information age

Results 276 - 300 of 1184Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Sep 26, 2019
It’s no secret that data-driven marketing (DDM) is top of mind for brand and agency executives. But what is surprising—shocking, in fact—is how vital first- and third-party information is for creative and execution strategies today. Case in point: 70% of senior marketing executives from brands, agencies and related industry segments say data-driven marketing is a core element of a majority of their campaigns, according to a new Oracle-Forbes Insights survey. This full immersion in data and analytics—more than what many industry insiders may have realized—shows how quickly brands and agencies have recognized the potential benefits and rushed to replace outdated “gutfeel” decision making with quantifiable research. This was another recurring theme in the Oracle-Forbes Insights study, which found that marketing executives rely on advanced analytics to increase sales, attract new customers and expand brand awareness. In addition, 71% of respondents feel they effectively use it to identify
Tags : 
    
Oracle
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This paper introduces a brief explanation of digital continuity and the opportunities and threats that it faces. The movement of product information to the digital domain in the 21st century has meant that we do not have physical items, like pieces of paper, which we can authenticate as being reliable information for decision making. Digital continuity is meant to remedy shortcomings of the digital environment by ensuring that information is unique, authoritative, current, and consistent, or more simply, has the characteristic of singularity. This paper includes: • Digital continuity within the Product Lifecycle • Digital continuity within manufacturing • Threats to digital continuity If we implement digital continuity correctly, we have all the advantages of the singularity of paper documents, but with the instantaneous and simultaneous ability to access the latest, updated information. Offered Free by: Dassault Systemes
Tags : 
    
Dassault Systèmes
Published By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : 
mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information
    
CA Technologies
Published By: Schneider Electric     Published Date: May 04, 2016
This paper discusses how an automated system helps pipeline operators comply with new federal regulations by safely reducing demands placed on controllers and the fatigue often associated with their tasks.
Tags : 
pipeline integrity, oil and gas, pipelines, control room, control room management, leak detection, schneider electric, telvent
    
Schneider Electric
Published By: Avaya     Published Date: Jan 15, 2014
Be guided on what the best practices are, offering strategies, actionable tactics, and examples of enterprises on the cutting edge so your organization won't have an overabundance of options when working with partners and customers.
Tags : 
avaya, collaboration, effective enterprise, effective collaboration, new culture, broadcasting center, organizational roles, customer experience
    
Avaya
Published By: CA WA     Published Date: May 12, 2008
Emerging information technologies like composite and multi-tier applications, service oriented architectures (SOA), virtualization, grid and cluster computing, and Web Service-based application delivery create an extraordinary opportunity for IT managers. With these dynamic technologies, they can provide business owners with IT services that are extremely flexible and agile, driving a more dynamic and competitive business.
Tags : 
ca wa, workload automation, roi
    
CA WA
Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: Citrix Systems     Published Date: Sep 17, 2015
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Tags : 
information security, mobility, risk management, consumerization
    
Citrix Systems
Published By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : 
governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices
    
Wisegate
Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing
    
Forrester
Published By: hybris software     Published Date: Aug 01, 2012
It's true that deploying B2B e-commerce platform involves many unique requirements not commonly found in B2C operations, such as incorporating a complex product port-folio, multiple distribution channels, and integrating with third party systems And yet, it's possible to complete an initial out-of-the-box B2B implementation within three months, if all the right critical path steps are followed. Additional features and functionality can be added after the initial launch, provided that the chosen out-of-the-box platform is designed to be used over the long run.
Tags : 
information technology, finance, analytics, maerchandising, product management, marketing, mapping, requirements gathering
    
hybris software
Published By: Nutanix, Inc.     Published Date: May 07, 2013
This document makes recommendations for the design, optimization and scaling of VMware Horizon Workspace and Horizon View deployments on Nutanix. It shows the scalability of the Nutanix Complete Cluster and provides detailed performance and configuration information on the scale-out capabilities of the cluster when leveraged for Horizon deployments. Extensive testing has been performed in collaboration with VMware to simulate real real-world workload and conditions of operating a Horizon Workspace environment. Sizing and recommendations have been made after multiple testing iterations and joint validation. The solution and testing provided in this document was completed with VMware Horizon Workspace deployed on VMware vSphere on the Nutanix Complete Cluster.
Tags : 
vmware, workspace, horizon, nutanix, deployment, cluster, performance, design
    
Nutanix, Inc.
Published By: RSA Security     Published Date: Oct 24, 2013
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
rsa, emc, secuirty, warning, threat, analytics
    
