analysis

Results 1301 - 1325 of 1359Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Apr 23, 2014
With growth in the volume and variety of data needed to monitor and manage complex IT systems, IT leaders have had to acquire new technologies to manage this data. This will require that a single, architected platform be procured to improve root-cause analysis and short-term predictive analysis.
Tags : 
ops analytics, operations analytics, gartner, big data, analytics, predictive analytics, bsm, business service management
    
HP
Published By: HP     Published Date: Jan 26, 2015
Knowing how customers use the products and services you provide helps you improve what you offer, which helps you retain more customers, and attract new ones. This vital knowledge requires the analysis of traditional business data, machine data, and human information.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: Adobe     Published Date: Feb 12, 2016
The new era in digital marketing requires knowledge, process and maturity. Over the past 6 years, weve surveyed companies around the world to understand their key marketing strategies and tactics. Were sharing the latest findings in the 2015 Digital Marketing Survey Results report.
Tags : 
adobe, digital, digital maturity, digital marketing, analysis, research
    
Adobe
Published By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : 
security information, event management, magic quadrant, gartner report, siem technology, event data, correlations, user activity monitoring
    
AlienVault
Published By: Nginx     Published Date: Jun 25, 2014
Learn four concrete tips to help you avoid benchmarking confusion, so you can achieve the most accurate and understandable results.
Tags : 
riverbed, application delivery, application development, application infrastructure, application performance, enterprise software, load balancing, open source
    
Nginx
Published By: Epicor     Published Date: Aug 24, 2018
Collecting actionable insight is key to making informed decisions about your LBM business. Epicor BisTrack provides eight LBM analysis tools that enable LBM dealers to grow and thrive, including flexible data analysis and reporting, customer stratification, and actionable, real-time data. Download the Tip Sheet to learn how else Epicor BisTrack can empower you to make sound decisions to grow margins, profits, and loyalty.
Tags : 
lumber, building materials, lbm, erp, bistrack, building materials distributors, lumber distributors, lumber manufacturers
    
Epicor
Published By: Epicor     Published Date: Sep 20, 2018
Selecting the right software is an investment of time and money that can pay off with increased customer loyalty, more productive employees, and simpler business management. The Epicor Eagle N Series business management solution enables retailers to grow and thrive with powerful analysis tools that tell you ow your business is doing and why. Here is a sneak peek into 8 powerful analysis tools to consider that will help your retail business grow and thrive: 1. Store vs. Store 2. Your Top 100 Items 3. The Market Basket 4. Big Investment, Big Opportunity 5. Excess Limits Success 6. Beware the Hidden Dangers 7. A lot Can Happen in a Year 8. When Costs Change But Pricing Doesnt Download this tip sheet to get more insight into these 8 powerful analysis tools that will help grow your retail business.
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos
    
Epicor
Published By: Intel Security     Published Date: Oct 20, 2015
Success of an effective threat defense strategy.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
    
Intel Security
Published By: Acrolinx     Published Date: Apr 01, 2015
Content marketing is one of the highest priorities for todays marketers, with growth rates for content development and distribution skyrocketing. According to the Content Marketing Institute, for example, 70 percent of marketers are investing more in content marketing than ever before. A recent research report from global market intelligence firm IDC further underscores the point, noting that building out content marketing as an organizational competency is one of CMOs most important initiatives, second only to measuring ROI. Read this white paper to learn more about the Global Content Impact Index.
Tags : 
global content impact index, brands, web pages, analysis, content marketing, roi
    
Acrolinx
Published By: IBM     Published Date: Apr 06, 2015
Voice of the customer (VOC) is a market research technique defined as the process of capturing a customer's expectations, preferences and aversions. Ideally, Voice of the Customer analysis produces a detailed set of customer wants and needs that is prioritized by company objectives or strategic goals. What has changed significantly is the volume and number of data sources and channels, inclusive of mobile device, kiosk, POS and tablet that are able to feed into the analysis of contextual VOC information via enabling VOC software, services and technologies.
Tags : 
market research, new technique, market analysis, customer preferences
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
This 2H-2014 Value Matrix by Nucleus Research evaluates all major BI vendors and their ability to deliver value based on usability, functionality and projects 6-month trends for each vendor to identify best-of-breed capabilities in various dimensions that have evolved in the marketplace.
Tags : 
ibm, nucleus research, market analysis, business intelligence, anallytics market, analytical applications
    
