time data

Results 1 - 25 of 1051Sort Results By: Published Date | Title | Company Name
Published By: Dun & Bradstreet     Published Date: Apr 21, 2016
Is your well-worn playbook in need of a refresh? What worked best for B2B marketers last year may not help you optimize a moment with a customer or prospect today. All too often, baked in processes get in the way of delighting customers. If you’re a B2B marketer who wants to be a game changer, you have come to the right place. This reader is for marketers who crave to poke and pull apart the “tried and true”. Break the cycle of “best practice” rituals and ask yourself these questions: - When was the last time you made a truly bold move in your marketing? - Do you have any idea how bad your data problem really is? -How long will you continue to create sales content nobody uses? We answer these questions and more- download the free guide today!
Tags : 
marketing strategies, hoover's, b2b marketer, analytics, internet marketing, sales
    
Dun & Bradstreet
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Para una productividad extraordinaria. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside são marcas comerciais da Intel Corporation ou de suas subsidiárias nos EUA e / ou em outros países
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: SPSS     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the technology sector.
Tags : 
spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence, data analysis, analytical methods, strategic planning, customer intimacy, crm, best practices, business intelligence, statistics, statistical analysis, data management, decision-making
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the marketing sector.
Tags : 
spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence, data analysis, analytical methods, strategic planning, customer intimacy, crm, best practices, business intelligence, statistics, statistical analysis, data management, decision-making, web analytics
    
SPSS, Inc.
Published By: CDW Vmware     Published Date: Aug 02, 2012
In today's competitive business landscape, users' needs are continuously changing. Employees want access to their data and applications anytime, anywhere, from any device. The journey to seamlessly integrate data and applications across all devices begins with desktop modernization.
Tags : 
modernize, desktop, data, application, access, device, seamlessly, integrate, modernization, cio, vmware, department, user, infrastructure, manage, migrate, new, platforms
    
CDW Vmware
Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection, secure business
    
F5 Networks
Published By: Sitecore     Published Date: Mar 24, 2017
Getting started with personalization can seem overwhelming. We show you how with 10 easy tactics, from distinguishing between first-time web visitors and existing customers, to using real-time data to understand which calls to action will lead to conversions.
Tags : 
personalization, context marketing, digital experience, customer experience
    
Sitecore
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Datawatch     Published Date: Dec 16, 2015
In this paper, the Top 10 Ways to Supercharge Analyst Productivity with Data Preparation, learn how a self-service data preparation solution saves analysts’ time by allowing them to manipulate, filter, enrich, blend and combine disparate data sets in a matter of minutes.
Tags : 
data preparation, data wrangling, analyst productivity, data analysis, cleaning data, data blending
    
Datawatch
Published By: SAP     Published Date: May 18, 2014
This paper explores the results of a survey, fielded in April 2013, of 304 data managers and professionals, conducted by Unisphere Research, a division of Information Today Inc. It revealed a range of practical approaches that organizations of all types and sizes are adopting to manage and capitalize on the big data flowing through their enterprises.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Coupa Software     Published Date: Nov 04, 2014
The benefits of eInvoicing include fewer lost invoices, quicker approval cycles, increased on-time payments, and improved vendor satisfaction. Yet only 20% of companies receive more than 50% of their invoices electronically. This Paystream Advisors survey report includes data on how eInvoicing is improving AP efficiency and why some organizations are still slow to adopt (and why they shouldn't be).
Tags : 
einvoicing, approval cycles, vendor satisfaction, efficiency, on-time payments, invoicing
    
Coupa Software
Published By: Lumension     Published Date: Jun 03, 2015
The IT news over the last year has been filled with story after story on data breaches, making the release of Lumensions’ 4th annual data protection maturity report all the more relevant. Review this report for a timely analysis of the threats, responses, policies, and technologies comprising today’s shifting data security landscape. It also reveals how organizations have made progress, the steps they plan to take to address data protection challenges in 2015—and where they may still be at risk.
Tags : 
data protection, data, security, cloud, storage
    
Lumension
Published By: SAS     Published Date: Apr 25, 2017
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
    
SAS
Published By: Motorola Solutions     Published Date: Nov 29, 2018
In today’s increasingly mobile world, Energy workers require instant communication and access to data intelligence wherever the job may take them. From the oil rig to the electric grid and everywhere in between, having the right data, in the right hands, at the right time, no matter the environment or device of choice — is simply non-negotiable. Organizations across various Energy segments — oil & gas, electric utilities, water utilities, and mining — are currently juggling a mix of communication devices and are hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions. Yet, citizens rely on their homes being heated in the winter, on clean running water, and on lights that turn on when they flip the switch. Meeting these expectations requires reliable, clear voice and data communications for Energy workers day-in and day-out. So oil & gas workers can communicate safely in hazardous environments. So precious resources are
Tags : 
    
Motorola Solutions
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Viavi Solutions     Published Date: Apr 01, 2015
Ready to effectively monitor in the cloud? It’s time to go beyond vendor provided data and establish performance metrics and baselines that matter. The 3 Key Cloud Monitoring Metrics IT Brief helps you identify cloud monitoring challenges while providing the strategies to succeed.
Tags : 
cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics
    
Viavi Solutions
Published By: eDataSource     Published Date: Apr 13, 2015
Looking to improve your email campaigns? Now you can with 3 remarkable email tools. Competitive Tracker - email data & creative on what your direct competitors are doing. Design Tracker, powered by Litmus - pre test the campaign before you hit send button. Inbox-tracker - know in real-time your inbox delivery. Learn more by downloading our quick overview white paper.
Tags : 
edatasource, email tools, email data, competitive tracker, design tracker, inbox-tracker, email marketing, emerging marketing, business intelligence, usability
    
eDataSource
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Published By: SAP     Published Date: May 18, 2014
From its conception, this special edition has had a simple goal: to help SAP customers better understand SAP HANA and determine how they can best leverage this transformative technology in their organization. Accordingly, we reached out to a variety of experts and authorities across the SAP ecosystem to provide a true 360-degree perspective on SAP HANA.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shopkeepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, marketing opportunity
    
IBM
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shop-keepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources
    
IBM
Published By: Epicor Software Corporation     Published Date: Jan 09, 2019
To Keep Pace With Your Customers and Competitors, It’s Time to Leave Your Legacy Software Behind. Legacy enterprise resource planning (ERP) systems struggle to keep up with the modern pace of business, and they fail to meet the changing needs of your workforce. Can your leaders quickly find and analyze vital data? Are your employees’ tasks and processes straightforward and efficient? Does your ERP software make it easier to support growth? See how manufacturers upgrading to the latest ERP software from Epicor transform their business by delivering the visibility, efficiency, and productivity essential for sustained growth.
Tags : 
    
Epicor Software Corporation
Published By: iPass     Published Date: Sep 22, 2009
A few short years after 3G service brought us anytime, anywhere broadband-and before Apple rolled out its 3G iPhone-4G networks began raising the bar in select markets. This latest evolution in wireless networking offers faster wireless data transmission speeds, vastly superior coverage and support for a new generation of mobile applications and services.
Tags : 
ipass, wifi, smartphones, roaming, web portal, vpn, ethernet, connection detail records, mobility, mobile workers, cdrs
    
iPass
Published By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : 
cyberthreat, healthcare, gdpr, ransomware
    
Mimecast
Published By: SAS     Published Date: Aug 28, 2018
“Unpolluted” data is core to a successful business – particularly one that relies on analytics to survive. But preparing data for analytics is full of challenges. By some reports, most data scientists spend 50 to 80 percent of their model development time on data preparation tasks. SAS adheres to five data management best practices that help you access, cleanse, transform and shape your raw data for any analytic purpose. With a trusted data quality foundation and analytics-ready data, you can gain deeper insights, embed that knowledge into models, share new discoveries and automate decision-making processes to build a data-driven business.
Tags : 
    
SAS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.