data sets

Results 76 - 100 of 230Sort Results By: Published Date | Title | Company Name
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners
Published By: MuleSoft     Published Date: Jan 25, 2016
Data is one of the most valuable business assets. Companies are using data to provide more personalized, tailored experiences to their customers, analyzing customer and operational behavior to make better decisions, and providing web and mobile apps to their customers, employees, and partners. As the keys to that data, APIs are poised to become valuable business assets in and of themselves. In this whitepaper, we'll learn how APIs are currently transforming the enterprise, and how they will become even more integral to how we do business in the future.
Tags : 
data management, business practices, data center. data application, enterprise applications, api management
    
MuleSoft
Published By: MuleSoft     Published Date: Apr 13, 2016
Every corner of an enterprise needs technology to build new applications for their specific function or customer. IT needs to transform from its traditional function as the sole technology provider to become an adaptive, responsive and nimble organization that can keep up with the pace of the digital era as well as embrace the opportunities provided by a change-driven environment. This transformation can occur only if IT transforms itself into a strategic business enabler rather than a centralized technology function. Being an enabler means that IT has to decentralize and democratize application development and data access to the different Lines of Business (LoBs) and functional business partners. This way, IT can concentrate on a partnership with the business - i.e. providing a set of strategic and consistent assets and technology.
Tags : 
technology, enterprise applications, best practices, business optimization, technology architecture, application management
    
MuleSoft
Published By: Looker     Published Date: Dec 03, 2015
Everywhere you look, companies are using external-facing analytics to maximize the value derived from their data assets, by moving customers up the value chain, increasing stickiness, and offering a more competitive product on the marketplace. Listen to learn about embedding BI software, including; • Top uses cases for embedding business intelligence software • Case studies from different companies currently embedding BI • Build vs buy considerations • Evaluating ROI
Tags : 
    
Looker
Published By: Datawatch     Published Date: Dec 16, 2015
In this paper, the Top 10 Ways to Supercharge Analyst Productivity with Data Preparation, learn how a self-service data preparation solution saves analysts’ time by allowing them to manipulate, filter, enrich, blend and combine disparate data sets in a matter of minutes.
Tags : 
data preparation, data wrangling, analyst productivity, data analysis, cleaning data, data blending
    
Datawatch
Published By: Datawatch     Published Date: Feb 03, 2016
Some companies estimate that up to 80 percent of their analysts’ time is spent on data preparation. Thorough, automated data preparation, however, can quickly transform raw information into reliable, consistent data sets ready for analysis. This report from Gartner details why information management and business analytics leaders must introduce data preparation into their big data initiatives in order to improve both the understanding of the data, and the productivity of analysts. Read the report now to learn more.
Tags : 
datawatch, data preparation, data analytics, data analysis, analyst productivity, information management, business analytics, big data
    
Datawatch
Published By: IBM     Published Date: Jul 27, 2016
IBM i2 Enterprise Insight Analysis helps analysts and investigators turn large data sets into comprehensive intelligence, in near real-time. With the help of advanced analytics and visual analysis capabilities, analysts can uncover hidden connections, patterns and trends buried in disparate data. Equip analysts and those on the front line with the tools they need to generate actionable intelligence, with mission critical speed.
Tags : 
ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence
    
IBM
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Most organizations use public cloud to reduce costs, but end up spending way more than they expected. Google Cloud Platform is growing at a staggering rate for the business benefits and its rich features around Machine Learning, Artificial Intelligence, Big Data and Containers. However, it’s important to keep a tab on your spend while maximizing your cloud benefits. Reducing spend in GCP doesn’t need to be a process of trial and error -- there are proven ways to save money in your GCP environment without negatively impacting desired outcomes. Read this eBook to learn the 8 different ways to reduce your spend, including: -Terminating Zombie Assets -Deleting Unattached Persistent Disk -Rightsizing Compute Engine VMs Download to learn and practice these techniques to reduce spend in GCP.
Tags : 
cloud management, google cloud platform, multicloud management
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: The critical role DNS plays in the user experience The failure and outage risks of relying on a single DNS solution The major resiliency and performance differences between unicast vs anycast addressing Criteria for evaluating a managed DNS service provider Download Now!
Tags : 
    
Oracle + Dyn
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: Sierra Wireless     Published Date: Jun 19, 2019
By simplifying the ability of companies to securely extract, orchestrate and act on data from when it is generated by energy assets to when it is transmitted to the cloud, Octave simplifies the development and commercialization of Energy IoT applications. With Octave, energy companies are empowered to realize the Energy IoT’s tremendous potential, with new demand response, energy efficiency optimization, predictive maintenance and other applications that maximize the value created by energy assets and minimize their environmental impact. In doing so, these Energy IoT applications can reduce energy costs, improve customer engagement, lower greenhouse gas emissions and increase energy reliability. Start with Sierra to learn more about how our Octave D2C data orchestration solution can help you bring to market Energy IoT applications that reimagine the future of energy.
Tags : 
    
Sierra Wireless
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: • The critical role DNS plays in the user experience • The failure and outage risks of relying on a single DNS solution • The major resiliency and performance differences between unicast vs anycast addressing • Criteria for evaluating a managed DNS service provider Download Now! "
Tags : 
    
