data analysis

Results 1 - 25 of 290Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 18, 2017
In the domain of data science, solving problems and answering questions through data analysis is standard practice. Data scientists experiment continuously by constructing models to predict outcomes or discover underlying patterns, with the goal of gaining new insights. But data scientists can only go so far without support.
Tags : 
ibm, analytics, aps data, open data science, data science, data engineers, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Analytics relies on BI, Big Data, and data discovery to provide reporting, trend what-if analysis. Analytics is transforming data into insight.
Tags : 
ibm, analytics, business intelligence, data, data management
    
IBM
Published By: Adobe     Published Date: Mar 03, 2017
It’s time to pull your data out of silos so you can harness all your insights and provide the next best offer. Learn how to use new marketing technologies to create customized offers that steer customers to the right financial services and products for their needs. It’s all in our new white paper, More Precious than Gold. Read our paper to learn how to: • Define your customer engagement objectives • Create valuable and intriguing offers to engage customers • Effectively deliver compelling offers across multiple touch points • Optimize your next best offer through real-time testing
Tags : 
data, marketing technology, customer engagement, data analysis
    
Adobe
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company
Published By: Fitbit     Published Date: Mar 16, 2017
In a three-year retrospective study that analyzed health care claims and wearable device data from a self-insured employer, Springbuk looked at the potential impact of Fitbit technology as part of a wellness program. The analysis shows that connected health and fitness interventions can close the gap between the everyday actions that change health and drive outcomes for employee health and employer cost. Some of the key findings include: * Employees who opted into the Fitbit program demonstrated significant cost savings when compared to the control group. * Engaged users cost less than non-engaged users. * The opportunity for cost savings is potentially the highest with less active individuals.
Tags : 
    
Fitbit
Published By: Lenovo     Published Date: Jan 19, 2017
Dive into this comprehensive eBook to get the details you need for starting virtualization. Written by Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and edited by Sachin Chheda of Nutanix™, you get all the detailed analysis and key points to consider, including: ? Architectural Principles ? Building Blocks ? Infrastructure Alternatives ? Storage Requirements ? Compute Sizing
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Jan 19, 2017
Accessing, analyzing, and actioning with big data are among the key challenges facing every enterprise. In this detailed report from Forrester, you’ll see key drivers and challenges with Big Data, AND some clear recommendations on how to proceed. Get the white paper to see Forrester's key findings.
Tags : 
lenovo, data access, big data, data analysis
    
Lenovo
Published By: IBM     Published Date: Dec 15, 2016
The IBM DataPower Operations Dashboard provides the most robust solution in the marketplace for monitoring DataPower gateways and performing trouble-shooting & analysis. Administrators can view operational data with full-text search to immediately diagnose errors and highlight impact analysis, DevOps can view and troubleshoot their own DataPower services, and business owners can generate automated reports to meet SLA and compliance requirements without assistance from centralized IT.
Tags : 
ibm, middleware, ibm datapower gateways, ibm datapower operations dashboard, enterprise applications
    
IBM
Published By: Marketo     Published Date: Feb 07, 2017
Read this complimentary copy of the Gartner Magic Quadrant for Digital Marketing Hubs, and find out why Marketo was named a leader based on completeness of vision and the ability to execute. As a digital marketing hub, Marketo allows marketers to think beyond email campaigns and address customers personally and consistently as individuals through a variety of contexts and formats. Digital marketing hubs, like Marketo, unify disparate marketing data and processes to drive acquisition, engagement, conversion and transaction across complex customer journeys. The full report includes: Market evaluation and analysis of 22 vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying digital marketing hubs Download the report to learn about these topics and more.
Tags : 
digital marketing hub, email campaigns, customers, disparate marketing data, vendor selection, gartner
    
Marketo
Published By: SAP     Published Date: Feb 03, 2017
The SAP HANA platform provides a powerful unified foundation for storing, processing, and analyzing structured and unstructured data. It funs on a single, in-memory database, eliminating data redundancy and speeding up the time for information research and analysis.
Tags : 
    
