data information

Results 101 - 125 of 892Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Dell EMC     Published Date: May 10, 2017
IT departments in organizations of all types are looking to increase the agility, scalability, and cost-effectiveness of their data centers and storage initiatives. While the cloud, hybrid cloud, and private cloud options tend to be the first options that come to mind for many of these IT professionals, many are finding that hyperconverged infrastructures provide many of the same benefits. In this Enterprise Strategy Group white paper, uncover the many benefits of hyperconverged infrastructures and information on Dell EMC and Intel®'s Hyperconverged VxRack System 1000.
Tags : 
    
Dell EMC
Published By: SAP     Published Date: May 22, 2012
Is turning data into information still a challenge for your company? If so, you are not alone. View this on-demand Webinar with SAP and HP to learn how you can manage ever-increasing amounts of data; provide this data to business users to make critical decisions in a timely fashion; and enable true self-service business intelligence (BI) for business users.
Tags : 
sap, business solutions, business technology, enterprise, technology, enterprise analytics
    
SAP
Published By: Heiler     Published Date: Feb 22, 2012
This International Study brought to you by Heiler Software AG and the Stuttgart Media University takes a deeper look into how to achieve measurable results in terms of margins, revenue, costs and product launches.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Heiler     Published Date: Feb 22, 2012
Multiple channel distribution is becoming increasingly important, irrespective of whether the businesses in question are B2C or B2B-focused. The key drivers are the long tail, multi-site and changes in category management. Find out more now!
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Heiler     Published Date: Feb 22, 2012
This white paper takes a look at First Movers, those who believe in social commerce and hope to discover what significance Product Information Management (PIM) has in this context.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Heiler     Published Date: Feb 22, 2012
Find out why companies that are planning a mobile commerce strategy should use a product information or PIM system to enable this channel and how you can make the most of it.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Heiler     Published Date: Feb 22, 2012
In this white paper you'll find just what you need to know in order to build a strategy to optimize your conversion rate!
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Heiler     Published Date: Feb 22, 2012
This white paper provides insight on how PIM is changing process and offers 6 key factors on how to succeed in implementation and change management.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Heiler     Published Date: Feb 22, 2012
Many companies invest a great deal of money in optimizing their eCommerce shops. How can Product Information Management (PIM) system contribute to company's success? Read on to find out more.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Iron Mountain     Published Date: Aug 28, 2014
Download this analytics report to learn how your healthcare organization can develop a successful strategy to manage data.
Tags : 
iron mountain, healthcare it, health it, data management, healthcare data management, hit, meaniingful use, icd-10, information security, information management, information technology
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
Download this whitepaper to learn strategies for effective healthcare information lifecycle management.
Tags : 
iron mountain, healthcare data, healthcare it, hit, ehr, health information, information lifecycle management, ilm, information technology
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
The volume of information in the healthcare industry continues to grow exponentially. Meaningful Use, ICD-10, and Accountable Care are all contributing to this data growth. Download this whitepaper to learn how your organization can develop strategies to effectively manage this information throughout its life cycle.
Tags : 
iron mountain, healthcare information, information governance, information management, healthcare it, hit, data management, electronic information, healthcare roi, business intelligence, information technology
    
Iron Mountain
Published By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection, analytical applications, database security
    
Verdasys
Published By: ServiceNow     Published Date: Oct 02, 2015
From students to executives, finding solutions to improve efficiency, productivity, and communication has become vital. These end users are trying to excel in their work, and while they don't mean to cause harm, in most organizations this desire leads to the use of applications, services, and data storage and sharing beyond IT's boundaries. This practice, known as “shadow IT,” walks a line that information security officers are uncomfortable with, and it's having an obvious impact on technical support teams. The good news is, there are opportunities for all support organizations, regardless of their stance on shadow IT.
Tags : 
    
ServiceNow
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of today’s market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
    
Dun & Bradstreet
Published By: SAP     Published Date: Sep 19, 2017
SAP S/4HANA Retail for merchandise management is at the core of a comprehensive suite of retail offerings designed to help retailers meet the demands of a digital economy. It supports retail core processes end to end, starting with master data down to point-of-sales (POS) connectivity. It allows insights into operational retail data, empowering users with contextual, real time information for faster and better decision making. Processes can easily be extended to connect to business networks to form a digital ecosystem and collaboratively drive business model improvements. Equipped with a simple and intuitive user experience, the solution offers better support for headquarters users as well as store associates to drive compelling customer experiences.
Tags : 
master data, management, retail price, merchandise buying, collaboration, vendor agreement, forecasting, sap
    
SAP
Published By: ServiceNow     Published Date: Nov 05, 2012
When IT organizations utilize social media, it can efficiently help more people inside and outside the data center quickly access more services and knowledge. Combined people's knowledge and good will and the essence of information technology service management (ITSM) can be more fully realized.
Tags : 
servicenow, social media, social it, it environment, it management, business technology
    
ServiceNow
Published By: Dell     Published Date: Aug 08, 2018
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Red Hat     Published Date: Dec 09, 2013
Linux has proven to be a key element for successful datacenter modernization. Red Hat Enterprise Linux delivers cross-architecture standardization to a single operating system (OS) and provides a target platform for migrating mission critical workloads. For more information on Red Hat Enterprise Linux datacenter modernization watch the webinar here.
Tags : 
idc, red hat, informationweek, industry solutions, webinar, standardization, cloud computing, virtualization, os dynamics, technology reset, datacenters, market trends, it infrastructure, demarcation line, al gillen, data center
    
Red Hat
Published By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : 
social media, business intelligence, customer hub, crm, oracle, knowledge management, data management, business technology
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept