analyze this

Results 101 - 125 of 168Sort Results By: Published Date | Title | Company Name
Published By: Oracle Corporation     Published Date: May 11, 2012
By using the Oracle Big Data Appliance with Oracle Exadata, enterprises can acquire, organize and analyze all their data to make the most informed decisions. Read this whitepaper to learn about all of the key benefits of Oracle Big Data Appliance.
Tags : 
oracle, data warehousing, database, exadata, database machine, infrastructure, operation, operation costs
    
Oracle Corporation
Published By: Lenovo and Intel®     Published Date: Oct 18, 2016
We’ve analyzed the new features in Windows 10 to provide you with this quick and easy look at how to get the most benefit from these innovations when coupled with a Lenovo ThinkPad®, ThinkCentre®, or ThinkStation® device. Key features you and your team will love include: • Seamless productivity across multiple tasks, locations, and devices • New features start tile and screen snap combined with classic Windows ease of use • Robust, integrated security that matches cutting edge bio-metrics with enterprise-grade basics Find out more now.
Tags : 
lenovo, innovation, microsoft, windows 10, thinkpad, thinkcentre
    
Lenovo and Intel®
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
In the customer service solutions Forrester Wave™ for enterprise organizations, we identified the 11 most significant customer service solutions — eGain, Microsoft, Moxie, Oracle Service Cloud, Oracle Siebel CRM, Pegasystems, Salesforce, SAP Cloud for Service, SAP CRM, SugarCRM, and Verint — and researched, analyzed, and scored them. This report details our findings on how well each vendor fulfills our criteria and where it stands in relation to other vendor solutions in order to help customer service professionals select the right partner for their customer service initiatives.
Tags : 
oracle, service cloud, service management, customer interaction
    
Oracle Service Cloud
Published By: Microsoft     Published Date: Jul 20, 2018
In our 35-criteria evaluation of sales force automation (SFA) providers, we identified the 10 most significant ones — bpm’online, CRMNEXT, Infor, Microsoft, NetSuite, Oracle, Pegasystems, Salesforce, SAP, and SugarCRM — and researched, analyzed, and scored them. This report shows how each provider measures up and helps application development and delivery (AD&D) professionals make the right choice.
Tags : 
    
Microsoft
Published By: Drift     Published Date: Aug 05, 2019
This guide is used to deploy conversational sales to your sales development team. It will answer the following questions: • How to introduce live chat to your sales team • How to analyze good and bad conversations • How to coach your team to have better conversations • How to align a sales development representative (SDR) team with account executives and a marketing team This handbook uses the Conversational Framework to inform how you engage with, understand, and recommend the right thing to the right buyers at the right time
Tags : 
    
Drift
Published By: IBM     Published Date: Jul 24, 2012
Tax revenues have been declining recently and some of this loss is caused by fraud, tax evasion, and various forms of tax cheating. The ineffective recovery techniques can give government agencies poor results, which results in 20% of broad-approach audits ending in "no charge". By using IBM SPSS Predictive Analytics Solutions it is possible to maximize revenues, analyze the data you already collect, detect non-compliant accounts efficiently, and identify important differences in tax records. This program has tremendous power and features an easy to use interface that focuses investigations on case that yield large adjustments ensuring a successful ROI for clients.
Tags : 
tax revenues, fraud, ibm, business analytics, spss solutions, tax cheating, roi
    
IBM
Published By: IBM     Published Date: Aug 07, 2012
Databases and information management systems let you describe, categorize, store, modify and analyze data. What if you could do the same with decisions? Your systems could learn from previous choices and manipulate them to fit new parameters to intelligently mold future decisions made by executives, everyday business users and even your systems to optimize outcomes. Read this a specially selected excerpt from James Taylor's new book, "Decision Management Systems: A Practical Guide to Using Business Rules and Predictive Analytics" to discover the guiding principles for building decision management systems that can help your organization differentiate itself from the competition at virtually every decision point.
Tags : 
ibm, technology, decision management systems, business rules, predictive analytics, data, james taylor
    
IBM
Published By: NetProspex     Published Date: May 12, 2014
NetProspex analyzed the success rate of hundreds of email open rates and thousands of phone calls. The statistics proved that trigger-based emails had significantly higher conversion rates, but email sent on optimized days also did well. Download this guide on the best days to send emails.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services
    
NetProspex
Published By: Cherwell Software     Published Date: Apr 12, 2019
Info-Tech’s Category Reports provide a comprehensive evaluation of popular products in the IT Service Management market. This buyer’s guide is designed to help prospective purchasers make better decisions by leveraging the experiences of real users. The data in this report is collected from real end users, meticulously verified for veracity, exhaustively analyzed, and visualized in easy to understand charts and graphs. Each product is compared and contrasted with all other vendors in their category to create a holistic, unbiased view of the product landscape. Use this report to determine which product is right for your organization. For highly detailed reports on individual products, see Info-Tech’s Product Scorecard.
Tags : 
    
Cherwell Software
Published By: AWS     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
AWS
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analyst’s findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: • How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster • How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
    