SAP
Published By: HP Enterprise Business     Published Date: Mar 02, 2017
Powered by data from 451 Research, the Right Mix web application benchmarks your current private vs public cloud mix, business drivers, and workload deployment venues against industry peers to create a comparative analysis. See how your mix stacks up, then download the 451 Research report for robust insights into the state of the hybrid IT market.
Tags : 
    
HP Enterprise Business
Published By: Pentaho     Published Date: Nov 04, 2015
Although the phrase “next-generation platforms and analytics” can evoke images of machine learning, big data, Hadoop, and the Internet of things, most organizations are somewhere in between the technology vision and today’s reality of BI and dashboards. Next-generation platforms and analytics often mean simply pushing past reports and dashboards to more advanced forms of analytics, such as predictive analytics. Next-generation analytics might move your organization from visualization to big data visualization; from slicing and dicing data to predictive analytics; or to using more than just structured data for analysis.
Tags : 
pentaho, analytics, platforms, hadoop, big data, predictive analytics, networking, it management
    
Pentaho
Published By: Cisco     Published Date: Jun 21, 2016
The demands on IT today are staggering. Most organizations depend on their data to drive everything from product development and sales to communications, operations, and innovation. As a result, IT departments are charged with finding a way to bring new applications online quickly, accommodate massive data growth and complex data analysis, and make data available 24 hours a day, around the world, on any device. The traditional way to deliver data services is with separate infrastructure silos for various applications, processes, and locations, resulting in continually escalating costs for infrastructure and management. These infrastructure silos make it difficult to respond quickly to business opportunities and threats, cause productivity-hindering delays when you need to scale, and drive up operational costs.
Tags : 
    
Cisco
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Dell EMC     Published Date: Nov 09, 2015
Download this whitepaper and learn how the Dell Genomic Data Analysis Platform can accelerate discovery and insights through optimized infrastructure and support.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper for: • An overview of how manufacturing can benefit from the big data technology stack • A high-level view of common big data pain points for manufacturers • A detailed analysis of big data technology for manufacturers • A view as to how manufacturers are going about big data adoption • A proven case study with: Omneo
Tags : 
    
Dell EMC
Published By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : 
dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
    
Dell
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : 
collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue
    
Collaborative Consulting
Published By: SAS     Published Date: Jul 14, 2015
With sophisticated analytics, government leaders can pinpoint the underlying value in all their data. They can bring it together in a unified fashion and see connections across agencies to better serve citizens.
Tags : 
anayltics, data analysis, management, knowledge pooling, data infrastructure
    
SAS
Published By: SAS     Published Date: Oct 22, 2015
The Internet of Things (IoT) presents an opportunity to collect real-time information about every physical operation of a business. From the temperature of equipment to the performance of a fleet of wind turbines, IoT sensors can deliver this information in real time. There is tremendous opportunity for those businesses that can convert raw IoT data into business insights, and the key to doing so lies within effective data analytics. To research the current state of IoT analytics, Blue Hill Research conducted deep qualitative interviews with three organizations that invested significant time and resources into their own IoT analytics initiatives. By distilling key themes and lessons learned from peer organizations, Blue Hill Research offers our analysis so that business decision makers can ultimately make informed investment decisions about the future of their IoT analytics projects.
Tags : 
    
SAS
Published By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : 
data visualization, sas, big data, visual analytics, data exploration, analysis, networking, knowledge management
    
SAS
Published By: Bloomberg     Published Date: Jun 11, 2012
Bloomberg Government (BGOV) is a unique online service that helps business and government leaders understand the business impact of government actions through a combination of in-depth analysis, best-in-class data, analytical tools, and award winning journalism, enabling better decisions. bgov.com
Tags : 
bloomberg government insider, bgov, demo, free trial, policy analysis, data breakdowns, editorial expertise, news aggregator
    
Bloomberg
Published By: Adobe     Published Date: Nov 07, 2013
Aberdeen's Insights provide the analyst's perspective on the research as drawn from an aggregated view of research surveys, interviews, and data analysis.
Tags : 
adobe, aberdeen group, analyst insight, technology tools, buying behavior, customer experience management, cem, buyer interactions
    
Adobe
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.