data strategy

Results 101 - 125 of 449Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server powered by Intel® Xeon® Platinum processor systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Carbonite     Published Date: Apr 09, 2018
IT admins tasked with restoring servers or lost data during a disruption are consumed with a single-minded purpose: successful recovery. But it shouldn’t take an adverse event to underscore the importance of recovery as part of an overall backup strategy. This is especially true with large datasets. Before you consider how you’re going to back up large datasets, first consider how you may need to recover the data. Variables abound. Is it critical or non-critical data? A simple file deletion or a system-wide outage? A physical server running onsite or a virtual one hosted offsite? These and a handful of other criteria will determine your backup and disaster recovery (BDR) deployment. What do we mean by large? A simple question with a not-so-simple answer. If your total data footprint is 5 TB or more, that’s considered large. But what kind of data is it? How many actual files are there? How frequently do they change? How much can they be compressed? It’s likely that two different 5 TB en
Tags : 
    
Carbonite
Published By: Oracle     Published Date: Apr 02, 2018
Deciding on a data management platform (DMP)? From audience scale to business strategy, you need to get to the core of a provider’s offerings before signing on the dotted line. Oracle Data Cloud created this checklist of the top seven questions you should ask any DMP provider. Download our checklist today to get your hands on the most important questions!
Tags : 
dmp, platform, management, oracle, data, cloud
    
Oracle
Published By: IBM Watson Health     Published Date: Mar 30, 2018
Chilmark Research, a global research and advisory firm, recently released a report rating vendors and solutions in the healthcare analytics industry. IBM Watson Health, a leader in healthcare analytics, has put together this infographic comparing how its solutions stack up against some of the closest competitors in the industry in areas such as population discovery and definition, predictive analytics, cost and utilization, and claims data contribution.
Tags : 
analytics, infographic, predictive analytics, cost utilization, population discovery, claims data, healthcare, chilmark, strategy, healthcare analytics
    
IBM Watson Health
Published By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
    
FICO
Published By: Hitachi Vantara     Published Date: Mar 20, 2018
Digital transformation is disrupting traditional, tried-and-true business process and leaving many enterprises scrambling for alternatives. Although the customer remains king for business success, data is quickly becoming an organization’s most strategic asset for reaching, interacting with and retaining customers. With ransomware attacks on the rise, a strict regulatory environment, and nimble, competitive upstarts entering the market, protecting and extracting value from your most strategic asset is a business imperative — and a formidable challenge.
Tags : 
    
Hitachi Vantara
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: SAS     Published Date: Mar 06, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues.
Tags : 
    
SAS
Published By: NetApp     Published Date: Mar 05, 2018
Read this comprehensive guide to the General Data Protection Regulation and learn how to comply with new regulations and address business implications, establish a holistic data compliance strategy and better manage your data through the lens of data privacy by design.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Sprinklr     Published Date: Feb 28, 2018
"Retail depends on social. Social depends on you. Learn best practices for building a better retail experience through social. To help kick-start your planning, we've gathered our most popular retail content in ""Social Strategies for Retail."""
Tags : 
social strategies, retail, social media, consumers, digital, social media, social, physical locations, data, social conversations, visual experiences, sprinklr, consumer reviews, consumer ratings, location intelligence, social engagement, marketing strategy
    
Sprinklr
Published By: Bronto     Published Date: Feb 01, 2018
What you'll learn: • Why batch-and-blast email is losing its effectiveness and the email techniques to replace it. • How techniques like user-generated content and the mining of unstructured data can boost email effectiveness. • What artificial intelligence is offering today – and what it could offer years from now. • How omnichannel merchants can leverage physical locations as part of their online strategy.
Tags : 
email, omnichannel, retail, ecommerce
    
Bronto
Published By: SAS     Published Date: Jan 17, 2018
The Industrial Internet of Things (IIoT) is flooding today’s industrial sector with data. Information is streaming in from many sources — equipment on production lines, sensors at customer facilities, sales data, and much more. Harvesting insights means filtering out the noise to arrive at actionable intelligence. This report shows how to craft a strategy to gain a competitive edge. It explains how to evaluate IIoT solutions, including what to look for in end-to-end analytics solutions. Finally, it shows how SAS has combined its analytics expertise with Intel’s leadership in IIoT information architecture to create solutions that turn raw data into valuable insights.
Tags : 
    
SAS
Published By: Oracle     Published Date: Jan 08, 2018
Data is a driver of growth and change that is quickly becoming the world's most valuable resource. As such, finance leaders face increased pressure to value data as an asset on their balance sheets and use it to drive business strategy. To capitalize on the power of data, learn how to pinpoint where you are today. what steps you can take to reach your goals and how to measure success.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jan 08, 2018
In the age of the customer, businesses realize the need to take their big data insights further than they have before, in order to win, serve, and retain their customers. Today’s modern company has more data than ever before and is now looking to derive insights from the data that will help propel it forward. As firms move data analytics to the cloud, there is a new set of challenges and barriers to overcome, but with the help of insights-platforms-as-a-service, companies will be able to innovate with data and drive business forward.
Tags : 
    
Oracle
Published By: Google Analytics 360 Suite     Published Date: Jan 05, 2018
xxx
Tags : 
    
Google Analytics 360 Suite
Published By: Google Analytics 360 Suite     Published Date: Jan 05, 2018
xxx
Tags : 
    
Google Analytics 360 Suite
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
For data-driven businesses, cloud can be a boon. Data can be found, processed and managed on the cloud without an investment in local hardware infrastructure, but what does that mean to information trust and governance? When data comes from cloud-based sources, IT needs a plan for data integration and security. Download this insightful white paper and learn the four key priorities you must consider when developing your IT strategy to promote good hybrid information governance. Learn the blend of process, organizational and technical enablers that will allow you to move to a hybrid environment with speed and confidence.
Tags : 
data-driven business, cloud, information trust, information governance, data integration, data security, it strategy
    
Group M_IBM Q1'18
Published By: Red Hat     Published Date: Jan 02, 2018
Organizations are at a strategic crossroads. According to IDC analysts,1 two-thirds of CEOs will center their corporate strategies around digital transformation initiatives. The goal of digital transformation is only partly to make existing functions more effective. The greater goal is to be able to do new things and use existing data in new, better ways. Yet, 72% of current IT spending2—and the focus of IT resources—is on maintaining existing systems. This creates tension between what needs to be done today and what should be done for the future. Middle-tier applications, according to IDC,3 are the core of a digital transformation strategy because they provide data integration, messaging, and application programming interface (API) management. Middle-tier applications also provide a platform for application development and management that can handle traditional enterprise applications and cloud-native, distributed applications. Specifically, a Java™ EE-based application platform can
Tags : 
    
Red Hat
Published By: MoreVisibility     Published Date: Dec 19, 2017
Each year Digital Marketing becomes more targeted and the available products get more detailed in terms of data advertisers can leverage with targeting. With search engines getting more sophisticated and collecting more user data, it’s important to make these considerations within your marketing strategy. Digital Marketing has changed from a few search engines and display networks to now include Social Media platforms, internet radio, video, algorithmic buying, and more. With all of these new tactics available, how can a business decide what is right for them and which channels will be most effective? Here, we will define what it takes to create an effective Digital Marketing Strategy and how we can navigate this complex marketing channel.
Tags : 
    
MoreVisibility
Published By: Dell and VMWare     Published Date: Dec 15, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside ar
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside,
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee