data analytics

Results 101 - 125 of 1251Sort Results By: Published Date | Title | Company Name
By: Birst     Published Date: Jul 16, 2013
Discover seven indications that you need advanced analytics for your CRM application and why they matter. Learn about common CRM data analysis pain points and how advanced CRM analytics can solve them.
Tags : business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
     Birst
By: BlackLine     Published Date: Aug 06, 2018
The biotechnology and pharmaceutical industry is among the most heavily regulated industries in the world, challenged by evolving regulations, complex compliance requirements and close regulatory scrutiny. At the same time, companies must address the market pressures of globalization, the use of predictive data analytics and digital technologies, and the industry’s ongoing consolidation. In this challenging environment, confidence in internal controls is crucial.
Tags : 
     BlackLine
By: BlueData     Published Date: Aug 19, 2015
Big Data is on virtually every enterprise’s to-do list these days. Recognizing both its potential and competitive advantage, companies are aligning a vast array of resources to access and analyze this strategic asset. However, despite best intentions, the majority of these Big Data initiatives are either extremely slow in their implementation or are not yielding the results and benefits that enterprises expect. Download this white paper to learn how to solve the Big Data intention-deployment gap and see how you can make your infrastructure in a flexible, easy-to-use platform that will provide in-depth analytics.
Tags : big data, big data intention-deployment, in-depth analytics, hadoop, data management, data center
     BlueData
By: BlueData     Published Date: Aug 19, 2015
As companies seek to better understand their customers, their opportunities, and themselves, they are embracing new technologies such as Hadoop and NoSQL to better manage and manipulate their data. Yet a complete solution for big data has many moving parts while at the same time these moving parts are continuously evolving. Download this white paper to figure out how to make all the moving parts work smoothly together and see how this will ease frustration with business users and free up your IT teams time to handle other issues.
Tags : big data infrastructure, hadoop deployment, spark, analytics software, big data, data management, data center
     BlueData
By: BlueData     Published Date: Mar 13, 2018
In a benchmark study, Intel compared the performance of Big Data workloads running on a bare-metal deployment versus running in Docker containers with the BlueData software platform. This landmark benchmark study used unmodified Apache Hadoop* workloads
Tags : big data, big data analytics, hadoop, apache spark, docker
     BlueData
By: Bluekai     Published Date: Aug 10, 2012
Hewlett-Packard, a leading technology provider with a global footprint, saw an opportunity to significantly improve its digital marketing efforts by creating a universal framework for user-level data collection and usage.
Tags : data management platform, bluekai, supply-side platforms, audience engagement, audience extension, audience analytics, hewlett-packard, omnicom, managing data, data management, data center
     Bluekai
By: Bluekai     Published Date: Aug 10, 2012
Publishers today live in a data-driven world. It is no longer enough to simply create content, build audiences, and sell ads.
Tags : data management platform, bluekai, supply-side platforms, audience engagement, audience extension, audience analytics, data management, data center
     Bluekai
By: Bluekai     Published Date: Aug 10, 2012
How can you analyze ALL of your disparate first and third-party audience, campaign and performance data in one central place? How can a DMP power a 360 approach to audience data management and analysis to get more bang out of your marketing dollar?
Tags : dmp, data management platform, crm, analytics, audience targeting, predictive audience analytics, real-time campaign analytics, campaign performance, data management, data center
     Bluekai
By: BMC Software     Published Date: Jul 22, 2015
The rise of the digital enterprise has created an explosion of valuable, yet unharnessed data for IT organizations. Traditional IT tools and processes, founded on the notion of control and management, are unable to support the speed and agility requirements of the digital enterprise. IT organizations must reengineer their approach from traditional analytics and reporting to adaptive, real-time digital service analytics.
Tags : 
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
In this white paper, you’ll discover an enterprise approach to Big Data that leverages workload automation to: - Integrate Hadoop workflows into your enterprise processes to deliver new applications faster - Resolve issues faster with predictive analytics, automated alerts, and early problem detection - Achieve compliance and governance adherence
Tags : big data, business processes, enterprise systems, hadoop, compliance
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
The rise of the digital enterprise has created an explosion of valuable, yet unharnessed data for IT organizations. Traditional IT tools and processes, founded on the notion of control and management, are unable to support the speed and agility requirements of the digital enterprise. IT organizations must reengineer their approach from traditional analytics and reporting to adaptive, real-time digital service analytics.
Tags : operations analytics, digital enterprise, data, data management, service analytics
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
Watch this on-demand webinar to see how BMC TrueSight IT Data Analytics speeds the time to understand and resolve issues as well as other practical use cases.
Tags : data analytics, bmc truesight it data analytics, practical use, manual log analysis, monitoring, log data
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
Find out how BMC TrueSight IT Data Analytics can help you identify and resolve issues faster by leveraging both monitoring and log data so you can avoid performance issues and improve quality of service while also enhancing IT staff productivity.
Tags : bmc truesight it data analytics, monitoring data, log data, performance issues, quality of service, productivity
     BMC Software
By: BrightEdge     Published Date: Nov 13, 2014
BrightEdge tapped into its massive Data Cube repository to provide a comprehensive view into the channels that drive traffic and the types of content that perform best. BrightEdge created this report to help brands understand the actual performance of site content by channel and by industry.
Tags : brightedge, content marketing, data analytics, marketing data, marketing platform, market intelligence, business intelligence
     BrightEdge
By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
     CA Technologies
By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
     CA Technologies
By: Calpont     Published Date: Mar 13, 2012
This paper looks at advances in database analytics and how they change the playing field for marketing executives willing to seize opportunities made available by new advances in hardware and software.
Tags : analytics, big data, online, marketing, database, database analytics, advance, hardware, software, data, information, data management, business technology
     Calpont
By: Campaigner     Published Date: Apr 30, 2015
We created this handbook to help you become the world’s greatest email marketer. On these pages, we will introduce some of the same advanced email marketing techniques and tactics used by marketing departments at the largest and most sophisticated companies.
Tags : content marketing, email marketing, smart content, data analytics, crm, customer engagement, email campaigns
     Campaigner
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com