Oracle + Dyn
Published By: Urban Airship     Published Date: Oct 18, 2017
FIGHT THE FOMO! MAKE SURE YOU CHOOSE THE RIGHT MOBILE ENGAGEMENT VENDOR You've been tasked with evaluating mobile engagement vendors. Now what? Be sure you’re asking the right questions. We’ve gathered questions 14 key areas to ask vendors based on a few data sets — high-level thoughts from analyst firms like Forrester, the best questions prospective customers ask us, what we wish customers in certain verticals would ask, and more. It's thorough and it’ll give you a solid, informed place to start. Download the RFP template and get: ? A comprehensive list of 150+ questions in 14 key areas — and the business reasons behind asking them ? Recommendations for vertically-specific questions to ensure you’re including what’s most critical to getting your needs met
Tags : 
    
Urban Airship
Published By: Diligent     Published Date: Jul 10, 2017
You may already know what a board portal is. You Probably know that paper is heavy and hackers are a risk, and by now, you know there are multiple vendors that offer board portals. You may not realize that by making the right choice, a board can improve governance and efficiency while collaborating in a secure setting. With lots of vendors to choose from, here are the most important questions to ask during your search, divided into the five essential categories. For private, public, non profit and government boards alike, finding an app that excels across all five categories will lead to better electronic security and a more productive board.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
Diligent
Published By: Informatica     Published Date: Nov 21, 2011
This demo showcases the ease-of-use to replicate data sets, the process of connecting to a data source, defining a mapping, initial synchronization, extraction and finally applying to a destination.
Tags : 
demo, data sets, data replication, replication, mapping, synchronication, reporting, loading
    
Informatica
Published By: SAS     Published Date: May 24, 2018
Compliance doesn’t have to be a scary word, even when facing the multifaceted challenges of the European Union’s General Data Protection Regulation. In fact, following through with plans for sustainable GDPR compliance can have many long-term benefits for your organization. That's because relying on data-driven decisions across the board sets you on track to gain a competitive edge. In February 2018, SAS conducted a survey with 183 global, cross-industry businesspeople involved with GDPR at their organizations. Based on the survey results, this e-book delves into the biggest challenges and opportunities organizations have faced on the road to GDPR compliance. Read on for advice from industry experts about the best path to compliance. Learn what steps your peers across a variety of industries have already taken and discover how an integrated approach from SAS can continue to guide your journey toward GDPR compliance.
Tags : 
    
SAS
Published By: SAS     Published Date: May 24, 2018
This paper provides an introduction to deep learning, its applications and how SAS supports the creation of deep learning models. It is geared toward a data scientist and includes a step-by-step overview of how to build a deep learning model using deep learning methods developed by SAS. You’ll then be ready to experiment with these methods in SAS Visual Data Mining and Machine Learning. See page 12 for more information on how to access a free software trial. Deep learning is a type of machine learning that trains a computer to perform humanlike tasks, such as recognizing speech, identifying images or making predictions. Instead of organizing data to run through predefined equations, deep learning sets up basic parameters about the data and trains the computer to learn on its own by recognizing patterns using many layers of processing. Deep learning is used strategically in many industries.
Tags : 
    
SAS
Published By: Staples     Published Date: May 24, 2016
Today, many enterprises are struggling to manage their printing environments to ensure efficiency, security, and control. This problem has created one of the fastest-growing trends in printing today: managed print services (MPS). While keeping data safe is a growing concern for all companies, MPS software has no access to the content being printed, faxed, or scanned. Read this white paper to learn how MPS helps to protect and control printed assets and can play a big role in ensuring sensitive documents don't end up in the wrong hands.
Tags : 
it security, managed print services, outsourced print services, print management, print costs
    
Staples
Published By: Alteryx, Inc.     Published Date: Sep 07, 2017
To learn how to get your Tableau datasets faster, download the How To Guide “6 Steps to Faster Data Blending for Tableau.”
Tags : 
    
Alteryx, Inc.
Published By: Google Apigee     Published Date: Mar 06, 2019
Inside the API Product Mindset APIs expose data or functionality for use by applications and developers, which means they allow access to a business’s valuable digital assets—and thus to the heart of the business itself. Vulnerable APIs can expose a business’s core data and services to a variety of threats. Therefore, API security should be of paramount importance to any enterprise that exposes digital assets. Google Cloud’s new eBook, Building and Managing Secure APIs, takes a deeper look at the do’s and don’ts of enterprise API security. Explore how to design secure, easy-to-use APIs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use cases ? API monetization checklist
Tags : 
    
Google Apigee
Published By: SAP     Published Date: Dec 10, 2018
In a consumer-driven digital economy, the pace of innovation is relentless. This era of intelligent mega-processes requires businesses to combine the right data sets and convert them into intelligent insights. The path to this digital transformation is not easy and studies have shown that 8 out of 10 early digital transformation initiatives have failed. Your transformation journey can be successful with the right approach. Download this paper to learn how you can embark on your journey to the Intelligent Enterprise.
Tags : 
    
SAP
Published By: Oracle     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.