intelligence

Results 1 - 25 of 1390Sort Results By: Published Date | Title | Company Name
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : 
ibm, security, ibm x-force, cyber security intelligence index., cyber security, intelligence, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
Predictive analytics has come of age. Organizations that want to build and sustain competitive advantage now consider this technology to be a core practice. In this white paper, author Eric Siegel, PhD, founder of Predictive Analytics World, reveals seven strategic objectives that can only be fully achieved with predictive analytics. Read this paper to learn how your organization can more effectively: Compete – Secure the most powerful and unique competitive stronghold Grow – Increase sales and retain customers competitively Enforce – Maintain business integrity by managing fraud Improve – Advance your core business capacity competitively Satisfy – Meet today's escalating consumer expectations Learn – Employ today's most advanced analytics ....and finally, render your business intelligence and analytics actionable.
Tags : 
predictive analytics, increase sales, customer retention, fraud management, consumer expectations
    
IBM
Published By: Infor     Published Date: Mar 07, 2017
Heutzutage sind die Zeitschriften voll mit Geschichten über geschäftliche Erfolge, die Business Intelligence (BI) ermöglicht hat. Die gute Nachricht ist: Sie können diesem Hype vertrauen.
Tags : 
    
Infor
Published By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 11, 2017
Download this white paper to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats. - Why security infrastructure protection alone is not enough to thwart cyber criminals, and how you can fortify your existing security strategy. - How the use of both machine led analytics with human led analysis can help you mitigate threats.
Tags : 
ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 13, 2017
As traditional network perimeters surrounding data centers dissolve, agencies face enormous difficulties fending off attacks using a patchwork of traditional security tools to protect classified or personally identifiable information (PII). Time and again, traditional security practices have proven porous and/or unsustainable. Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence -Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Learn to evaluate avenues best with democratized yet trusted analytic insights using IBM Cognos Analytics for your business decisions here.
Tags : 
ibm, analytics, business intelligence, data, converged analytics, governed analytics, data management
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
The report argues top-down and bottom-up BI are flip sides of same coin that needs an harmony. This also describes the rise of data discovery tools as a bottom-up reaction to heavy handed BI and have crushed the top-down camp's monopoly of BI, that has unleashed a bevy of data silos.
Tags : 
ibm, analytics, business intelligence, data, data discovery, data management
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Analytics relies on BI, Big Data, and data discovery to provide reporting, trend what-if analysis. Analytics is transforming data into insight.
Tags : 
ibm, analytics, business intelligence, data, data management
    
IBM
Published By: Adobe     Published Date: Mar 03, 2017
When it comes to audience engagement, the landscape has been completely rewritten. Media and entertainment companies need to embrace new technologies to achieve revenue goals. The Adobe guide, Play to Win in Audience Intelligence, shows you how. Read the guide to learn: • How to bring your data sources together into a unified view of the customer • How to move beyond basic demographic attributes to behavior attributes • How to use look-alike modeling to improve customer targeting and acquisition
Tags : 
audience intelligence, audience engagement, unified data source, behavior attributes, look-alike modeling, data management
    
Adobe
Published By: SAP     Published Date: Feb 05, 2011
Learn how best-in-class companies access information faster to improve key business performance metrics.
Tags : 
business performance, sap, real time analytics, business intelligence, analytics
    
SAP
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : 
asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 29, 2010
The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.
Tags : 
asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi
    
ASG Software Solutions
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
Adlib Software
Published By: FTI Consulting     Published Date: Mar 03, 2017
2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.
Tags : 
fti, fti consulting, crisis management, corporate risk, cyber attacks, political disruption, corporate crisis, business technology
    
FTI Consulting
Published By: Fitbit     Published Date: Mar 21, 2017
Fear not, it is possible to prove the return on investment (ROI) of your wellness program! But don’t take our word for it. Springbuk, a health intelligence platform, recently evaluated the health care claims and wearable device data for a self-insured employer (and Fitbit customer) over a three-year period. View this webinar, Rod Reasen, CEO at Springbuk, walks you through their study and reveals how: - Employees who opted into the company’s wearable program cost less than their counterparts - Total costs for engaged wearable users dropped by 46% vs. 14% for non-engaged individuals - Cost reductions were highest with less active members – encouraging news for all employee populations
Tags : 
    
Fitbit
Published By: OneSource     Published Date: Dec 08, 2010
Have you received your quota for 2011 yet? Wondering how you are going to hit it?as
Tags : 
webinar, onesource, business intelligence, prospects, lead generation
    
OneSource
Published By: BlackLine     Published Date: Jan 25, 2017
Download this whitepaper to learn more about how Continuous Accounting empowers the Office of Finance with real-time intelligence, enabling skilled accountants to spend more time on strategic research and analysis, and become proactive business leaders instead of reactive operators.
Tags : 
    
BlackLine
Published By: IBM     Published Date: Feb 01, 2017
View this webinar to learn what the experts are saying about the current state of digital analytics and hear why not upgrading is a threat to your business. James McCormack of Forrester will detail what steps you need to take now.
Tags : 
ibm, commerce, customer experience, digital intelligence, customer analytics, customer insights, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time.
Tags : 
ibm, security, big fix, advanced threats, security, security intelligence, endpoint security, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
ibm, security, identity governance and intelligence, identity governance, gdpr, governance, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don’t retain access after they leave the organization. IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : 
ibm, security, identity governance and intelligence, identity governance, entitlements, compliance, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance, enterprise applications, business technology
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.