inform

Results 176 - 200 of 4184Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q2'19     Published Date: Jul 01, 2019
The days of data being narrowly defined as highly structured information from a few specific sources is long gone. Replacing that notion is the reality of a wide variety of data types coming from multiple sources, internal and external, to an organization. All of it is in service of providing everyone from IT, to line-of-business (LOB) employees, to C-level executives with insights that can have an immediate and transformative impact.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Jul 01, 2019
The days of data being narrowly defined as highly structured information from a few specific sources is long gone. Replacing that notion is the reality of a wide variety of data types coming from multiple sources, internal and external, to an organization. All of it is in service of providing everyone from IT, to line-of-business (LOB) employees, to C-level executives with insights that can have an immediate and transformative impact.
Tags : 
    
Group M_IBM Q3'19
Published By: SAS     Published Date: Jun 26, 2019
To support open government initiatives and uphold the values of transparency, participation and collaboration in the US, federal agencies today make their data open, or publicly accessible. Citizens can use this open data to assess college affordability, the economy, educational issues, environmental damage, health care, taxes, agriculture, the climate and more. Governments can use APIs to pull this open data into SAS Visual Analytics as a way to identify trends and patterns and obtain all sorts of new insights. With public health surveillance, for example, governments can monitor and evaluate indicators that point to high-risk areas so they’ll know where and how to focus efforts. Such public health surveillance can serve as an early warning system for impending emergencies, document the impact of an intervention, track progress toward public health goals, and clarify health problems to inform public health policies and strategies.
Tags : 
    
SAS
Published By: Adobe     Published Date: Jun 26, 2019
Customers expect to have the same experience with a store no matter where they are shopping – in a brick and mortar location, on the store’s website via laptop or on the store’s app via mobile device. Combining online and offline data helps retailers stay informed about their customers so they can drive customer loyalty and increase revenue.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
In the race to please customers and beat out the competition, there’s been a lot of talk about customer data platforms (CDPs). For marketers, a CDP is just what they’ve been looking for — a more comprehensive approach to unified customer data that lets you include raw personally identifiable information or sensitive data in your data pool. But while IT teams see the ultimate value, they may question the idea introducing a new point solution that complicates their tech stack even more. The days of brute forcing customer experience with new technology are over. Today, IT teams need to make decisions about customer experience management that span the business and go beyond marketing. That requires a different approach to the customer data problem. To learn more about our solution to the customer data platform, read our article Real-time CPD. Real-time customer experience.
Tags : 
    
Adobe
Published By: GFT USA, Inc.     Published Date: Jun 26, 2019
In today's continuously evolving world of technology, the growth of data consumed and analyzed at pace provides a great opportunity to gain competitive advantage. GFT and Google Cloud provide the strategy and support to tap into this opportunity so your company can stay ahead.
Tags : 
    
GFT USA, Inc.
Published By: Procore     Published Date: Jun 25, 2019
Understanding the inextricable link between safety, quality and productivity is a critical piece of knowledge for today's construction management professional. And it should be leverage at all stages of a projects, from planning to programming and through the execution of the work. A proper task analysis will: Account for all three elements: safety, quality and productivity include input from site personnel Include the information needed to make decisions on the site Be a workable plan Remember that once you accept safety, productivity and quality are inextricably linked, you begin to realise that the data you harvest from your various site reports, such as reports of near misses or the need for constant rework, may also be able to fill in the blanks and tell a story about the overall progress and productivity on a project as well.
Tags : 
    
Procore
Published By: Darktrace     Published Date: Jun 21, 2019
The City of Las Vegas serves as the legislative body that governs Las Vegas, Nevada. While their network covers 3,000 users, the City of Las Vegas oversees private and sensitive data of both the 600,000 residents and over 42 million tourists per year. With Darktrace's unique ‘immune system’ approach, City of Las Vegas has increased its confidence that sensitive information is protected and secure.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
"The ability to see and take action is key, which is why we are so excited about the Antigena capability that Darktrace has." Hear from James Bynoe, Head of Cyber & Information Security from eBay Classified, on how Darktrace's AI for cyber can raise the bar and help small teams' performance "by having artificial intelligence as a component of your overall program".
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Published By: Zscaler     Published Date: Jun 20, 2019
Descubren nuestro informe semestral Cloud Security Insights Threat Report 2019 – un estudio de las amenazas basadas sobre los protocolos SSL/TLS, que analiza el trafico encriptado sobre el cloud Zscaler™ entre julio y diciembre de 2018. El informe, recopilado por nuestro equipo de desarrollo del ThreatLabZ, se interesa a la variedad de ataques ejecutados vía SSL y bloqueados por Zscaler, entre las cuales los ataques de phishing, los botnets, la explotación del navegador y el contenido malicioso.
Tags : 
    
Zscaler
Published By: Google - SAP     Published Date: Jun 20, 2019
According to SiriusDecisions, 79% of companies miss their forecast by 10% or more. Pipeline management is often mismanaged and sales forecasting often off-base. Getting accurate and reliable information about the state of the deals in your pipeline is the key to a happy sales force. Accurate pipeline information also is the foundation of predictable and reliable sales forecasts. Wouldn’t a sales forecast that’s right all of the time be a boon to your organization? Download our new eBook “Pipeline Management and Forecasting are Key to Improving the Sales Experience” to find out how automated tools, AI, and clean data sets can help you as a sales manager to: ? Eliminate the mid-pipeline “black hole” and find out what’s really going on ? Use signals outside of your CRM to get scarily accurate deal opportunity scores and quarterly forecasts. ? Help align the customer journey with your sales process and get happy customers and happy sales reps
Tags : 
    