IBM
Published By: IBM     Published Date: May 27, 2015
Continuous engineering is explained in easy to understand terms in this Dummies book, appropriate for all levels of product and systems development stakeholders.
Tags : 
continuous engineering, systems development, product development, data analysis, software development, it management, knowledge management, data management
    
IBM
Published By: FICO     Published Date: Sep 02, 2016
The unifying concept that defines FICO and its substantial technology and solutions stack is Decision Management. This term has not yet become mainstream - but it will. All business analytics activities are performed with the single aim of improving the accuracy and efficiency of business decisions. This applies to business intelligence, data visualization, data mining, business rules management, and many other forms of analysis. Unifying these activities under a single discipline means that currently fragmented analytical efforts can be combined into a single whole, with benefits that will be discussed in this review.
Tags : 
    
FICO
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Nous avions tous les avantages de ces terminaux choisis avec soin et nous profitions dun grand confort dutilisation par rapport aux terminaux dentreprise prpars par le dpartement informatique.
Tags : 
byod, mobility, analysis, enablement, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Damals verfgten nahezu alle ber einen PC, mit dem sie nach Feierabend zu Hause arbeiten und dabei die Vorteile nutzen konnten, die ihnen das eigene, vertraute und sorgfltig ausgewhlte Gert gegenber dem von der Unternehmens-IT bereitgestellten System bot.
Tags : 
byod, mobility, analysis, enablement, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Negli ultimi anni, con il diffondersi dei dispositivi mobili nelle imprese il termine "BYOD" diventato di uso comune negli ambienti di lavoro. Tuttavia, oltre a rappresentare un trend, il suo significato va ben oltre quello letterale dell'acronimo. Il BYOD costituisce un aspetto di un trend molto pi ampio e radicato: la consumerizzazione dell'IT, le cui origini risalgono ai primi anni 2000. In quel periodo, la maggior parte delle persone disponeva di un PC con cui lavorare da casa oltre l'orario di ufficio, sfruttando tutti i vantaggi derivanti dall'uso di dispositivi di propria scelta, pi agevoli da impiegare rispetto a quelli aziendali forniti dai reparti IT.
Tags : 
byod, mobility, analysis, enablement, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 02, 2015
En los ltimos aos, BYOD, que hace referencia al uso de dispositivos personales en el trabajo, se ha convertido en uno de los trminos ms utilizados en la empresa, al generalizarse el uso de los dispositivos mviles en muchas organizaciones. Sin embargo, adems de ser un trmino que est de moda, su significado no es el de unas simples siglas.
Tags : 
byod, mobility, analysis, enablement, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Ultimately, technology can minimize compromises so that everyone becomes a winner. In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility is a compromise-free approach, and how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
byod, mobility, analysis, enablement, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 02, 2015
The benefits of a mobile-enabled workforce are undeniable and far-reaching. For business owners, increasing operational and business velocity is no longer tethered by time and place. The untethering benefits of mobility extend to employees, too, both in their personal productivity and in balancing their personal and work lives.
Tags : 
byod, mobility, analysis, enablement, convergence, infrastructure, mobile computing, mobile data systems
    
VMware AirWatch
Published By: IBM     Published Date: Jan 07, 2016
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in todays threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, credentials, threat, data, analysis, security
    
IBM
Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure (HCI) is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? Who benefits from HCI, and who doesnt? What enterprise infrastructure challenges could be solved with HCI? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Dec 01, 2017
perconverged infrastructure (HCI) is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? Who benefits from HCI, and who doesnt? What enterprise infrastructure challenges could be solved with HCI? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand th
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand the key requirements enterprise IT administrators should consider as they begin their initial deployments or expand
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: -What are the most effective uses of HCI today and in the future -Who benefits from HCI, and who doesnt -What enterprise infrastructure challenges could be solved with HCI This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand the ke
Tags : 
    
Dell EMC
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
Hi, this is Kevin from IT. We've been notified of a virus on your departments machines. Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information, hacker detection, security management
    
Microsoft Office 365
Start   Previous    41 42 43 44 45 46 47 48 49 50 51 52 53 54 55    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.