bi software

Results 251 - 275 of 862Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 02, 2018
Cloud has evolved from a technological innovation to an integral part of business. Companies in every industry are investing in Digital Transformation initiatives to evolve and grow; often, cloudbased platforms are foundational elements of these transformations, as businesses increasingly seek the flexibility and agility to roll out new software services in days or weeks, versus months or years. As Digital Transformation initiatives unfold, one key challenge is to modernize the data center to facilitate rapid delivery of new applications and services—while still ensuring that existing missioncritical applications remain high performing, available, and secure. Another challenge relates to new requirements for accelerating the analysis of organizational data to near real time, much faster than previously possible with earlier incarnations of Business Intelligence (BI). Agile businesses are demanding faster access to the information contained within operational and business data stores to
Tags : 
    
IBM
Published By: TIBCO Software     Published Date: Jul 22, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: Data processing and aggregation Data visualization Statistical/mathematical/machine learning modeling Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in today’s software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises can’t risk security slowing this down.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
Cloud has evolved from a technological innovation to an integral part of business. Companies in every industry are investing in Digital Transformation initiatives to evolve and grow; often, cloudbased platforms are foundational elements of these transformations, as businesses increasingly seek the flexibility and agility to roll out new software services in days or weeks, versus months or years.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
The cloud is ubiquitous. Whether we think about it consciously or not, almost all of us are using cloud services. That could be a music service such as Spotify, storage such as Dropbox, communications via Gmail, or a software-as-a-service application such as Salesforce. Cloud services touch all of our lives.
Tags : 
    
Group M_IBM Q3'19
Published By: Domino Data Lab     Published Date: May 23, 2019
This paper introduces the practice of Model Management, an organizational capability to develop and deliver models that create a competitive advantage. Today, the best-run companies run their business on models, and those that don’t face existential threat. The paper explains why companies that fail to run on models are falling for the Model Myth—the assumption that models can be managed like software or data. Models are different and need a new organizational capability: Model Management. What’s inside: Defining a model Why models matter for businesses Why companies fall for the Model Myth A framework for Model Management Practical steps to get started The paper is intended for anyone in a data science organization, or anyone who hopes to use data science as a key source of competitive advantage for their business.
Tags : 
    
Domino Data Lab
Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya
Published By: Oracle Global Marketing     Published Date: Nov 16, 2011
This whitepaper takes a look into opportunities for organizations to provide a superior experience focusing on integrating a CRM eCommerce solution.
Tags : 
ecommerce, business research, enterprise technology, it solution, retail applications, oracle, oracle retail applications, atg commerce
    
Oracle Global Marketing
Published By: Oracle Global Marketing     Published Date: Nov 16, 2011
Learn how to meet expectations on the evolving consumer journey through the cross-channel commerce landscape of today, driven by technical trends.
Tags : 
ecommerce, business research, enterprise technology, it solution, retail applications, oracle, oracle retail applications, atg commerce
    
Oracle Global Marketing
Published By: Tricentis     Published Date: Mar 13, 2018
In a case of “if you can’t measure it, you can’t manage it,” some software project failures occur because of a lack of traceability — that is, an incomplete record of documentation around software quality assurance efforts. The lack of traceability has a significant impact on QA testing effectiveness and meeting strategic goals. However, with optimal traceability, testing becomes more efficient and enables collaboration throughout the software development lifecycle, as well as between product owners and organization leaders.
Tags : 
    
Tricentis
Published By: IBM APAC     Published Date: Mar 19, 2018
IBM’s Spectrum Protect offering boasts more than 20 years of achievement in the protection and recovery of key IT systems. So, it would be easy to suppose that IBM’s new Spectrum Protect Plus and Spectrum Copy Data Management software offerings simply represent “Spectrum Protect with extra features.” That assumption would be incorrect. They are standalone, reimagined approaches aiming to solve a daunting IT challenge—virtualization protection/recovery—and aspiring to attain a coveted IT outcome—effective data management and enablement (DM&E), referred to by many as “copy data management” (CDM).
Tags : 
data protection, data availability, software defined storage
    