RSA Security
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: Visier     Published Date: Jan 30, 2015
Until recently, ConAgra Foods struggled to collect accurate, analyzable data about its workforce. Information was spread across the organization in siloed systems within various departments and was often difficult to reconcile. In a few short years, however, ConAgra Foods has been able to leverage technology solutions to gain real-time insights into its employee data and can now analyze its workforce across a wide range of subject areas. Download this case study to see how ConAgra Foods transformed the role of HR through analytics, and to get guidance on how your organization can adopt a similar approach.
Tags : 
visier, conagra, workforce, hr analytics, real-time insights, human resources
    
Visier
Published By: Nexmo     Published Date: Nov 26, 2018
Companies have always been focused on the customer experience, but with the ever-changing landscape of how information is consumed, they have to react faster and provide more impactful interactions. Today's consumers expect businesses to communicate with them on the channels they prefer. This means messaging customers on the channels that provide straightforward and/or media-rich features. Savvy companies know that SMS is the messaging leader, but that MMS and other OTT channels, such as WhatsApp, Facebook Messenger, and Viber, provide a more engaging experience. They think about their overall messaging goals and as a big-picture concept. Join Sheri Atienza, Product Marketing Manager at Nexmo, in this webinar examining how messaging solutions can be the power behind your 2019 messaging strategy. You’ll learn how to customize your messages to both the audience and the medium, and how easy this can be with Nexmo.
Tags : 
    
Nexmo
Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogic’s customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable
    
MarkLogic
Published By: MarkLogic     Published Date: Mar 17, 2015
You’ve probably heard about NoSQL, and you may wonder what it is. NoSQL represents a fundamental change in the way people think about storing and accessing data, especially now that most of the information generated is unstructured or semi-structured data — something for which existing database systems such as Oracle, MySQL, SQLServer, and Postgres aren’t well suited. NoSQL means a release from the constraints imposed on database management systems by the relational database model. This free eBook, Enterprise NoSQL for Dummies, MarkLogic Special Edition, provides an overview of NoSQL. You’ll start to understand what it is, what it isn’t, when you should consider using a NoSQL database instead of a relational database management system and when you may want to use both. In addition, this book introduces enterprise NoSQL and shows how it differs from other NoSQL systems, as well as explains when NoSQL may not be the right solution for your data storage problem. You’ll also learn the NoSQ
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable
    
MarkLogic
Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
    
Mimecast
Published By: Intralinks     Published Date: Aug 28, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes.
Tags : 
    
Intralinks
Published By: MuleSoft     Published Date: Apr 13, 2016
This whitepaper proposes a new approach to integration - API-led connectivity - that extends traditional service oriented approaches to reflect today’s connectivity needs. We’ll outline the core of this approach and implementation challenges and discuss how IT leaders can realize this vision in their own organizations.
Tags : 
information technology, application integration, business management, best practices, business intelligence
    
MuleSoft
Published By: MuleSoft     Published Date: Apr 13, 2016
The business of IT has changed dramatically. An always-on, always-connected world means that competition is fiercer, customers are more demanding, and businesses need to innovate faster than ever. Companies can try to harness digital transformation by trying to do things the old way, but they will fall behind; the traditional IT operating model is fracturing under the digital demands of their customers, partners and employees. This book will showcase: -how digital transformation is affecting your business -a roadmap to help you innovate faster, lower operational costs, and increase your IT capacity -real-life case studies of companies who achieved great business outcomes through API-led connectivity
Tags : 
information technology, business management, best practices, business intelligence
    
MuleSoft
Published By: IBM Watson Health     Published Date: Jun 14, 2017
Electronic health records (EHRs) are necessary, but were not designed to anchor population health management (PHM). This is partly because they lack semantic interoperability, which is the ability of disparate information systems to share data and enable communications among users in a meaningful way. This paper explains how an approach that includes a care collaboration platform can manage population health by aggregating and normalizing the necessary data.
Tags : 
ehr, ibm, health management, population health management, data aggregation, information systems
    
IBM Watson Health
Published By: Datawatch     Published Date: Feb 03, 2016
Some companies estimate that up to 80 percent of their analysts’ time is spent on data preparation. Thorough, automated data preparation, however, can quickly transform raw information into reliable, consistent data sets ready for analysis. This report from Gartner details why information management and business analytics leaders must introduce data preparation into their big data initiatives in order to improve both the understanding of the data, and the productivity of analysts. Read the report now to learn more.
Tags : 
datawatch, data preparation, data analytics, data analysis, analyst productivity, information management, business analytics, big data
    
Datawatch
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library