> Technology > Data Management > Analytical Applications
 

Analytical Applications

Analytical Applications are software that is designed specifically for analysis and development of a particular environment or object.
Results 176 - 200 of 446Sort Results By: Published Date | Title | Company Name
White Paper Published By: Adobe     Published Date: Nov 25, 2013
Without document classification in play, it's impossible to know what to protect. The mobile ecosystem makes workers infinitely more productive, which is one reason that it won’t go away. This white paper explores the question: How can IT govern and protect content in such ad hoc and semi-structured environments? Please download whitepaper to learn more.
Tags : 
document, document classification, document security, mobile, mobile workforce
    
Adobe
Case Study Published By: GetWellNetwork, Inc.     Published Date: Nov 22, 2013
Learn how to improve the efficiency of your pain management workflow and see how these changes will improve the day to day tasks for your nurses allowing them to work more effectively.
Tags : 
getwell network, pain management, pain management workflow, joint commission, pain assessment documentation
    
GetWellNetwork, Inc.
White Paper Published By: Oracle     Published Date: Nov 05, 2013
This survey based whitepaper, based on interviews with 229 executives worldwide assesses the challenges and opportunities faced by global businesses as they optimize sales resources to develop territories and incentive compensation plans. This is critical in response to emerging market opportunities and complex global economic challenges.
Tags : 
creating sales territory, sales performance, sales plan development, sales data, sales territory
    
Oracle
White Paper Published By: IBM     Published Date: Oct 31, 2013
Turn marketing challenges into opportunities with marketing performance analytics
Tags : 
financial accountability, roi, return on investment, accountability, marketing analytics
    
IBM
White Paper Published By: VMTurbo     Published Date: Oct 25, 2013
Your business is complex. And although Big data promises to manage this complexity, the technology services that run your business are also complex. It is possible to combat this complexity with IT analytics. Read this report to learn how IT analytics that turns big data efforts inward can effectively manage the technology services that run your business.
Tags : 
forrester, vmturbo, big data, analytics, it analytics
    
VMTurbo
White Paper Published By: IBM     Published Date: Oct 15, 2013
Connect with Your Connected Customers
Tags : 
process of delivery, generation c, deliver to right customers, enterprise marketing management, emm
    
IBM
White Paper Published By: NetApp     Published Date: Sep 19, 2013
Learn about FlexPod Select with Hadoop and how this enterprise class Hadoop has validated, pre-configured components that allow for faster deployment, higher reliability, and smoother integration with your existing applications and infrastructure.
Tags : 
flexpod select, hadoop, netapp, cisco, validated designs
    
NetApp
White Paper Published By: NetApp     Published Date: Sep 19, 2013
Learn how to maximize the business value of your data by having a storage infrastructure that will easily address long-term retention policies, finds and retrieves content quickly from long-term repositories, and uses object storage efficiently.
Tags : 
wiley, object storage, business value, data, big data
    
NetApp
White Paper Published By: NetApp     Published Date: Sep 19, 2013
Download this solutions guide to get a technical overview on building Hadoop on NetApp E-series storage and learn how it will effectively help deliver big analytics with pre-engineered, compatible, and supported solutions ultimately reducing the cost, schedule, and risk of do-it-yourself systems.
Tags : 
netapp, open solution, hadoop, solutions guide, e-series storage
    
NetApp
White Paper Published By: Riverbed     Published Date: Jul 17, 2013
Effective IT planning and decision making are dependent upon having a complete asset inventory and an accurate understanding about dependencies available before, during and after IT change activities. Application discovery and dependency mapping (ADDM) solutions automate the process of discovering and mapping transactions and applications to the underlying infrastructure and application interdependencies. Learn how Riverbed Cascade’s built-in application discovery and dependency mapping capabilities can help you shorten project times and mitigate risk.
Tags : 
effective it, addm, application discovery, riverbed cascade, analytical applications
    
Riverbed
White Paper Published By: HP - Enterprise     Published Date: Jun 04, 2013
Hewlett-Packard (HP) is unique in this EMA Radar in its ability to combine two threads – a single analytic overlay as embodied in its Service Health Analyzer (SHA) product, and a broader suite solution optimized for HP to participate in all three use cases here with maximum functional impact. This is not entirely a black-and-white situation, as SHA does leverage and currently largely depends on integration with HP Business Service Management 9.1, which is itself a suite. But SHA can assimilate other third-party sources, checks out brilliantly in early-phase deployments in terms of time-to-value and analytic power, and is the lead reason for HP’s strong Value Leader showing in technical performance management.
Tags : 
ema radar, performance analytics, apa, service health analyzer, analytical applications
    
HP - Enterprise
White Paper Published By: StatSlice     Published Date: Mar 27, 2013
A guide to assessing your organization and building a roadmap to Analytics success.
Tags : 
business analytics, roadmap, business intelligence, analytics strategy, business intelligence strategy
    
StatSlice
Webinar Published By: TeamQuest     Published Date: Mar 04, 2013
Watch how a global capacity management team managed service levels after multiple bank acquisitions.
Tags : 
performance management, optimization, capacity management, network, managed service
    
TeamQuest
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti
    
McAfee
White Paper Published By: CollabNet     Published Date: Jan 11, 2013
Read this whitepaper to learn about the 5 best practices for engineering performance management, and understand the do’s and don’ts of metrics management, analytics and reporting in software development environments.
Tags : 
performance management, it operations, productivity, measurement, analytical applications
    
CollabNet
White Paper Published By: IBM     Published Date: Nov 29, 2012
This white paper presented by IDC Health Insights and IDC's Search and Discovery Technologies research practice and sponsored by IBM. Read more of this white paper to gain insight into the value of mining unstructured data in more.
Tags : 
ibm, unstructured data, data mining, data organization, data refinement
    
IBM
White Paper Published By: IBM     Published Date: Nov 08, 2012
In this white paper, Forrester discusses the 70 criteria evaluation of customer analytics vendors and discuss 6 of the most significant software providers, one including IBM, and scored them. Read on to learn how each vendor fulfills each key point.
Tags : 
forrester, ibm, customer analytics solution, data management, analytics production
    
IBM
Live Event Published By: Nutanix, Inc.     Published Date: Oct 17, 2012
Join us for this hands-on, technical VDI Design Workshop where everything from choosing the right broker to zero clients and multi-site design will be discussed and analyzed.
Tags : 
vdi, desktop, technology, workshop, nutanix
    
Nutanix, Inc.
Live Event Published By: Nutanix, Inc.     Published Date: Oct 12, 2012
Join us for this hands-on, technical VDI Design Workshop where everything from choosing the right broker to zero clients and multi-site design will be discussed and analyzed.
Tags : 
vdi, desktop, technology, workshop, nutanix
    
Nutanix, Inc.
Webinar Published By: OpTier     Published Date: Sep 28, 2012
In today's economy, businesses need to be always-on. In this webcast featuring guest speaker IDC Research Vice President, Mary Johnson Turner, we'll uncover how 2012's biggest trends are impacting Application Performance Management (APM).
Tags : 
cloud computing, analytics, mobility, application performance management, apm
    
OpTier
White Paper Published By: OpTier     Published Date: Sep 28, 2012
Ovum takes a representative group, across new to established leading vendors and provides a SWOT analysis of their solutions, and conducted a comprehensive features assessment with the results summarized in the Ovum APM Rainbow Map.
Tags : 
application performance management, apm, ovum, end-user experience monitoring, euem
    
OpTier
White Paper Published By: F5 Networks Inc     Published Date: Sep 05, 2012
This paper takes a close look at the causes of bottlenecks throughout the delivery chain, and explores an integrated approach that eliminates inefficiencies to boost performance and security.
Tags : 
delivery optimization, application, technology, integrated approach, performance
    
F5 Networks Inc
White Paper Published By: FICO     Published Date: Aug 27, 2012
Learn how successful retail organizations such as Coca Cola and Dell are using business rules management for marketing and merchandising operations programs to achieve customer centricity.
Tags : 
customer centric marketing, business rulse management, fico, customer insights, customer actions
    
FICO
White Paper Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal
    
ForeScout
Webinar Published By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : 
ibm, technology, predictive operational analytics, spss, analytical applications
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.