aligning with business objectives, improving delivery capability to support business processes that bring new products and services to market more quickly, fostering innovation, and reducing costs through improved performance. In this custom Technology Adoption Profile (TAP), the data confirms this trend.
Tags : security, technology, business technology, cio
     Blue Coat Systems
By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
     CA Technologies
By: Adobe     Published Date: Apr 25, 2016
Data is the key to doing this. But simply collecting it won’t take you all the way. You must use the data to create holistic customer profiles, then use those customer profiles to create interesting, personalised and memorable experiences. This three-part, step-bystep eBook series explains how to actually use data to provide each customer with the best experience possible.
Tags : customer experience, marketing, data management, customer experience/engagement, data management/analytics
     Adobe
By: IBM     Published Date: Sep 22, 2011
This white paper highlights the performance and scalability potential of InfoSphere DataStage 8.1 based on a benchmark test simulating a data warehouse scenario. The benchmark is designed to use the profiled situation to provide insight about how InfoSphere DataStage addresses key questions customers frequently ask when designing their information integration architecture.
Tags : ibm, infosphere, data performance and scalability, customers, datastage
     IBM
By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
     CA Technologies
By: Dell & Microsoft     Published Date: Feb 01, 2013
In this Technology Adoption Profile we explore the current state of replication in SMB IT departments and in particular the use of SAN-based replication. We find strong demand for both synchronous and asynchronous SAN-based replication, as well as the need to replicate data within the SMB’s own data center facilities, either to a colocated secondary array or to one within 5 km [approximately 3 miles](a campus or metro-style deployment). We also find that in order for SMBs to protect more data using replication, they need replication solutions that are non-disruptive, easy to use, and inexpensive.
Tags : data, san-based replication, synchronous, asynchronous
     Dell & Microsoft
By: Plex Systems     Published Date: Aug 15, 2014
There has been no shortage of high profile recalls over the past several years. Suppliers are being required to provide more robust quality management systems, provide better real-time visablity into manufacturing data, and may even be held accountable for additional charge-back and warranty claims. Take a next generation approach to quality management.
Tags : 
     Plex Systems
By: ClearStory     Published Date: Oct 07, 2014
When it comes to “big data,” Gartner boils it all down to “value.” In their 2014 Cool Vendors for Big Data report, ClearStory Data was among 4 companies profiled. According to Gartner, ClearStory is “for companies looking at big data business intelligence and analytics from a data variety perspective.”
Tags : big data, value, business intelligence, analytics, data variety
     ClearStory
By: Waterline Data & Research Partners     Published Date: Jun 15, 2015
This analysis profiles products that can accelerate the shift toward business-user-oriented, visual, interactive data preparation.
Tags : gartner, analysis, data visualization, business tools, best practices, interactivity, vendor functionality
     Waterline Data & Research Partners
By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
     Forcepoint
By: IBM     Published Date: Apr 14, 2017
Any organization wishing to process big data from newly identified data sources, needs to first determine the characteristics of the data and then define the requirements that need to be met to be able to ingest, profile, clean,transform and integrate this data to ready it for analysis. Having done that, it may well be the case that existing tools may not cater for the data variety, data volume and data velocity that these new data sources bring. If this occurs then clearly new technology will need to be considered to meet the needs of the business going forward.
Tags : data integration, big data, data sources, business needs, technological advancements, scaling data
     IBM
By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
     Delphix
By: SDL Web Content Management Solutions     Published Date: Sep 01, 2010
Recent evolution in the mobile applications market now offers enterprises new opportunities for reaching customers in ways never before possible. In the past 18 months, a number of independent market forces have converged to enable goods-and-services providers to market to specific customers, at specific times, at specific locations. Importantly, such targeted messaging draws on a richer-than-ever set of consumer information, including not only detailed demographics from implicit (inferred) and explicit (user-provided) profiles, but also real-time, location-based data.
Tags : sdl, web content management, magic quadrant, wcm, content, web, mobile marketing, strategy
     SDL Web Content Management Solutions
By: Riverbed Technology, Inc.     Published Date: Apr 22, 2014
In this Taneja Group Product Profile we review Riverbed’s SteelFusion (formerly Granite), and examine how it marries together multiple technical advances to deliver innovative branch converged infrastructure. SteelFusion supports distributed IT by addressing traditional branch challenges – providing simplified deployment, resiliency in the face of network issues, improved protection, fast recovery from the central datacenter, and a greatly lowered OPEX.
Tags : riverbed, branch office recovery, branch office, data loss, risk aversion, backup recovery, virtual servers, branch operations
     Riverbed Technology, Inc.
By: LeadGenius     Published Date: Sep 13, 2016
Do your B2B web forms capture all the qualifying data you need from inbound prospects? Neither do ours. That’s why we’ve compiled a PDF guide highlighting the best ways to get all the prospect data you need, without lengthening your forms.
Tags : b2b, abm, account based marketing, account based sales, b2b marketing, lead generation, demand generation, marketing operations
     LeadGenius
By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability
     CDW
By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
     Viavi Solutions
By: TruSignal     Published Date: Jun 03, 2013
This white paper aims to provide B2C digital marketers with a better understanding of why you may need an audience expansion technique and what questions to ask yourself before you get started. We hope to not only build an imperative for audience expansion techniques, but also to offer a guide that will help you choose the right data and right techniques for reaching more of your desired prospects online. Specifically, this white paper will discuss and differentiate two specific expansion approaches: lookalike and act-alike audiences including how they are built, the problems they solve and how to use them effectively throughout the marketing funnel.
Tags : audience expansion, lookalike, act-alike, audience targeting, predictive analytics, big data, profile data, behavioral data
     TruSignal
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics