RSS feed Get our RSS feed

News by Topic

data

Results 126 - 150 of 12526Sort Results By: Published Date | Title | Company Name
By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Viavi Solutions
By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: BrightCove     Published Date: Nov 18, 2008
With the explosive growth of online video, traditional SEO has taken on a new dimension: video search and discovery. De-mystify the world of video search with a practical framework for video SEO and increase the value of your video content.
Tags : brightcove, video seo, contextual publishing, inbound links, video feeds & sitemaps, metadata, site architecture, emerging techniques
     BrightCove
By: EMC Corporation     Published Date: Jun 14, 2011
Qualitative and quantitative research among AP professionals to gain insights into trends in automated data capture in invoice processing.
Tags : emc, accounts payable, automation, paper process, transaction costs, error rates, invoice, centralized
     EMC Corporation
By: Quinstreet - Infosec     Published Date: Jun 11, 2012
Ponemon Institute presents the findings of The Insecurity of Privileged Users - outlines the current threats to an organization's sensitive and confidential data created by a lack of control and oversight of privileged users in the workplace.
Tags : security
     Quinstreet - Infosec
By: Cibecs     Published Date: May 30, 2012
The Cibecs and IDG Connect annual Data Loss Survey uncovers the latest trends and statistics around business data protection
Tags : 
     Cibecs
By: Concur     Published Date: Apr 17, 2013
In this survey report analysts examine electronic invoicing, imaging and data extraction, and automated workflow solutions at US-based enterprises. The analysis is based on over 300 survey results and more than nine years of research findings.
Tags : ap automation, accounts payable, invoice management, invoice automation, invoicing, ap report, ap study
     Concur
By: CPC Strategy     Published Date: May 21, 2012
CPC Strategy looked at 4,274,820 clicks, 82,845 orders, $1,158,604.41 in spend $7,867,575.91 in revenue to find the best converting shopping site for online retailers. Fill out the form below to download the free report.
Tags : comparison shopping, shopping site, marketing channel, data feed, product feed, shopping feed, cse, online marketing
     CPC Strategy
By: Kenshoo     Published Date: Oct 30, 2012
This white paper outlines 5 key insights from year-over-year data with some perspective on the 2011 UK Christmas season. Read on to learn more about key metrics in the season including clicks, advertising, search advertising and more.
Tags : kenshoo, 2012 uk christmas, online retail, e-commerce, shopping, search marketing, advertising, online advertising
     Kenshoo
By: Kenshoo     Published Date: Oct 30, 2012
This white paper outlines 7 key insights from year-over-year data on the 2011 US holiday season. Read on to learn more about key metrics in the holiday season including clicks, advertising, search advertising and more.
Tags : kenshoo, search advertising, clicks, impressions, search advertising, marketing metrics, search marketing agencies, internet marketing
     Kenshoo
By: SAP     Published Date: May 18, 2014
This paper explores the results of a survey, fielded in April 2013, of 304 data managers and professionals, conducted by Unisphere Research, a division of Information Today Inc. It revealed a range of practical approaches that organizations of all types and sizes are adopting to manage and capitalize on the big data flowing through their enterprises.
Tags : sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
     SAP
By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security
     Symantec
By: RES Software     Published Date: Mar 26, 2013
With a long list of strategic projects and requests from users to enhance their experience, healthcare IT professionals will need to focus on key trends that will lead to more efficient IT and more satisfied users.
Tags : ehr, healthcare records, patient data, meaningful use, healthcare, trends
     RES Software
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile, malware, security, scams, bluecoat, data loss
     Blue Coat Systems
By: Oracle     Published Date: Apr 22, 2014
This document focuses on the trends that are driving decision-making on cloud including the growing connection between cloud, mobility, and data; cloud services governance and integration; and continuing development of cloud ecosystems among vendors.
Tags : cloud services, trends, cloud services, oracle
     Oracle
By: Birst     Published Date: Jul 16, 2013
Covering 23 vendors and 5 market segments, the 2013 Wisdom of Crowds Business Intelligence Market Study helps readers understand the current market landscape including the perceptions and plans of organizations adopting BI solutions, the latest user trends and technology.
Tags : business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics
     Birst
By: Adobe     Published Date: Apr 17, 2014
Discover new opportunities for maturing your data practices—and building your business results. You’ll learn how to move beyond mere web analytics to build a more comprehensive marketing analytics approach that includes mobile, social, and offline channels. And you’ll see how your current analytics capabilities compare to those of similar organizations and where you have opportunities for improvement.
Tags : adobe, analytics, marketing, data collection, data automation, marketing automation, web analytics, marketing analytics
     Adobe
By: Windstream     Published Date: Mar 26, 2014
With so much information about cloud computing, it’s hard to know where to go or who to trust for information. Here’s a short resource guide on cloud computing trends.
Tags : windstream, cloud, cloud trends, cloud computing, great migration, cloud security, data, cloud for business
     Windstream
By: IBM     Published Date: Jan 09, 2015
IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out the average number of breached records per company, the real reasons most data breaches occur, the capital outlays that a breach requires, and the rate at which customers abandon companies after a breach occurs.
Tags : data breaches, data breach detection, business continuity management, malware, security
     IBM
By: Progress Software     Published Date: Mar 12, 2014
For IT managers, choosing the wrong vendor can lead to disruption, high costs, and the loss of confidence from within the business. Learn how to de-risk your vendor selections by aligning with market trends.
Tags : progress software, choosing vendors, datadirect, connectivity, saas applications, big data, data warehousing, nosql
     Progress Software
By: Coupa Software     Published Date: Nov 04, 2014
The benefits of eInvoicing include fewer lost invoices, quicker approval cycles, increased on-time payments, and improved vendor satisfaction. Yet only 20% of companies receive more than 50% of their invoices electronically. This Paystream Advisors survey report includes data on how eInvoicing is improving AP efficiency and why some organizations are still slow to adopt (and why they shouldn't be).
Tags : einvoicing, approval cycles, vendor satisfaction, efficiency, on-time payments, invoicing
     Coupa Software
By: Teradata     Published Date: Feb 04, 2015
Optimize your customer experience with Teradata Integrated Marketing Cloud Teradata is recognized for vision, innovation and broad set of marketing capabilities. The 2014 Gartner Magic Quadrant for Integrated Marketing Management is an invaluable resource with insights that can help you execute your marketing initiatives.
Tags : teradata, integrated, marketing, vendors, executional, operational, analytical, campaign
     Teradata
By: NetDiligence     Published Date: Apr 30, 2015
A Study of Actual Payouts for Covered Data Breaches.
Tags : network security, security policies, disaster recovery, compliance
     NetDiligence
By: Gigya     Published Date: Jun 08, 2015
To get a look at the current state of data privacy and personalization, Gigya recently commissioned a survey with OnePoll to collect the perspectives of modern consumers. The results reveal that, when it comes to sharing their data with brands, consumers across the globe are demanding 3 key values: transparency, relevance and convenience.
Tags : data privacy and personalization, modern consumers, social login, consumer concerns, data privacy, customer experience/engagement
     Gigya
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics