data management

Results 1 - 25 of 1751Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Mar 09, 2017
For many financial institutions, traffic from bots (aggregators, scrapers, crawlers) can account for up to 40-60% of their overall website traffic — from good bots engaged in essential business tasks to bad bots performing harmful activities. Banks, traders, asset managers, and insurers might know how much of their traffic is from bots, but what they may not know is the impact those bots may be having on their business. Read the report to learn more about: • Managing Financial Data Aggregators • How Bots Affect the Digital Experience • What a good bot looks like?
Tags : 
financial services, financial data, bots, bot management, website traffic, the digital experience
    
Akamai Technologies
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Complexity, globalization and digitalization are just some of the elements at play in the risk landscape—and data is becoming a core part of understanding and navigating risk. How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study: 1. The Enterprise Risk & Strategy Disconnect—Finance leaders are using data and managing risk programs, but over 65% of finance leaders say there’s missing link between risk and strategy. 2. The Risks of the Use and Misuse of Data—Up to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data. 3. Risky Relationships—Only 20% of finance leaders say the data they use to manage risk is fully integrated and shared. Download the study to learn how finance leaders are approaching data and enterprise risk management
Tags : 
    
Dun & Bradstreet
Published By: NetApp     Published Date: Dec 05, 2016
An infographic showcasing the 5 architectural principles of the next generation data center including scale-out, guaranteed performance, automated management, data assurance and global efficiencies.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Dec 05, 2016
See how IT professionals in your industry are leveraging automation in the next generation data center. Download The Storage Automation Report to find out: - 300 IT professionals' drivers behind storage automation and the benefits they've realized - How the rise of the DevOps approach has fueled the need for automation at the storage layer - Preferences around storage management plug-ins and software development kits
Tags : 
    
NetApp
Published By: HPE APAC     Published Date: Feb 24, 2017
What is converged storage? Read on to find out more.
Tags : 
converged storage, data, enterprise data protection, threat and vulnerability management, data protection
    
HPE APAC
Published By: MobileIron     Published Date: Feb 08, 2017
Enterprise organizations around the world are rapidly shifting their corporate apps and data to the cloud to drive IT efficiency and expand employee access to business processes. This applies not only to productivity suites like Microsoft Office 365, but also to enterprise mobility management (EMM) solutions like MobileIron.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Mar 21, 2017
As organizations increasingly use Office 365 and other cloud services on mobile devices, they need a secure mobile and cloud architecture to protect all of these apps and data on the device and in transit. It requires a comprehensive, unified approach to enterprise mobility management (EMM) that includes defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated Windows 10 desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron
Published By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Cloud- based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on- premises data with new third- party cloud- based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, as discussed in “The truth about information governance and the cloud,” most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 30, 2017
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent analytics, cognitive computing, analytics, engagement
    
IBM
Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper demonstrates, through a series of examples, how data center infrastructure management (DCIM) software tools can simplify operational processes, cut costs, and speed up information delivery.
Tags : 
dcim, costs, operational processes, data centers
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 17, 2017
In this white paper, we will look into: • The changing face of the colocation buyer • Industry structure, including mergers and acquisitions • The Internet of Things and big data • Edge computing • Cloud computing and Internet Giants • The impact of data center infrastructure management (DCIM) • Data center design architectures
Tags : 
colocation, iot, internet of things, big data, edge computing, cloud computing, dcim, data center infrastructure management
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
power, cooling, data center, data center management, server rooms
    
Schneider Electric
Published By: VMware AirWatch®     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware AirWatch®
Published By: ASG Software Solutions     Published Date: Jun 09, 2009
Improved business productivity often requires more efficient IT and more efficient IT cannot be achieved without a better understanding of the way business services are run and delivered. Configuration Management Databases (CMDBs) have emerged as a central component for Information Technology Infrastructure Library (ITIL) and business service management (BSM).
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata
    
ASG Software Solutions
Published By: VMware AirWatch®     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware AirWatch®
Published By: VMware AirWatch®     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware AirWatch®
Published By: VMware AirWatch®     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware AirWatch®
Published By: VMware AirWatch®     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware AirWatch®
Published By: Alcatel-Lucent     Published Date: Dec 02, 2009
Faster, more powerful and dense computing hardware generates significant heat and imposes considerable data center cooling requirements.
Tags : 
data center design and management, distributed computing, internetworking hardware, power and cooling
    
Alcatel-Lucent
Published By: Extensis     Published Date: Jun 08, 2010
Metadata Management is the process of ensuring that all metadata associated with a digital asset is captured, organized, stored and made available for use by and within other applications. Metadata Management begins at the moment the digital asset is created by an application or captured by digital imaging.
Tags : 
metadata, management, extensis, digital asset management'
    
Extensis
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.