analysis

Results 126 - 150 of 1347Sort Results By: Published Date | Title | Company Name
Published By: AccelOps     Published Date: Jan 08, 2014
Use real-time analytics and correlation for efficient root-cause analysis in your data center. Learn more about how AccelOps can help your company in our latest white paper.
Tags : 
accelops, application performance, network, data, data center, network monitoring, cloud, infrastructure, open source, security management, virtualization, wireless, server, networking, security, data management, application performance management
    
AccelOps
Published By: Mentor Graphics     Published Date: Apr 25, 2016
Over the years, two major approaches to SERDES simulation have emerged and gained popularity: time-domain (or bit-by-bit) and statistical. Both are used to build the eye diagram and bit-error ratio (BER), and each has its benefits and limitations.
Tags : 
mentor graphics, analysis flow, bit by bit, serdes, ber, gigabit networking, internetworking hardware
    
Mentor Graphics
Published By: Dassault Systmes     Published Date: Aug 08, 2017
Learn how Dassault Systmes Program Management solutions can help Aerospace and Aviation companies reliably execute on their proposed plans to meet their design, cost and schedule targets. Read this whitepaper and gain insights into new practices in four key areas: Consolidate all program data in one central data repository to use institutional knowledge and improve design analysis and decision support Data reuse between organizations to avoid duplicate efforts and misunderstandings Real-time reporting automation of key data to assess program performance and anticipate risks and opportunities Program control with real-time, up-to-date, detailed and verifiable information while preserving program and partner IP
Tags : 
dassault, systemes, program management, aerospace and aviation, program data, automation
    
Dassault Systmes
Published By: Progress Software BTA Financial     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper, application integration, application performance management, business management, business process management, service oriented architecture, web service management
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper, application integration, application performance management, business activity monitoring, business process management, service oriented architecture
    
Progress Software BTA Telecommunications
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense", security, it management
    
McAfee
Published By: IBM     Published Date: Apr 14, 2017
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base.
Tags : 
customer analytics, data analysis, competitive advantage, understanding your customer base
    
IBM
Published By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : 
ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad, design/simulation council, product value management, software level modeling, model-driven systems, automotive trends, sysml, csrs, mechatronics, enterprise applications, product lifecycle management, project management
    
IBM
Published By: Adobe     Published Date: Nov 09, 2017
Analysis of 55 million product SKUs. Aggregated and anonymous data from more than one trillion visits to 4,500 retail websites. Billions of data points flowing through Adobe Experience Cloud. Its no wonder our holiday shopping predictions are the most comprehensive and accurate in the industry. View the report, Adobe Digital Insights 2017 Holiday Shopping Predictions, and learn: Total forecasted online holiday revenue, broken down by day and device Top gifts on consumers wish lists this holiday season Best days for buying based on discounts and out-of-stock risks
Tags : 
    
Adobe
Published By: McAfee     Published Date: Apr 25, 2014
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well theyre camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis, simplifies remediation, security, it management
    
McAfee
Published By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material, business intelligence, database development
    
Zynapse
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Machine learning offers the depth, creative problem-solving capabilities, and automation to help security organizations gain significant ground against attackers. Its a powerful tool for processing massive amounts of data for the purpose of malware classification and analysis, especially for unknown threats. Through supervised learning, human researchers can continually develop new training models that expand the understanding and competency of machine learning systems.
Tags : 
analytics, security, problem solving, creative, data, researching, malware
    
McAfee EMEA
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management, network security, business intelligence, data protection
    
FireEye
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats todays advanced malware attacks using a combination of four techniques: Advanced analytics Collective global security threat intelligence Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: SAP     Published Date: Nov 22, 2011
Learn how SAP BusinessObjects BI OnDemand offers complete, integrated business intelligence that extends your reporting and analysis of data in the Salesforce application from salesforce.com. This software-as-a-service (SaaS) solution is free to try and requires no dedicated hardware or software installation.
Tags : 
sap, business objects, technology, salesforce, bi ondemand, free trial, reporting, application integration, business analytics, business intelligence, customer satisfaction, software compliance
    
