data

Results 101 - 125 of 11629Sort Results By: Published Date | Title | Company Name
Published By: Birst     Published Date: Jul 16, 2013
This whitepaper first looks at the fundamental requirements that a BI solution should deliver to your company. Next, this whitepaper covers the 11 Key Questions that you should be asking of a future BI technology partner. When the BI provider can answer Yes to all of these questions, you have BI that is capable of fulfilling your analytical and reporting needs .
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
Published By: EVault     Published Date: Mar 21, 2014
This simple, practical white paper will prove invaluable whether you’re starting fresh or looking to upgrade your current data protection system.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, data center
    
EVault
Published By: StreamSets     Published Date: Sep 24, 2018
Treat data movement as a continuous, ever-changing operation and actively manage its performance. Before big data and fast data, the challenge of data movement was simple: move fields from fairly static databases to an appropriate home in a data warehouse, or move data between databases and apps in a standardized fashion. The process resembled a factory assembly line.
Tags : 
practices, modern, data, performance
    
StreamSets
Published By: EVault     Published Date: Mar 21, 2014
Er zijn heel veel manieren om uw data te back-uppen – dan is het goed om te weten dat 12 Best Practices ze allemaal beslaan. Als u dit compacte whitepaper leest, kunt u in een paar minuten: •Bepalen of uw back-up en recovery systeem voldoet •Specifieke stappen bepalen om verbeteringen aan te brengen •Efficiëntie, betrouwbaarheid en kosten-effectiviteit verhogen Vul uw gegevens in en download
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, data center
    
EVault
Published By: CrowdTwist     Published Date: Nov 28, 2017
In today’s competitive retail environment, it’s not enough to simply meet customer expectations. Brands must exceed them with exceptional customer experiences that make customers feel heard, valued, and devoted to the brand. Brands across industries are embracing engagement-based loyalty programs because they deliver emotionally resonant experiences that go far beyond discounts. Omnichannel loyalty programs deliver rich, nuanced customer data about customers’ profiles, behaviors and needs, so that brands can deliver them more relevant experiences.
Tags : 
    
CrowdTwist
Published By: InsightSquared     Published Date: May 04, 2016
If you want to improve your sales team's results, you need to start by asking the right questions. Download this new best-practices eBook to learn about the 12 key questions for data-driven Sales Managers. This informative guide will help you: - Determine Key Metrics For Sales Management - Improve Sales Team Productivity - Closed-Won More Deals Download a free copy of "12 Must-Ask Questions for Data-Driven Sales Managers" today.
Tags : 
salesforce reporting, salesforce analytics, sales analytics, sales reporting, sales pipeline, sales forecasting, pipeline management, sales performance, sales measurement, sales bi, business intelligence, saas sales, saas metrics, sales efficiency, sales management software, sales reports
    
InsightSquared
Published By: CDW     Published Date: Dec 23, 2014
Learn the 13 best practices for server migration with Windows servers and see the 6 benefits that can help drive your business and increase your ROI.
Tags : 
cdw, data, windows, server, infrastructure, technology, operations, compatibility, integration, security, speed, migration
    
CDW
Published By: LogMyCalls     Published Date: Oct 20, 2014
We analyzed millions of calls in Q1, and there's gold to be mined out of every customer conversation, data that will improve marketing.
Tags : 
call tracking, conversation analytics, marketing analytics, business intelligence, big data, call intelligence, marketing conversion rate, prove roi
    
LogMyCalls
Published By: Urban Airship     Published Date: Oct 18, 2017
Push notifications for mobile and web that boost customer engagement & retention. Our data study of 63 million new app users shows that when brands send high value push notifications more frequently (sometimes more than one a day!) users are more likely to engage and keep their app. So what kinds of push notifications should you be sending? Download this eBook for 50+ examples you can use to increase the frequency of your notifications (web or app) — and reap the bottom line benefits.
Tags : 
    
Urban Airship
Published By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: Cisco     Published Date: Jun 02, 2015
Prepare your access network for new innovations with Cisco Catalyst Multigigabit Technology.
Tags : 
gigabit, networking, wireless solutions, data, cisco
    
Cisco
Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Published By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: BrightCove     Published Date: Nov 18, 2008
With the explosive growth of online video, traditional SEO has taken on a new dimension: video search and discovery. De-mystify the world of video search with a practical framework for video SEO and increase the value of your video content.
Tags : 
brightcove, video seo, contextual publishing, inbound links, video feeds & sitemaps, metadata, site architecture, emerging techniques, search engine optimization
    
BrightCove
Published By: EMC Corporation     Published Date: Jun 14, 2011
Qualitative and quantitative research among AP professionals to gain insights into trends in automated data capture in invoice processing.
Tags : 
emc, accounts payable, automation, paper process, transaction costs, error rates, invoice, centralized, outsourcing, cloud computing, capital budget, costs
    
EMC Corporation
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
Ponemon Institute presents the findings of The Insecurity of Privileged Users - outlines the current threats to an organization's sensitive and confidential data created by a lack of control and oversight of privileged users in the workplace.
Tags : 
    
Quinstreet - Infosec
Published By: Cibecs     Published Date: May 30, 2012
The Cibecs and IDG Connect annual Data Loss Survey uncovers the latest trends and statistics around business data protection
Tags : 
    
Cibecs
Published By: Concur     Published Date: Apr 17, 2013
In this survey report analysts examine electronic invoicing, imaging and data extraction, and automated workflow solutions at US-based enterprises. The analysis is based on over 300 survey results and more than nine years of research findings.
Tags : 
ap automation, accounts payable, invoice management, invoice automation, invoicing, ap report, ap study
    
Concur
Published By: CPC Strategy     Published Date: May 21, 2012
CPC Strategy looked at 4,274,820 clicks, 82,845 orders, $1,158,604.41 in spend $7,867,575.91 in revenue to find the best converting shopping site for online retailers. Fill out the form below to download the free report.
Tags : 
comparison shopping, shopping site, marketing channel, data feed, product feed, shopping feed, cse, online marketing, ecommerce, retail, cpc, ppc, google shopping, google product search, pricegrabber, nextag, amazon, shopzilla, bizrate, product
    
CPC Strategy
Published By: Kenshoo     Published Date: Oct 30, 2012
This white paper outlines 5 key insights from year-over-year data with some perspective on the 2011 UK Christmas season. Read on to learn more about key metrics in the season including clicks, advertising, search advertising and more.
Tags : 
kenshoo, 2012 uk christmas, online retail, e-commerce, shopping, search marketing, advertising, online advertising
    
Kenshoo
Published By: Kenshoo     Published Date: Oct 30, 2012
This white paper outlines 7 key insights from year-over-year data on the 2011 US holiday season. Read on to learn more about key metrics in the holiday season including clicks, advertising, search advertising and more.
Tags : 
kenshoo, search advertising, clicks, impressions, search advertising, marketing metrics
    
Kenshoo
Published By: SAP     Published Date: May 18, 2014
This paper explores the results of a survey, fielded in April 2013, of 304 data managers and professionals, conducted by Unisphere Research, a division of Information Today Inc. It revealed a range of practical approaches that organizations of all types and sizes are adopting to manage and capitalize on the big data flowing through their enterprises.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : 
symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security, knowledge management, data management, business technology, data center
    
Symantec
Published By: RES Software     Published Date: Mar 26, 2013
With a long list of strategic projects and requests from users to enhance their experience, healthcare IT professionals will need to focus on key trends that will lead to more efficient IT and more satisfied users.
Tags : 
ehr, healthcare records, patient data, meaningful use, healthcare, trends
    
RES Software
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, business technology, data center
    
Blue Coat Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.