consumer data

Results 101 - 125 of 239Sort Results By: Published Date | Title | Company Name
Published By: Basho     Published Date: Apr 13, 2015
Todays consumers expect instant access to communications services whether theyre in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases cant meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : 
riak, basho, telecommunications service provider, license fees, scalability, availability, data usage, big data, service operations system, networking, security, it management, wireless, data management
    
Basho
Published By: AWS     Published Date: Jul 24, 2019
Reduce costs and scale to meet customer expectations Software-as-a-service (SaaS) delivery models are being adopted faster than ever to meet business and consumer demand, prompting organizations to move their customer-facing applications to the cloud. As a result, Independent Software Vendors (ISVs) need to modernize their applications to deliver the flexibility and scale customers expect, without the restrictions and high costs of running applications on commercial databases. mLogica provides deep industry expertise, backed by powerful engineering, to help ISVs quickly modernize their applications on Amazon Aurora and drive greater business value with Amazon Web Services (AWS). Register for our webinar to learn how mLogica and AWS can help you transform your business on the cloud, so you can deliver modern, high-performing solutions to your customers.
Tags : 
    
AWS
Published By: Infacta     Published Date: Jan 22, 2007
Online consumers demand relevance, so list builders must focus on building large, highly-relevant lists rather than just gathering a bunch of email addresses. In this article, the author will discuss list size, registration methods, data collection and permission requirements.
Tags : 
subscriber list, subscription list, email marketing
    
Infacta
Published By: Equinix     Published Date: Oct 27, 2014
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-inhaving only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability.
Tags : 
data center, enterprise, cloud, experience, hybrid, performance, strategy, interconnectivity, network, drive, evolution, landscape, server, mobile, technology, globalization, stem, hyperdigitization, consumer, networking
    
Equinix
Published By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-inhaving only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability, it management, data center
    
Equinix
Published By: Brandwatch     Published Date: Aug 23, 2016
This whitepaper offers an inside look into how social consumer market insights work at the worlds biggest brands and agencies.
Tags : 
social media, consumer insights, market research, b2b marketing, consumer market insights, social data, social insights, social listening, social intelligence, business intelligence, voice of the customer, social intelligence platforms, social listening platforms
    
Brandwatch
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: Perimeter     Published Date: Jul 17, 2007
Download this free paper about read about identity protection services and how it can help fortify the trust that customers place on their Financial Institutions.
Tags : 
financial institution, privacy, consumer, consumer privacy, data protection, cardholder data, pci, compliance, security, personal data, perimeter, phishing, pharming, perimeter esecurity, identity management, customer relationship management, database security, information management
    
Perimeter
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse and no one is immune. Your companys data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasnt bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies most important data by not following best practices and using consumer-grade cloud services that arent built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: Dell     Published Date: Sep 06, 2015
Retailers can analyze this data to generate insights about individual consumer preferences and behaviors, and offer personalized recommendations in near real-time. Key to this is the ability to optimize merchandise selections and pricing that are tailored to a consumers likes and dislikes.
Tags : 
ibm, big data, retail data, retail, consumer data, shopper data, business analytics, business intelligence, customer interaction service, customer service, data integration, information management, records management, project management
    
Dell
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
What does it take to be relevant today? In the era of hyper-connectivity, consumers have become entitled, demanding more control over their experiences and expecting that marketers use data and insights to create a seamless, relevant brand experience. Research shows that communications containing relevant information and offers are the best drivers of brand loyalty and conversions
Tags : 
insight marketing, customer engagement, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning, product recommendation
    
Selligent Marketing Cloud
Published By: Intel     Published Date: Dec 13, 2018
Technology plays a key role in online shopping, where online retailers gain a greater understanding of their customers through data from their browsing and purchasing habits. Today, when consumers shop in brick-and-mortar stores, they expect the same personalized and responsive service. To help retailers achieve this level of service, a combination of hardware and softwareIntel Vision Accelerator Design products, cameras, AI deep learning video analysis technology do the work for you. Uncover how Advantech system uses the Intel Vision Accelerator Design with Intel Movidius VPU to drive Overall store performance such as the number of visitors and transactions, point-of-sale data, sales per shopper and the stores ranking, and can distinguish traffic patterns by weather and time of day Traffic and sales analysis for better staff allocation and marketing-event planning Store heatmap analysis for more precise merchandise placement and product promotion
Tags : 
    
Intel
Published By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci, dss, hackers, database security
    
Viavi Solutions
Published By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : 
compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data, pci dss, data protection, database security, authentication, monitoring, change management, tripwire, pci compliance
    
Tripwire
Published By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : 
javelin, debix, customer service, customer experience, damage control, data breach, security breach, network security, intrusion detection, intrusion prevention, customer relationship management, customer experience management
    
Javelin Strategy & Research
Published By: Schneider Electric     Published Date: Dec 29, 2011
The rapid growth of consumer smartphones and tablets is having a dramatic impact on the enterprise. For employees, it's all about choice and convenience, but for organizations, it introduces new challenges and risks. Companies of all sizes are struggling with an ever-growing array of IT management and security concerns, as more and more business data moves to mobile devices. In this program, we address these concerns and reveal the secrets to unlock the power of mobility with two of the leading experts in the industry.
Tags : 
    
Schneider Electric
Published By: WNS     Published Date: Jun 21, 2017
'Innovatively growing a consumer base, especially non-users' can be a challenging task for a CPG organization, looking for growth strategies in a world of discerning loyalty and fragmented markets. WNS designed a personalized consumer analysis framework that enabled a CPG major to successfully target non-user target segments, and enabled a two-fold growth in consumer base and revenue from sales.
Tags : 
consumer survey, data set, u&a studies, analysis, non-users, price optimization, brand affinity, cpg
    
WNS
Published By: Neustar     Published Date: Feb 27, 2013
Consumer phone data is changing every day, from the device to the subscriber which leaves you at risk for violating the TCPA. Neustar Information Services provides you with authoritative phone data to help you mitigate risk and increase efficiency.
Tags : 
tcpa, compliance, risk, authoritative phone data, auto dialing restrictions, telephone consumer protection act, autodialer violations, b2c, business to consumer, verification, on-demand verification, vulnerability management
    
Neustar
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience, consumer behavior, actionable insight, centralized system, feedback programs, push orientation, lifecycle-based approach, customer retention, churn rate, compliance, internal r&d, behavioral data, descriptive data
    
SPSS, Inc.
Published By: SPSS     Published Date: Jun 30, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience, consumer behavior, actionable insight, centralized system, feedback programs, push orientation, lifecycle-based approach, customer retention, churn rate, compliance, internal r&d, behavioral data, descriptive data
    
SPSS
Published By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In todays commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer dataespecially personally identifiable information (PII) is critical
Tags : 
    
CloudEndure
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.