data strategy

Results 226 - 250 of 457Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
CA Technologies
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : 
ssl, ssl solutions, networking, privacy, security, network security, enterprise applications, business technology
    
F5 Networks Inc
Published By: Fusion-io, Inc.     Published Date: May 27, 2014
Optimizing SQL Server Clusters with End-to-end Flash Hybrid Storage
Tags : 
fusion-io, esg, esg lab, data center, enterprise strategy group, iocontrol n5-spx, hybrid storage, hybrid san
    
Fusion-io, Inc.
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn a four-pronged approach to create a disaster recovery plan for your hybrid IT environments to help ensure successful recoveries of your data and applications.
Tags : 
sungard, sungard availability service, disaster recovery, complex it environment, hybrid it environment, it environment, recovery time objective, rto
    
SunGard Availability Services
Published By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
    
CloudEndure
Published By: Riverbed     Published Date: Sep 05, 2014
This white paper details the current challenges organizations face with respect to their evolving IT requirements, growing storage needs, and more extensive data protection requirements. It focuses on an expanding set of cloud-based storage offerings and the buying considerations of those who want to improve the data management metrics associated with data protection services such as backup and recovery. The paper also takes a closer look at the solutions offered by Riverbed Technology that allow organizations to integrate cloud-based storage withing solutions that address a growing set of data protection demands.
Tags : 
cloud, enterprise storage, data protection, it requirements, metrics, security, data management
    
Riverbed
Published By: IBM     Published Date: May 28, 2014
Read the whitepaper to find out how one client improved business value of their data by implementing InfoSphere Optim processes and technologies.
Tags : 
ibm, data lifecycle management, infosphere optim, integrating big data, governing big data, integration, best practices, big data
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
Adopting an Integrated Data Management strategy can be a highly effective way to help IT support business growth, facilitate data governance and manage costs.
Tags : 
ibm, back-up, data quality, database management, knowledge and data management, storage management, data management, databases
    
IBM
Published By: Talend     Published Date: Nov 02, 2018
The rise of data privacy regulations and the increasing risk of data theft have made data protection an essential part of any data-driven strategy. This executive summary gives you a quick overview of the risks and regulations related to data privacy, and a framework for addressing both without compromising on customer experience.
Tags : 
    
Talend
Published By: dinCloud     Published Date: Jun 19, 2018
Too often, the debate about IT is dominated by a narrow focus on near-term objectives: shrill cries claim that the business will stop (or fail) if a feature isn’t added to the ecommerce site, if the mobility platform isn’t improved, if the network and compute back end aren’t upgraded, if storage and database performance isn’t accelerated. Often, these changes are truly essential, and demand immediate attention. However, midmarket firms can’t assemble a meaningful strategy from point responses to near-term issues. Increasingly, midmarket enterprises are finding that continued operational success requires an “agile-cloud” – an agility-oriented, cloud-based IT strategy that addresses the three core changes faced by midmarket firms: the changing nature of business infrastructure, the accelerating pace of change in business, and the expanding scope of IT.
Tags : 
empowered, it< tech, ecommerce
    
dinCloud
Published By: Aprimo     Published Date: Apr 09, 2012
Listen to this podcast and hear how marketers can get a 360 degree view into spend - from planning to execution and measurement - across all discretionary channels.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, roi, marketing strategy
    
Aprimo
Published By: Staples     Published Date: Jun 01, 2017
Where IT departments were once considered a cost of doing business, today's data center is part of the strategic planning that drives the company forward and increases return for stakeholders. Creating a roadmap for your IT strategy and infrastructure requires careful planning, along with a thorough evaluation of your current state and a detailed view of what you wish to accomplish. Read this white paper to get the big picture of what is necessary to create the best cooperative experience for your data center, office operations, and end users.
Tags : 
staples business advantage, it strategy, it infrastructure
    
Staples
Published By: Hacker Group, Inc.     Published Date: Jan 27, 2012
Finding your specific target has always been the real key to getting great results. Technology now allows marketers to create, maintain and learn from "big data" about their customers and prospects. This paper shows you how.
Tags : 
database marketing, marketing ideas, marketing plan, marketing tools, integrated marketing, marketing strategy, marketing campaign, strategic marketing
    
Hacker Group, Inc.
Published By: Siperian     Published Date: Jan 24, 2007
Master Data Management is a cohesive strategy for managing all master data domains.  Where is your organization most likely to derive business value from a Master Data Management solutions?  This report answers these questions and details the path forward:  Adaptive Master Data Management.
Tags : 
data management, master data management, mdm, business intelligence, data integration, data quality, siperian
    
Siperian
Published By: Akamai Technologies     Published Date: May 08, 2017
Online video’s explosive growth has created tremendous new opportunities for engaging customers and developing new revenue streams. But despite the fact that video is becoming increasingly central to many online business strategies, many publishers still lack the tools and data to understand what factors are important in keeping their audiences engaged. In this whitepaper, we present data from the first ever large-scale scientific study that shows how video performance quality affects viewer behavior. The results help to shed light on important considerations that can help businesses craft a successful online video strategy – boosting their business bottom line and ultimately reaping the rewards of online video’s vast potential.
Tags : 
data optimization, audience engagement, business strategies, customer engagement, business potential
    
Akamai Technologies
Published By: Akamai     Published Date: Mar 08, 2017
In this whitepaper, we present data from the first ever large-scale scientific study that shows how video performance quality affects viewer behavior. The results help to shed light on important considerations that can help businesses craft a successful online video strategy – boosting their business bottom line and ultimately reaping the rewards of online video’s vast potential.
Tags : 
data, customer engagement, video, online video, online video strategy, viewer behaviour
    
Akamai
Published By: TrendKite     Published Date: Apr 25, 2018
Today’s marketers are leveraging technology and data to drive decision making: demand gen, marketing communications, and other disciplines can strongly demonstrate their value with metrics that summarize tangible bottomline impact on the business. That hasn’t been true for PR. In PR, we’re still tied to legacy metrics that are more about counting mentions and ‘clips’ than about measuring business impact.
Tags : 
public relations, marketing, martech, pr strategy
    
TrendKite
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Digital transformation (DX) is a must for midsize firms (those with 100 to 999 employees) to thrive in the digital economy. DX enables firms to increase competitive advantage through initiatives such as automating business processes, creating greater operational efficiencies, building deeper customer relationships, and creating new revenue streams based on technology-enabled products and services. DX is a journey, and it starts with firms embracing an IT-centric vision that guides a data-driven, analytics-first strategy. The outcome of DX initiatives depends on the ability of a firm to efficiently leverage people (talent), process, platforms, and governance to meet the firm’s business objectives.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jan 05, 2015
The data center is central to IT strategy and houses the computational power, storage resources, and applications necessary to support an enterprise business. A flexible data center infrastructure than can support and quickly deploy new applications can result in significant competitive advantage, but designing such a data center requires solid initial planning and thoughtful consideration of port density, access-layer uplink bandwidth, true server capacity, oversubscription, mobility, and other details.
Tags : 
data center, consolidation, server virtualization, new applications, it management, data management
    
Cisco
Published By: RedPoint Global     Published Date: May 11, 2017
Marketing organizations are often limited in their ability to progress marketing tactics from single channel to cross-channel and real-time customer engagement. While marketing organizations might have a robust customer engagement strategy in place, often times there is a gap between their strategy and their ability to execute, with the right personalization and context that customers prefer. Over 62 percent of customers are always-on and readily addressable, but marketers aren’t implementing the right strategies to reach them. This eBook discusses data-driven marketing tactics that can help marketers mind the gap – bridging customer strategy and ability to execute, with the right personalization and context that customers prefer.
Tags : 
customer engagement, customer data, customer data platform, data quality, customer data management, customer experience, data-driven marketing
    
RedPoint Global
Published By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
    
Teradata
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee