data strategy

Results 1 - 25 of 292Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: May 10, 2017
IT departments in organizations of all types are looking to increase the agility, scalability, and cost-effectiveness of their data centers and storage initiatives. While the cloud, hybrid cloud, and private cloud options tend to be the first options that come to mind for many of these IT professionals, many are finding that hyperconverged infrastructures provide many of the same benefits. In this Enterprise Strategy Group white paper, uncover the many benefits of hyperconverged infrastructures and information on Dell EMC and Intel's Hyperconverged VxRack System 1000.
Tags : 
    
Dell EMC
Published By: IBM APAC     Published Date: Jul 09, 2017
In a recent report, Aberdeen's research suggests that Hadoop usage could be a catalyst for an enhanced and well-rounded data strategy. Read on to find out more.
Tags : 
hadoop, big data, data strategy
    
IBM APAC
Published By: Cisco     Published Date: Mar 17, 2017
This paper considers how IT must meet the challenge of devising a datacenter strategy that transforms the datacenter for a multicloud world.
Tags : 
digital transformation, hybrid cloud, data centers, infrastructure, architecture, operations, cloud applications
    
Cisco
Published By: RedPoint Global     Published Date: May 11, 2017
Marketing organizations are often limited in their ability to progress marketing tactics from single channel to cross-channel and real-time customer engagement. While marketing organizations might have a robust customer engagement strategy in place, often times there is a gap between their strategy and their ability to execute, with the right personalization and context that customers prefer. Over 62 percent of customers are always-on and readily addressable, but marketers arent implementing the right strategies to reach them. This eBook discusses data-driven marketing tactics that can help marketers mind the gap bridging customer strategy and ability to execute, with the right personalization and context that customers prefer.
Tags : 
customer engagement, customer data, customer data platform, data quality, customer data management, customer experience, data-driven marketing
    
RedPoint Global
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Todays cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM i2 Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: SAP     Published Date: Dec 14, 2010
While your competitors sit back, download this free paper to learn how to cut costs, boost profits, build loyalty, and solve a myriad of day-to-day business challenges.
Tags : 
sap, data strategy, competitive data, reduce costs, increase profits, employee improvement, business performance, best practices
    
SAP
Published By: SAS     Published Date: Jun 05, 2017
"The Industrial Internet of Things (IIoT) is flooding todays industrial sector with data. Information is streaming in from many sources equipment on production lines, sensors at customer facilities, sales data, and much more. Harvesting insights means filtering out the noise to arrive at actionable intelligence. This report shows how to craft a strategy to gain a competitive edge. It explains how to evaluate IIoT solutions, including what to look for in end-to-end analytics solutions. Finally, it shows how SAS has combined its analytics expertise with Intels leadership in IIoT information architecture to create solutions that turn raw data into valuable insights. "
Tags : 
    
SAS
Published By: SAP     Published Date: May 18, 2014
New data sources are fueling innovation while stretching the limitations of traditional data management strategies and structures. Data warehouses are giving way to purpose built platforms more capable of meeting the real-time needs of a more demanding end user and the opportunities presented by Big Data. Significant strategy shifts are under way to transform traditional data ecosystems by creating a unified view of the data terrain necessary to support Big Data and real-time needs of innovative enterprises companies.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: Veritas     Published Date: Sep 30, 2016
This paper summarizes the trends that have made modernizing backup and recovery an urgent priority, the key requirements for solution offerings, and the unique capabilities of Veritas NetBackup Appliances in delivering a simple, complete, and cost-effective solution.
Tags : 
    
Veritas
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. Its often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a companys most valuable data even while its potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Digital Realty     Published Date: Feb 24, 2015
SingleHop was interested in adding capacity to its data centers while at the same time achieving a predictable cost structure using an outsourcing strategy for the development and management of these mission critical facilities. Find out why they turned to Digital Realty.
Tags : 
cloud iaas, data center, cloud computing, development, it management, data management, infrastructure
    
Digital Realty
Published By: Digital Realty     Published Date: Feb 25, 2015
When measuring competitive differentiation in milliseconds, connectivity is a key component for any financial services companys data center strategy. In planning the move of its primary data center, a large international futures and commodities trading company needed to find a provider that could deliver the high capacity connectivity it required.
Tags : 
financial services, trade processing, data center, connectivity, data center, it management, data management, infrastructure
    
Digital Realty
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn how Dell can help you realize the full value of your big data strategyand to capitalize on all of your data, from enterprise systems to social media and the Internet of things.
Tags : 
    
Dell EMC
Published By: SAP     Published Date: May 22, 2012
Business intelligence technology must meet the demands of tomorrow's "digital natives"; integrate seamlessly with cloud data and platforms; alignpeople, conversations, and data with business strategy; and make the most of the infrastructures we have today.
Tags : 
sap, business intelligence, business analytics, technology, application integration
    
SAP
Published By: Akamai Technologies     Published Date: May 08, 2017
Online videos explosive growth has created tremendous new opportunities for engaging customers and developing new revenue streams. But despite the fact that video is becoming increasingly central to many online business strategies, many publishers still lack the tools and data to understand what factors are important in keeping their audiences engaged. In this whitepaper, we present data from the first ever large-scale scientific study that shows how video performance quality affects viewer behavior. The results help to shed light on important considerations that can help businesses craft a successful online video strategy boosting their business bottom line and ultimately reaping the rewards of online videos vast potential.
Tags : 
data optimization, audience engagement, business strategies, customer engagement, business potential
    
Akamai Technologies
Published By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the right cases can bring more efficiencyand more revenueto tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
    
Teradata
Published By: VMware     Published Date: Oct 05, 2015
To be fair, if you dont know or understand the data center architecture strategy called micro-segmentation, you arent a dummy. But it could mean you are missing a highly cost-effective opportunity to implement best-in-class data center security called the Zero Trust network. This special For Dummies edition explains micro-segmentation, how it enables Zero Trust, and why it is now within your organizations reach. Download your free copy of this book now.
Tags : 
zero trust network, micro segmentation, data architecture strategy, vmware, data center, data center security, security, data protection
    
VMware
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
A tool for finance leaders to unify disparate customer data with financial and strategic ROI If youve found yourself sweating in a smoky billiard room, wondering what role customer data should play in financeas well as in your companys long-term strategythis eBook will help you hone your pool shark skills. Inside, youll find insights about. How to identify patterns in your customer portfolio, and why it matters. Avoiding four critical data billiard blunders. Key questions to ask while youre segmenting your data. How to tell if your portfolio segmentation strategy is working with the right reporting. This eBook will help you navigate the crowded billiard room of customer data and how you can use it to drive cross-functional value for your team.
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Complexity, globalization and digitalization are just some of the elements at play in the risk landscapeand data is becoming a core part of understanding and navigating risk. How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study: 1. The Enterprise Risk & Strategy DisconnectFinance leaders are using data and managing risk programs, but over 65% of finance leaders say theres missing link between risk and strategy. 2. The Risks of the Use and Misuse of DataUp to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data. 3. Risky RelationshipsOnly 20% of finance leaders say the data they use to manage risk is fully integrated and shared. Download the study to learn how finance leaders are approaching data and enterprise risk management
Tags : 
    
Dun & Bradstreet
Published By: IBM APAC     Published Date: May 18, 2017
According to industry analyst IDC, the mean cost of an hour of downtime can range from USD 224,952 to USD 1,659,428, depending on the size of your organization.1 And each instance of downtime increases your total cost of ownership (TCO) and eats away at your IT budget.
Tags : 
tco, idc, ibm, cloud, mobile, hardware
    
IBM APAC
Published By: MicroStrategy     Published Date: Aug 12, 2012
Apple Premium Resellers use MicroStrategy Intelligence Dashboards on the iPad. See how these retail stores use our mobile platform to design beautiful, data-rich dashboards. See why MicroStrategy is the vendor of choice for Apple Premium Resellers.
Tags : 
microstategy, apple, dashboards, ipad
    
MicroStrategy
Published By: Venafi     Published Date: Mar 26, 2015
Lax SSH security and management can lead to significant gaps in security controls. Cybercriminals target these gaps to gain full access to sensitive, regulated, and valuable systems and data. Read the solution brief, Stop Unauthorized Privileged Access, to close these SSH security gaps and protect your business: Learn about the top SSH vulnerabilities Discover how to reduce risk of SSH key misuse Develop a strategy to manage and secure SSH keys
Tags : 
ssh security, ssh management, security controls, ssh vulnerabilities
    
Venafi
Published By: Adobe     Published Date: Mar 05, 2014
Adobe has an exceptional understanding of, and a vision for, campaign management technology. Weve drawn from our experience to create this document to help you better differentiate the myriad of solutions on the market. This guide provides a comprehensive list of questions and criteria to help companies evaluate campaign management solutions
Tags : 
adobe, technology, marketing, cmo, campaign management, customer, data, solutions
    
Adobe
Published By: Riverbed     Published Date: Jul 17, 2013
Your business is complex. Big data promises to manage this to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, causing delays and downtime. Forrester predicts this will worsen. To combat this onslaught, you need machines to analyze conditions to invoke automated actions. To perform adaptive automation, you need IT analytics, a disruption to your monitoring and management strategy. This report helps leaders prepare for IT analytics that turn big data efforts inward to manage the technology services that run your business. Register to get the full report.
Tags : 
analytics, big data, forrester, business intelligence, business management
    
Riverbed
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.