CrowdStrike
Published By: Epson     Published Date: Dec 18, 2017
When it comes to display technology today, businesses tend to invest in flat panel TVs without much thought. But visual communication is an important element essential for success. When a new product is unveiled to a room of editors, when engineers analyze a circuit board, or when a teacher attempts to bring a classroom subject to life, visuals are as powerful as the spoken word, if not more. This paper offers insight on the state of visual display to ensure you make the right decision on your next investment, whether it’s a replacement, revamp, or remodel. Learn how to use and maintain visual display technology to make the greatest positive impact on your organization with the highest return of investment.
Tags : 
display technology, visual communication, virtual display, projectors
    
Epson
Published By: VMware AirWatch     Published Date: May 19, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
mobile management, best practices, providers, vendors, enterprise
    
VMware AirWatch
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
    
Cymfony
Published By: GreenPages Technology Solutions     Published Date: Aug 30, 2013
Seksui Diagnostics servers diagnostic manufacturers and clinical laboratories worldwide with a unique product portfolio comprised of diagnostic intermediaries or critical raw materials, finished reagent kits for use on clinical chemistry analyzers, and point of care rapid tests. With the demand for accurately scaling infrastructure requirements, they turned to EMC. In this whitepaper, learn the challenges needed to rapidly build a new data center from scratch and how EMC software can help create a new data center build-out in 3 months.
Tags : 
emc, vnx unified storage, avamar acclerate, infrastructure, data storage, data center, clinical chemistry analyzers, diagnostic data
    
GreenPages Technology Solutions
Published By: F5 Networks     Published Date: Mar 18, 2015
Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works and how to mitigate Neverquest.
Tags : 
f5 networks, malware, security, network security
    
F5 Networks
Published By: Alert Logic     Published Date: Jun 12, 2014
Log management is an organizational requirement that extends beyond simple data collection. Today’s compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Tags : 
log management, log collection, log solutions, log storage, security logs
    
Alert Logic
Published By: IBM     Published Date: May 07, 2015
The essential bridge between an organization and its customers is the workforce. The ability to engage, develop, recognize and support employees will be critical in the decisive battle for customer loyalty. It is employees who represent the organization's brand in the market, who interact with customers on a daily basis, who analyze changes in customer preferences and who develop and maintain the technologies that help connect the physical and digital worlds. And, therefore, a motivated and properly prepared workforce will be indispensable for success in the customer-activated world. Watch this webcast to learn: • Key CHRO insights from the Global C-Suite Study • Three workforce challenges for HR in a customer-driven world • Three actions HR can take with real-life examples
Tags : 
workforce, employees, customer loyalty, branding, talent acquisition, ibm
    
IBM
Published By: SnowFlake     Published Date: Jul 08, 2016
In the era of big data, enterprise data warehouse (EDW) technology continues to evolve as vendors focus on innovation and advanced features around in-memory, compression, security, and tighter integration with Hadoop, NoSQL, and cloud. Forrester identified the 10 most significant EDW software and services providers — Actian, Amazon Web Services (AWS), Hewlett Packard Enterprise (HPE), IBM, Microsoft, Oracle, Pivotal Software, SAP, Snowflake Computing, and Teradata — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architect professionals select the right solution to support their data warehouse platform.
Tags : 
forrester, enterprise, data, technology, best practices, innovation, security
    
SnowFlake
Published By: SAP     Published Date: Apr 07, 2011
In today's competitive global business environment virtually all firms work diligently to analyze alternatives and to create a business strategy that enables competitive advantage. Once the strategy has been defined however, nine out of ten organizations fail to implement it effectively. Don't let this happen to you.
Tags : 
bi strategy, real-time analytics, performance boost, business insight, business data insight, decentralization
    
SAP
Published By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
Symantec
Published By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : 
data protection appliances, appliance adoption, arcserve, security
    
Arcserve
Published By: iCims     Published Date: Jan 07, 2014
The War for Talent is going to have winners and losers, and we all want to hire a winning team. In such a competitive environment, an outstanding employment brand is required to attract the best and brightest. While most talent acquisition professionals know in theory that a company’s employment brand is key, few really analyze the candidate experience as the most important element of your brand. This eBook will dive into everything HR managers and recruiters must know about optimizing the candidate experience. You will also receive a product demo.
Tags : 
applicant tracking systems (ats), candidate sourcing, employment applications, hiring, hr strategy, human resource technology, job descriptions, online recruiting
    
iCims
Published By: Conductor     Published Date: Apr 09, 2013
Due to the technical nature of the SEO industry and its relative immaturity compared to other technologically advanced marketing disciplines, many SEOs still spend a significant percentage of their time on manual tasks. Conductor analyzed the day-to-day life of an SEO professional, determined the tasks that could be automated, and quantified the resulting increase in productivity by using SEO technology. Download this research paper to learn how new technology can tremendously increase an SEO marketer’s output.
Tags : 
seo, seo technology, budget, roi, search engine optimization, digital marketing, online marketing, interactive marketing
    
Conductor
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.