IBM APAC
Published By: Qualys     Published Date: Jun 02, 2015
This guide describes the need for continuous monitoring and offers a blueprint for creating a continuous security practice. As a result, continuous monitoring will give your organization the most comprehensive view of its global perimeter, and empower you to proactively identify and address potential threats enabled by vulnerabilities in software or weak system configurations.
Tags : 
continuous monitoring, continuous security, potential threat identification, system configurations
    
Qualys
Published By: VMware Dell     Published Date: Jan 31, 2008
Aternity, Inc. is the leader in Frontline Performance Intelligence for Global 1000 enterprises. Two of the biggest challenges Aternity faces as a software developer are: 1) testing its software in different IT environments; and 2) deploying its software at customer sites.  Fortunately, VMware software was able to address both these challenges.
Tags : 
vmware, software testing, virtual, virtualization, virtualize, virtual server, server, servers
    
VMware Dell
Published By: BMC ESM     Published Date: Nov 09, 2009
Through savings generated by improvements in operational efficiency you can continue to fund the IT improvements your business needs. Read a short overview of how BMC Solutions drive operational efficiency.
Tags : 
bmc esm, operational efficiency, productivity, roi, service management, bsm
    
BMC ESM
Published By: SAS     Published Date: May 24, 2018
Implementing omnichannel marketing is often difficult, especially when using digital channels. Most products designed for digital channels lack the ability to integrate with traditional channels that have on-site processes and data. SAS Customer Intelligence 360 enables businesses to use both cloud and on-site channels and data. This integration is possible because of SAS software’s hybrid cloud architecture.
Tags : 
    
SAS
Published By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : 
endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless
    
Promisec
Published By: McAfee     Published Date: May 22, 2014
Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet
Tags : 
vpn, red privada virtual, firewall de próxima generación, mpls, bgp, vpn de alta disponibilidad, conmutación de capa multiprotocolo, seguridad
    
McAfee
Published By: McAfee     Published Date: Aug 21, 2014
Uma rede privada virtual (VPN, Virtual Private Network) proporciona o melhor retorno do investimento em proteção de comunicações. Porém, a falta de confiabilidade nos links da VPN é um fator de risco para comunicações críticas dentro das organizações. As redes constantemente disponíveis dependem de diversos provedores de serviços de Internet para garantir conectividade permanente e maior largura de banda. A aVPN (Augmented VPN) agrega todos os links dos provedores de serviços de Internet para disponibilizar um único túnel de alta capacidade. A aVPN é um modo simples e econômico de criar conexões rápidas, seguras e de alta capacidade entre sites, bem como garantir uma conectividade sem interrupções. Ela foi desenvolvida pensando na facilidade de uso e sua implementação não exige equipamentos/softwares especiais ou contratos de troca de tráfego com provedores de serviços de Internet.
Tags : 
vpn, rede privada virtual, firewall de próxima geração, mpls, bgp, vpn de alta disponibilidade, segurança, gerenciamento de ti
    
McAfee
Published By: ClickSoftware     Published Date: Sep 12, 2014
An e-Book providing 12 on-the-clock reasons why we think field service management is the perfect place for a mobile timesheet app.
Tags : 
mobile timesheets, mobile workforce management, clicksoftware, business software, sales software, business technology
    
ClickSoftware
Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
    
Frontrange
Published By: Frontrange     Published Date: Mar 13, 2013
Recent new technology introductions are fundamentally changing the way we utilize and manage IT resources. This whitepaper shows how these new processes and automation solutions deliver the agility and extensibility to maintain performance and relia
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
    
Frontrange
Published By: Frontrange     Published Date: Mar 13, 2013
Many IT organizations are excited about the prospects of incorporating Cloud-based technologies into their present/future vision. Download this whitepaper and learn how you can leverage Cloud services for increased resiliency and efficiency.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
    
Frontrange
Published By: Frontrange     Published Date: Mar 13, 2013
Reducing IT costs and improving service quality are primary concerns when looking to improve your IT efficiencies. This paper presents the Return on Investment implications for organizations considering an IT Service and Client Management solution.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
    
Frontrange
Published By: Frontrange     Published Date: Mar 13, 2013
Managing IT services has rarely been as challenging as it is today. The solution is to adopting a standards-based strategy that automates IT service management. This white paper examines what’s holding IT back and offers a potential way forward.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
    
Frontrange
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.