SAP
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Gradient Boosting Machine (GBM) modeling is a powerful machine learning technique for advanced root cause analysis in manufacturing. It will uncover problems that would be missed by regression-based statistical modelling techniques and single tree methods, but can easily be used by analysts with no expertise in statistics and modelling to solve complex problems. It is an excellent choice for advanced equipment commonality analysis and will detect interactions between process factors (for example, machines, recipes, process dates) that are responsible for bad product. It can also be used to identify complex nonlinear relationships and interactions between product quality measurements (for example, yield, defects, field returns) and upstream measurements from the product, process, equipment, component, material, or environment.
Tags : 
    
TIBCO Software GmbH
Published By: Tealeaf     Published Date: Mar 31, 2011
Given the increasing importance of connected channels to nearly all businesses and government functions, it is no wonder that analysis of these channels is getting more attention.
Tags : 
tealeaf, advanced site optimization, web analytics, digital analysis application, analytics intelligence
    
Tealeaf
Published By: HP and Intel      Published Date: May 06, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtual technologies, the expected and realized benefits, ensuing infrastructure decisions,future outlook of the data center, and best practices for deployment.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure, desktop virtualization, application integration, application performance management, best practices, cloud computing
    
HP and Intel
Published By: HP and Intel      Published Date: May 02, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtualization technologies, the expected and realized benefits, ensuing infrastructure decisions, future outlook of the data center, and best practices for deployment.
Tags : 
    
HP and Intel
Published By: Turn     Published Date: Mar 09, 2016
In this Advertising Intelligence Report, you'll learn how to accurately analyze competition within markets and apply that knowledge to your next media buy.
Tags : 
programmatic, advertising intelligence, competition analysis, dsp, demand side plattorm, multichannel advertising, multichannel advertising
    
Turn
Published By: Aerohive     Published Date: Oct 23, 2014
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : 
wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity, 802.11, mobile computing, mobile data systems, mobile workers, wifi, wireless application software, wireless infrastructure, wireless service providers
    
Aerohive
Published By: Crimson Hexagon     Published Date: Mar 06, 2013
In this white paper, learn how to account for missing metric in financial reporting and valuations. How can we perform aggregate analysis of online consumer opinion to complement traditional marketing analysis and due diligence?
Tags : 
aggregate consumer voice, no longer on mute, social media, due diligence, financial institutions, voice of the consumer
    
Crimson Hexagon
Published By: Splunk     Published Date: Aug 17, 2018
Imagine a world where incident alerts arrive 30 minutes before problems even begin youd actually have the power to prevent outages and deliver a truly seamless experience to your customers. Sound impossible? Think again the right AIOps (Artificial Intelligence for IT Operations) solution can help you maintain uptime, reduce manual incident-management tasks and increase productivity.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Iovation     Published Date: Aug 02, 2019
Aite Groups second Payment Services Directive (PSD2) Research Report, commissioned by iovation, a TransUnion Company, provides an in-depth analysis of how those in the payment services and e-commerce market should prepare to handle the new strong customer authentication (SCA) requirements under PSD2. See the results of the actual market status in Europe regarding the main changes that PSD2 will bring to the e-commerce payments market. This complimentary, custom report, PSD2: Advent of the New Payments Market in Europe, will teach you what Aite Group concluded after interviewing 20 payments executives from European banks, other PSPs, merchants, payment networks and industry experts.
Tags : 
payment services directive, psd2 regulation
    
Iovation
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
US Based leading multinational mass media conglomerate had high volume of actionable tickets open for resolution and other related challenges for which LTI helped in building an event correlation system to find out the Root Cause Analysis of multiple events and analyse number of tickets. This was achieved by leveraging Mosaic Decision platform for processing. Benefits i. 60% reduction in incidents ii. 40% Time saved Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.