Google - SAP
Published By: Qatar Financial Centre     Published Date: Jun 20, 2019
Since 2005, The Qatar Financial Centre (QFC) has helped over 500 companies from around the world to set up their business in one of the fastest-growing economies in the world, capitalising on all that the MENA region has to offer. As an onshore business and financial centre, our model is unique in the region. We promote Qatar’s openness to foreign investment, give bespoke advice to help companies make informed decisions and establish their operations in Qatar.
Tags : 
    
Qatar Financial Centre
Published By: Genesys     Published Date: Jun 19, 2019
Contact center technology plays a major role in the success of your customer experiences and business operations. Having the optimal solutions, infrastructure and provider in place are fundamental to meeting current and future goals and expectations. If you’re struggling with outdated contact center systems that limit channels and customer information, the best path forward is to migrate to a solution that lets you overcome those technology limitations. And the first step is to download this comprehensive checklist to evaluate key solutions and vendor considerations. You’ll learn how to: Identify business goals and outcomes that are most important for your organization Evaluate deployment options based on necessary flexibility and capabilities Understand your technology needs and priorities Assess vendor viability
Tags : 
    
Genesys
Published By: Red Hat     Published Date: Jun 19, 2019
Technology has fundamentally changed the way we live. Access to data and information anytime, anywhere is no longer a luxury—it is a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver higher-quality applications more often, enabling companies to stay relevant and seize digital business opportunities. Cloud-native is an approach to building applications that takes advantage of cloud computing models and DevOps principles to make the delivery of new features and services faster and more flexible. With a cloud-native strategy, organizations can begin the culture, process, and technology changes needed to meet new demands and become an IT organization that can deliver business innovation faster. The following checklist will assess your needs and possible business impacts to help you choose a cloud-native platform that benefits the business, developers, and IT operations team.
Tags : 
    
Red Hat
Published By: Cisco EMEA     Published Date: Jun 19, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
    
Cisco EMEA
Published By: Mist Systems     Published Date: Jun 19, 2019
For centuries, new technologies have ushered in entirely new eras of progressive change in all facets of life, and have revolutionized countless industries. The invention of the steam engine brought about the industrial revolution and expanded trade and transportation. Quantum physics was the foundation of the electronics revolution that brought us transistors, TV, radio, and computers. And the Internet has brought about a stunning information and communication revolution, which is still sending shock waves across virtually every industry, and to the very core of our cultures and lifestyles.
Tags : 
    
Mist Systems
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: pepperjam     Published Date: Jun 18, 2019
We get it: When it comes to choosing affiliate providers, you have choices. But with so many features and offerings to compare, making the right—or even the most informed choice can feel daunting. And it doesn’t have to. You need an affiliate provider that can give you the tools and expertise you need to be successful. See for yourself how Pepperjam stacks up against the competition and make the choice that’s right for you. You’re almost there! Just complete the form to download the Buyer’s Quick Guide to Affiliate Providers!
Tags : 
    
pepperjam
Published By: Darktrace     Published Date: Jun 17, 2019
The City of Las Vegas serves as the legislative body that governs Las Vegas, Nevada. While their network covers 3,000 users, the City of Las Vegas oversees private and sensitive data of both the 600,000 residents and over 42 million tourists per year. With Darktrace's unique ‘immune system’ approach, City of Las Vegas has increased its confidence that sensitive information is protected and secure.
Tags : 
    
Darktrace
Published By: Beqom     Published Date: Jun 12, 2019
Erhalten Sie Informationen, die sonst gerne übersehen werden und Ihnen dabei helfen werden, erfolgreich in die Digitalisierung einzusteigen. HR und Sales Manager stehen vor der Herausforderung, den Vergütungsprozess zu rationalisieren und gleichzeitig Spitzenkräfte zu gewinnen und diese auch zu halten sowie die Durchsetzung der Geschäftsstrategie und die Einhaltung gesetzlicher Vorschriften zu gewährleisten. Füllen Sie das Formular aus, um sofort unseren kostenlosen eGuide herunterzuladen und zu erfahren, wie die erfolgreichsten digitalen Transformationen von Vergütungsprozessen funktionieren.
Tags : 
    
Beqom
Published By: MicroStrategy     Published Date: Jun 11, 2019
The use of analytics has exploded across business, and the value it already has delivered has heightened executives' expectations. Now data can be processed in real time to meet a constantly widening range of analytic needs. How your organization utilizes them in the next decade will be essential to your success. These developments come at an opportune time. Organizations are being over-whelmed by the rivers of data generated by applications and systems on-premises or flowing in via the cloud. At the same time, the cost of computational power has declined dramatically, making it practical to apply analytics to and generate information on just about anything. But no advance comes without challenges. While the widespread availability of analytics has created seemingly valuable insights, executives and managers are finding that those insights are not easily linked to steps that will improve business outcomes or optimize actions. Furthermore, analytics are not always easy for line of b
Tags : 
    
MicroStrategy
Published By: KPMG     Published Date: Jun 10, 2019
Forces such as consumerisation, expanding regulatory requirements and the shift to outcome-based pricing are all compelling procurement leaders to re-evaluate strategies. Read this briefing to find out: • the key disruptors shaping the future of procurement • how to develop an agenda to deal with disruption • seven key areas of difference between current and future procurement models • essential questions to inform your strategic thinking.
Tags : 
    
KPMG
Published By: Gigamon     Published Date: Jun 10, 2019
Explosive data growth and network complexity hindering your ability to deliver results? We get it: the more complex the application infrastructure, the harder it is to ensure apps are functioning optimally. Read our new eBook, “Driving Digital Transformation with Application Intelligence,” to learn how to provide insight into applications across complex infrastructure. Discover previously hard-to-get information about bottlenecks, suspicious data, and user experience.
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.