mine

Results 1326 - 1350 of 1615Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Sep 30, 2014
Stop to think about how – and how often – your business interacts with customers. Every day, with each interaction, data is created. What percentage of the data generated by these interactions are you using? There are so many channels for interaction, like social media, call centers, sales staff, help and support resources, marketing and campaigns. Typically, organizations believe that they are using only a small fraction of it effectively – at best, upwards of 10 percent of all the available data. Why? One reason relates to the difficulties in collecting all this data. This limitation is beginning to wane as commodity hardware becomes increasingly popular for big data storage. But another major inhibitor to examining all customer data has been the inability to examine millions, or even billions, of data points that constitute the customer picture. And much of this is now in the form of unstructured text inputs.
Tags : 
sas, text analysis visualization, voice of the customer, unstructured text inputs, business technology
    
SAS
Published By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing, security, it management, knowledge management, enterprise applications, platforms, data management
    
SAS
Published By: SAS     Published Date: May 12, 2016
This paper examines the barriers to adoption from an IT and end-user perspective, and shows how self-service analytics in general – and SAS Visual Analytics in particular – can eliminate these barriers. Self-service analytics empowers users to truly exploit the wealth of data available to them, while ensuring that the IT organization maintains governance and control over that data.
Tags : 
sas, business analytics, it organization, networking, it management, wireless, data management, business technology
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
Organizations in pursuit of data-driven goals are seeking to extend and expand business intelligence (BI) and analytics to more users and functions. Users want to tap new data sources, including Hadoop files. However, organizations are feeling pain because as the data becomes more challenging, data preparation processes are getting longer, more complex, and more inefficient. They also demand too much IT involvement. New technology solutions and practices are providing alternatives that increase self-service data preparation, address inefficiencies, and make it easier to work with Hadoop data lakes. This report will examine organizations’ challenges with data preparation and discuss technologies and best practices for making improvements.
Tags : 
    
SAS
Published By: Gleanster Research     Published Date: Jun 17, 2014
This Deep Dive offers best practices for investing in a new CMS solution. They include ways to justify new CMS investment internally, determine organizational readiness, identify the most relevant product features, and select a vendor. These best practices reflect the strategies, methods and steps that Top Performing organizations reported in the 2014 WCM Survey.
Tags : 
gleanster, content management system, cms, cms solutions, content management, it management, end user experience, customer experience
    
Gleanster Research
Published By: Quantcast     Published Date: Feb 13, 2015
With tons of data available throughout the customer journey, it’s important for advertisers to know which metrics will help them determine their online ad effectiveness. Evaluate your own performance with these simple questions every advertiser should ask.
Tags : 
ad performance, advertising solutions, best practices, quantcast, ad terminology
    
Quantcast
Published By: Quantcast     Published Date: Feb 13, 2015
Avec les tonnes de données disponibles sur le parcours d’un client en amont de son achat, il est important pour les annonceurs de savoir quels indicateurs sauront les aider à déterminer l’efficacité d’une campagne en ligne. Évaluer votre propre performance avec ces simples questions que chaque annonceur doit se poser.
Tags : 
performance de ses campagnes, quantcast, roi
    
Quantcast
Published By: Symantec     Published Date: Aug 09, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. The malware test used samples for real-world threats, false-positives, and remediation. Download the report to find out how each of the security solution performed. Download Now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: Symantec     Published Date: Nov 15, 2013
Learn how to determine which virtual backup products are most appropriate for your particular use-cases and scenarios and evaluate whether the total cost of ownership fits your budget.
Tags : 
syamntec, virtual backup software, evaluation report, info-tech research group, backup and recovery, security
    
Symantec
Published By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : 
damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
    
Damballa
Published By: Brainshark     Published Date: Oct 16, 2013
Traditional ways of talking to customers, partners, and employees—memos, phone calls, newsletters—are being replaced by web-based interactive and social communication tools. Of those surveyed, 88% said that mobile access to social communication or collaboration tools was either important or very important. This whitepaper examines how companies can leverage Mobile, Social Enterprise, and video to create an enriched environment that delivers important communications and fosters active engagement.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video, tablet
    
Brainshark
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, security, it management, data management, business technology, data center
    
Arbor Networks
Published By: Citrix     Published Date: Apr 16, 2014
This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.
Tags : 
dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
Citrix
Published By: Citrix     Published Date: Dec 16, 2013
This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Tags : 
citrix, xenapp, xendesktop, mission critical applications, productivity, remote access
    
Citrix
Published By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
viavi solutions, hybrid clouds, networking, it management, wireless, enterprise applications, data management
    
Viavi Solutions
Published By: Symantec     Published Date: Jul 11, 2014
This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropriate for your organization. Find out why Symantec was named a “Champion” in virtual backup software.
Tags : 
info-tech, landscape, virtual, software, backup, machine, vendors, networking
    
Symantec
Published By: Marketo     Published Date: Jul 11, 2013
Use this worksheet to determine if your company is ready to use marketing automation.
Tags : 
marketing automation, lead generation, marketo, email marketing, new marketing, social marketing, mobile marketing, marketing automation worksheet, roi
    
Marketo
Published By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : 
cloud computing, infrastructure, marketplace, application, hybrid, enterprise, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : 
cloud computing, infrastructure, marketplace, application, hybrid, enterprise, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : 
datacenter, optimization, computing, enterprise, scalability, network, orchestration, innovation, cloud, mobility, social, analytics, networking, enterprise applications
    
Cisco
Published By: Riverbed     Published Date: Jul 15, 2014
ESG was engaged by Riverbed to develop a detailed EVV analysis designed to help IT organizations determine the relative costs and benefits of deploying Riverbed Cascade compared with a typical performance management solution.
Tags : 
economic value, validation, performance, management, esg
    
Riverbed
Published By: HP     Published Date: May 14, 2014
As business purposes have changed over the years, IT approaches and infrastructures have had to change in lock-step to serve them optimally. IT professionals are now combining the best of the centralized approach – via virtualization, federation, and clouds of all sorts – with the best of the decentralized model – via mobile and localized consumption and production. In this paper, Enterprise Strategy Group examines approaches to IT operational challenges and business requirements. Learn how HP Converged Storage’s comprehensive approach represents a logical evolution development in storage, delivering ease, flexibility and cost-efficiency all in one.
Tags : 
3par storeserv, converged storate, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud, it management, enterprise applications
    
HP
Published By: HP     Published Date: May 14, 2014
This Enterprise Strategy Group Solution Impact Analysis examines how well-designed, executed and implemented storage -- such as converged storage solutions from HP -- can elevate storage from a necessity and a cost center to an asset that contributes to the business. The outcome of a series of in-depth interviews conducted by ESG analysts, performed with senior IT professionals in various industries, this report confirms that ROI is a real-world value that HP Converged Storage customers are realizing today.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud, it management, enterprise applications
    
HP
Published By: HP     Published Date: May 14, 2014
This paper is the outcome of a series of in-depth interviews ESG analysts performed with senior IT professionals in various industries. The objective was to determine the direct and indirect value customers derive from using HP Converged Storage solutions to address their primary storage needs, and more specifically their returns on information—such as gaining more value from corporate data for better decisions; infrastructure—in the form of lowering costs and increasing infrastructure agility; and individuals—including time savings and reduced management complexity.
Tags : 
storage, real world roi, hp 3par, hp converged storage, storage solutions, it management, enterprise applications
    
HP
Start   Previous    47 48 49 50 51 52 53 54 55 56 57 58 59 60 61    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee