inform

Results 1 - 25 of 4184Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software     Published Date: Sep 16, 2019
“¿Cómo utilizaremos todos los datos de la red inteligente?” Los productores, distribuidores y consumidores de electricidad de casi todos los países desarrollados se están haciendo esa pregunta. Los datos producidos por los medidores inteligentes, los dispositivos conectados, los generadores de energía, las presas hidroeléctricas, las granjas solares y los consumidores más sofisticados, tiene el potencial de mejorar considerablemente la confiabilidad de la generación, gestión, almacenamiento y distribución de electricidad. La analítica avanzada puede ayudar a alcanzar todo ese potencial. Pero, ¿cómo? Tiene un papel de gran relevancia en las empresas de servicios que buscan convertir los datos en dinero mediante el análisis de la información acumulada para mejorar la gestión en el lado de la demanda, la asignación de recursos y de personal, pronosticar la demanda y el mantenimiento preventivo. De hecho, la analítica está impulsando esta transformación de la industria.
Tags : 
    
TIBCO Software
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Oracle     Published Date: Sep 26, 2019
It’s no secret that data-driven marketing (DDM) is top of mind for brand and agency executives. But what is surprising—shocking, in fact—is how vital first- and third-party information is for creative and execution strategies today. Case in point: 70% of senior marketing executives from brands, agencies and related industry segments say data-driven marketing is a core element of a majority of their campaigns, according to a new Oracle-Forbes Insights survey. This full immersion in data and analytics—more than what many industry insiders may have realized—shows how quickly brands and agencies have recognized the potential benefits and rushed to replace outdated “gutfeel” decision making with quantifiable research. This was another recurring theme in the Oracle-Forbes Insights study, which found that marketing executives rely on advanced analytics to increase sales, attract new customers and expand brand awareness. In addition, 71% of respondents feel they effectively use it to identify
Tags : 
    
Oracle
Published By: IBM     Published Date: Feb 26, 2016
Welcome to “How to put IBM Watson to work for powerful information access and insights,” where we’ll show you how Watson and its Watson Explorer application can get down to business and help your organization be more effective, more productive, and make better-informed decisions.
Tags : 
ibm, watson explorer, analytics, data, enterprise software
    
IBM
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
save money, save time, online food ordering, food, ordering food online, seamless
    
Seamless
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
    
Seamless
Published By: TIBCO Software     Published Date: Sep 16, 2019
La manera en que ponemos en marcha nuestros vehículos, calentamos nuestros hogares e impulsamos nuestras industrias está cambiando de manera radical. Las tecnologías que se han implementado a gran escala pero que resultan ser ineficientes, como los automóviles que utilizan motores de combustión interna, están siendo reemplazadas con alternativas electrificadas y más efectivas. Y las energías renovables como la solar, la eólica y la térmica, entre otras, apoyadas por el almacenamiento en baterías de próxima generación, están atendiendo un porcentaje cada vez mayor de la demanda de energía. Este reporte aborda cómo el proveedor líder de infraestructura de tecnologías de la información, TIBCO, está impulsando la transformación digital al permitir tomar mejores decisiones y realizar acciones más veloces e inteligentes a través de TIBCO® Connected Intelligence Cloud. Los siguientes ejemplos muestran cómo la tecnología de TIBCO está ayudando a las empresas de la industria energética:
Tags : 
    
TIBCO Software
Published By: Dell EMC EMEA     Published Date: Nov 26, 2018
En décembre2017, Dell a demandé à ForresterConsulting de mener une étude pour déterminer comment les organisations d'entreprises sont structurées en termes de services informatiques. L'étude a exploré deux types de profils technologiques, les contrôleurs numériques et les transformateurs numériques, ainsi que les tendances et défis rencontrés dans l'approvisionnement en ordinateurs. Les contrôleurs numériques sont souvent associés à l'approche descendante, la structure linéaire, et mettent l'accent sur la sécurité et l'exactitude. En revanche, les transformateurs numériques mettent l'accent sur l'innovation, s'orientent vers l'employé et le client, et donnent la priorité à la rapidité et la souplesse. En comprenant les deux groupes, les entreprises peuvent surmonter les défis qui découlent de la gestion du cycle de vie des ordinateurs. En investissant dans les outils de gestion des ordinateurs existants et en s'associant avec une entreprise spécialisée dans le déploiement et la gestion
Tags : 
    
Dell EMC EMEA
Published By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : 
healthcare, data protection, patient medical data
    
Mimecast
Published By: Workday     Published Date: Mar 02, 2018
Collaboration can sometimes result in conflagration, the ignition of opposing designs, or competing ideas shouted to closed minds. But a unique consortium of colleges and universities nationwide are working in diligent concert with Workday, a designer of cloud-based software, to develop the first student information system built entirely in the 21st century.
Tags : 
collaboration, cloud-based software, student information system
    
Workday
Published By: bChannels     Published Date: Dec 11, 2018
IT service continuity undoubtedly is at or near the very top of every IT organization’s list of strategic initiatives, considering the dramatic costs and implications of downtime. Download this informative whitepaper for some compelling reasons to upgrade.
Tags : 
    
bChannels
Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon
Published By: Uberflip     Published Date: Jan 03, 2019
No matter what industry you’re in or role you have, we all share a universal interest in trends. As marketers, we look to Google Trends to understand what keywords and search terms are most popular; we look for trending hashtags and conversations on social to inform the content we put out; and we put “Trends” sessions on our agendas at conferences because we know they’ll draw an audience. We’ve tapped into this almost universal desire to understand what the masses are doing.
Tags : 
    
Uberflip
Published By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
Published By: Ipswitch     Published Date: Mar 14, 2014
This newly-released e-Guide provides senior technology leaders with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.
Tags : 
ipswitch, file transfer, stagnation, automation, file management, file management systems, file transfer systems, productivity, file security, file movement, managed file transfer, mft, information management, collaboration
    
Ipswitch
Published By: Citrix     Published Date: Jun 03, 2015
Download this paper now to discover ten ways to grow your business with webinars.
Tags : 
weinars, use webinars to grow your business, how to grow your business, customer interaction, share information, communication, tips for using webinars
    
Citrix
Published By: SAS     Published Date: Apr 25, 2017
Your company’s culture is indispensable in informing the right way to govern data, a point we hope to drive home in this white paper. When you review the mistakes that otherwise earnest companies have made in their quests to apply rigor to their data, you’ll see why our mantra is: There is no template for data governance. And hopefully, you’ll realize what you need to do now.
Tags : 
    
SAS
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance
    
Brainloop
Published By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : 
riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization, cloud, cloud computing
    
Riverbed
Published By: TrendKite     Published Date: Apr 25, 2018
This informative whitepaper that will help shape your PR decision making. Stats include: 43% of web traffic is driven by search engines 7 in 10 executives reported being more inclined to do business through organizations that are thought leaders Influencer campaigns did not exist 5 years ago...now brands swear by them Download now to learn more!
Tags : 
pr strategy, marketing, digital age
    
TrendKite
Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management
    
Tripwire
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.