data report

Results 176 - 200 of 687Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Mar 01, 2018
ERP Must-Haves for Finance: Leave behind cumbersome reporting, spreadsheets, and data that offers zero insights. IDC MarketScape has put together a guide to help you find the best finance and accounting applications. Read an excerpt of the report to learn today’s must-have ERP capabilities and why the IDC MarketScape positioned Workday in the Leaders category.
Tags : 
erp, finance, accounting, idc marketscape
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
: Many CIOs are wary of moving data out of on-premise systems and into the cloud. But the cloud is the best choice for agility, flexibility, and data security. Read this report from CIO.com to learn about the benefits your business could experience by moving to the cloud.
Tags : 
cloud, data, data security, flexibility
    
Workday
Published By: Workday     Published Date: May 09, 2018
ERP Must-Haves for Finance: Leave behind cumbersome reporting, spreadsheets, and data that offers zero insights. IDC MarketScape has put together a guide to help you find the best finance and accounting applications. Read an excerpt of the report to learn today’s must-have ERP capabilities and why the IDC MarketScape positioned Workday in the Leaders category.
Tags : 
    
Workday
Published By: Dell Software     Published Date: Oct 03, 2013
In contrast to competing APM solutions, most of which focus on technical metrics, the release of Foglight 5.9 delivers detailed information about users, user actions and application usability.
Tags : 
dell, foglight, apm, big data, best practices, application performance management, technology, user experience
    
Dell Software
Published By: NetApp     Published Date: Sep 24, 2013
"Storage system architectures are moving away from monolithic scale-up approaches and adopting scale-out storage – providing a powerful and flexible way to respond to the inevitable data growth and data management challenges in today’s environments. With extensive data growth demands, there needs to be an increase in the levels of storage and application availability, performance, and scalability. Access this technical report that provides an overview of NetApp clustered Data ONTAP 8.2 and shows how it incorporates industry-leading unified architecture, non-disruptive operations, proven storage efficiency, and seamless scalability."
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations, storage
    
NetApp
Published By: NetApp     Published Date: Sep 24, 2013
"Today, IT’s customers are more mobile and global than ever before and as such expect their applications and data to be available 24x7. Interruptions, whether planned or unplanned, can have a major impact to the bottom line of the business. ESG Lab tested the ability of clustered Data ONTAP to provide continuous application availability and evaluated performance for both SAN and NAS configurations while running an Oracle OLTP workload. Check out this report to see the results."
Tags : 
mobile, global, applications, cloud, configuration, technology, knowledge management, storage
    
NetApp
Published By: Drillinginfo     Published Date: Nov 26, 2015
In this PDF you’ll learn how Drillinginfo (DI) provides accurate, current rig data in the Permian Basin. From permitting and leasing information to rig locations and pricing trends, you’ll find products and solutions to help transform how OFS companies drive leads. Tracking prospects can be a lucrative opportunity, but rigs move on a daily basis, so you need the latest information. See how DI can drive a company’s success by gathering up-to-the-minute rig intelligence from a single, comprehensive software solution. The Permian Basin Play is seeing a surge of O&E activity, with reports indicating that almost 30% of future oil reserve growth in the U.S. will come from the formation. Does your oilfield service team have an innovative approach to your data source detailed enough to support competitive decision-making? See how to get the most accurate, timely drill-site and well event information to make better, faster decisions and drive the best leads — that can turn into opportunities.
Tags : 
ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
    
Drillinginfo
Published By: ClearStory     Published Date: Oct 07, 2014
When it comes to “big data,” Gartner boils it all down to “value.” In their 2014 Cool Vendors for Big Data report, ClearStory Data was among 4 companies profiled. According to Gartner, ClearStory is “for companies looking at big data business intelligence and analytics from a data variety perspective.”
Tags : 
big data, value, business intelligence, analytics, data variety, data management, data center
    
ClearStory
Published By: ClearStory     Published Date: Oct 07, 2014
Organizations are more data hungry than ever. Thanks to advances in machine learning and semantic processing, they can now gain new insights from that data. ClearStory Data helps business users gain new insights into their markets and the environments in which they operate.
Tags : 
data hungry, semantic processing, insight, market enviornment, data management, data center
    
ClearStory
Published By: MarkLogic     Published Date: May 15, 2017
Data is critical to the entertainment industry and not taking advantage of it can keep you from creating great experiences and delivering the right content to partners. And, more than that, it can make it hard for you to optimize operations, get insight into the content’s value and stay ahead of the many changes in how content is created, consumed and monetized. However, even with the new digital tools in production, there are many challenges to making use of this data. The effort involved can take time and resources away from film production, introduce security risks, and leave key data inaccessible to those that need it. In this paper, we review: • The current state of production data • The challenges the entertainment industry is facing in making use of data • A new “Smart Content” approach that is helping industry pioneers to reduce complexity on the set, drive reporting, and enable them to stay ahead of market changes
Tags : 
    
MarkLogic
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: SAP     Published Date: Jul 20, 2015
However, here at SAP we have identified four broad technology trends that are currently having a major impact on how retailers conduct business and engage with consumers. They are Big Data, social media, seamless retailing and disruptive technologies. Read this report for an analysis and overview of each trend area, why they are important and what the future likely holds.
Tags : 
it trends, retail, big data, social media, seamless retailing, disruptive technology, trends
    
SAP
Published By: Mimecast     Published Date: Jan 19, 2018
The importance of information security and data protection is growing by the day for organizations. This is due to an evolving threat landscape and a higher adoption of internet dependent services, which, in the process of creating new opportunities, also lead to more vulnerabilities. As a consequence, national and international regulations are also changing according to the new challenges, calling for better preparedness. The new BCI Information Security Report 2017 sponsored by Mimecast looks to benchmark how organizations handle sensitive data and how resilient organizations are when it comes to data protection.
Tags : 
bci information, security and data protection, security report, data protection
    
Mimecast
Published By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : 
post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management
    
Vectra Networks
Published By: Secureworks     Published Date: Oct 04, 2017
Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016.
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.1 By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Google Analytics 360 Suite     Published Date: Jul 28, 2017
Today’s marketing leaders need sophisticated tools to turn data into cross-channel insights that improve performance. In a new report, Gartner compares 11 digital marketing analytics solutions across five key areas: data integration, exploration, advanced models, platform integrations, and measurement. Selecting the best solution for your team requires thoughtful analysis. How will you determine the best fit? Gartner’s Magic Quadrant can help.
Tags : 
    
Google Analytics 360 Suite
Published By: Google Analytics 360 Suite     Published Date: Sep 05, 2017
Today’s meandering customer journeys take place over multiple channels and devices. Each interaction creates a stream of digital information, leaving marketers with a growing pile of data. But, with data seemingly everywhere, why are so many marketers still feeling like there’s not a drop to drink? Leaders Have a Data Strategy and Enable More Teams with Data In this research report from June 2017, Econsultancy surveyed more than 700 marketing and analytics executives at consumer brands to better understand how data factors into marketing strategy — and daily decision making. Two-thirds of leading marketers — those who outperformed their top business goal — say they currently have a documented data and analytics strategy. In this report, you’ll also learn how leaders have built data-driven cultures and why they are more likely to use: digital analytics to optimize user experience in real time audience-level data to personalize customer experience customer-level data to segment and r
Tags : 
    
Google Analytics 360 Suite
Published By: Splunk     Published Date: Nov 29, 2018
Gartner Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017 Splunk Jumps From #5 in 2016 to #2 in Top 10 Named ITOM Performance Analysis Software Vendors, Worldwide, 2017 Splunk is ranked #2 of overall ITOM Performance Analysis Software Vendors, according to Gartner’s report, Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017. This Gartner report also lists Splunk as one of several disruptors in the table “Market Share of Incumbents vs. Disruptors - ITOM Performance Analysis Software.” As a Splunk customer, are you utilizing your machine data platform to its fullest potential? Learn about newest trends in ITOM software tools across AIOps, APM, infrastructure monitoring and Network performance monitoring and diagnostics. Download this report to learn: 2017 rankings of performance analysis software vendors, overall and subsegments How digital business is driving demand for modern, agile monitoring tools via DevOps toolchains Shifts in
Tags : 
application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
    
Splunk
Published By: Beqom     Published Date: Jun 14, 2019
New Techniques That Will Drive Revenue in 2019 If you’re ready to move beyond simple calculations and realize the vast potential of data driven selling, you’re ready to explore the next generation of SPM platforms. Download the report to learn how the modern technologies like Artificial Intelligence and Machine Learning, can give your sales reps a roadmap to better performance and give sales management insights that will enable them to achieve more profitable sales.
Tags : 
    
Beqom
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.