patterns

Results 1 - 25 of 201Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Jul 31, 2019
As modernized data centers scale up and out, there is a strong potential for growing complexity as well. IT teams need to be vigilant in simplifying architectures and operations as the technological landscape changes. While the potential of monitoring and analytics in your data center is huge, to take advantage, you'll need an architecture that can handle shifting traffic patterns. In this expert eGuide, you'll discover three ways of simplifying architectures, and how they can help you reduce complexity, improve workforce efficiency, and ease administration.
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks
Published By: SAS     Published Date: Jun 26, 2019
To support open government initiatives and uphold the values of transparency, participation and collaboration in the US, federal agencies today make their data open, or publicly accessible. Citizens can use this open data to assess college affordability, the economy, educational issues, environmental damage, health care, taxes, agriculture, the climate and more. Governments can use APIs to pull this open data into SAS Visual Analytics as a way to identify trends and patterns and obtain all sorts of new insights. With public health surveillance, for example, governments can monitor and evaluate indicators that point to high-risk areas so they’ll know where and how to focus efforts. Such public health surveillance can serve as an early warning system for impending emergencies, document the impact of an intervention, track progress toward public health goals, and clarify health problems to inform public health policies and strategies.
Tags : 
    
SAS
Published By: Rackspace     Published Date: Feb 18, 2016
AN OVERVIEW OF THE ACCOUNT MANAGEMENT APPROACH
Tags : 
rackspace, data security, aws account, cloud, data, data center
    
Rackspace
Published By: HERE Technologies     Published Date: Apr 04, 2019
Artificial Intelligence (AI) has already begun to improve targeting, segmentation, media buying and planning in the advertising industry. AI algorithms can extract complex patterns from vast numbers of data points, and in so doing, are able to self-correct and learn patterns. The revenue potential that improved personalization, segmentation and targeting that AI provides to marketers is huge. At HERE Technologies, we are placing AI and machine learning at the center of our products and services. We see the opportunity in automated machine learning to enrich the targeting and effectiveness of mobile advertising campaigns in real time. But the outcome of implementing such technology depends on the quality of data being fed into it from the outset. AI wouldn’t be as helpful if it’s being used alongside questionable location data or audience data. HERE’s location data provides a strong thread that can be woven throughout every stage of the media buying process, offering more context and
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Coupa     Published Date: Dec 14, 2018
Financial services firms are turning to Business Spend Management (BSM) as a Strategic Solution Beset by competitors and burdened by ever-shifting regulatory requirements, financial services firms are turning to cloud-based technology to gain better control over—and visibility into—spending. In the process, they are becoming fiercer competitors. Download this ebook for insights into how you can improve your organization's financial health and how: A cloud complete-BSM solution can track and measure all purchasing activities, identifying patterns that provide opportunities for negotiating discounts, and better managing risk To increase savings across source-to-contract, procure-to-pay, travel & expense management, as well as risk and supplier management Modern technology enables the finance function to take cost-management to a deeper level—without investing in IT infrastructure
Tags : 
    
Coupa
Published By: Genesys     Published Date: Jun 06, 2017
In this ebook, learn: - Five trends will have the biggest impact on customer experience - How to use machine learning to detect patterns and trends to deliver the next great customer experiences - How to future-proof your contact center and adapt to changing customer needs
Tags : 
genesys, customer experience, contact center solutions, contact center, customer needs
    
Genesys
Published By: HERE Technologies     Published Date: Dec 06, 2018
adsquare offers brands insights into customer behaviors and footfall to underpin digital marketing campaigns. Using a detailed brief of the audience the brand wishes to reach, adsquare gathers data from a range of mobile, online and offline sources. This rich data gives a brand a stronger opportunity to create relevant campaigns for their audiences. It is critical to adsquare’s success that its data sources are reliable. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is building and sharing real-time location intelligence with adsquare which reveals patterns to show how and why customers make transactions in specific places.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: SAS     Published Date: Jan 17, 2018
For many of us, the term “smart city” conjures up images of sensors collecting data about everything from traffic patterns to energy use. It’s common for government leaders to think, “That’s not for us. We’re not there yet.” But if your organization is collecting data of any kind, you are in a position to use that data to create a smarter city for your citizens. Download this whitepaper for 10 examples of analytics being used to solve problems or simplify tasks for government organizations.
Tags : 
    
SAS
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell     Published Date: Aug 11, 2015
As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Read this report for more information.
Tags : 
    
Dell
Published By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : 
dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
    
Dell
Published By: First Data     Published Date: Apr 25, 2013
Traditional direct mail campaigns often deliver anemic response rates and direct mail campaigns sweetened with discounts don’t fare much better. Poor results combined with escalating printing and mailing costs and changing consumer expectations means that businesses must find more effective ways to get consumers’ attention.
Tags : 
direct mail, gift cards, prepaid incentive, coupon, call to action, incentive cards, direct marketing, customer experience
    
First Data
Published By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : 
data visualization, sas, big data, visual analytics, data exploration, analysis, networking, knowledge management
    
SAS
Published By: Adobe     Published Date: Nov 07, 2013
A key finding of this research is that most companies have a great opportunity to improve their business performance by taking a more integrated approach to managing their digital media mix.
Tags : 
adobe, econsultancy, media optimisation report, effective optimisation, media mix, tactical objectives, complex media landscape, consumer buying patterns
    
Adobe
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
A tool for finance leaders to unify disparate customer data with financial and strategic ROI If you’ve found yourself sweating in a smoky billiard room, wondering what role customer data should play in finance—as well as in your company’s long-term strategy—this eBook will help you hone your pool shark skills. Inside, you’ll find insights about…. • How to identify patterns in your customer portfolio, and why it matters. • Avoiding four critical data billiard blunders. • Key questions to ask while you’re segmenting your data. • How to tell if your portfolio segmentation strategy is working with the right reporting. This eBook will help you navigate the crowded billiard room of customer data and how you can use it to drive cross-functional value for your team.
Tags : 
    
Dun & Bradstreet
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: CyberSource     Published Date: Apr 25, 2019
Download this white paper to find out how you could augment your fraud management with Decision Manager machine learning insights from more than 68 billion annually processed Visa and CyberSource transactions – matched with flexible rules-based fraud strategies. • Detect fraud more accurately with robust data and insights on ever-changing fraud patterns • Protect your bottom line by reducing fraud and chargebacks • Increase acceptance rates with the only fraud solution that uses machine learning to generate and test new rules-based strategies from your historic data …and more.
Tags : 
    
CyberSource
Published By: CA Technologies     Published Date: Sep 25, 2017
Despite talented IT teams and years of head start in both architectural and development work, it is still difficult to respond to these challenges using traditional development patterns centered around monolithic software applications. It’s simply impossible to get to market quickly when applications need to be maintained, modified and scaled as a single entity by a large, heavily inter-dependent team.
Tags : 
scaling, messaging, communication, autonomously, decentralized, automated, ca technologies
    
CA Technologies
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security.
Tags : 
    
Dell PC Lifecycle
Published By: Salesforce     Published Date: Jan 06, 2016
Salesforce Research surveyed more than 2,300 global sales leaders to discover: The unifying goals, stumbling blocks, and success metrics for today’s sales teams How high-performing sales teams are evolving to stay ahead of the curve Areas where sales is doubling down to supercharge business in the next 12–18 months. This report highlights sales trends in 2015, including the central role of sales teams in an integrated customer success platform. Throughout the report, data is examined relative to sales performance to identify patterns for overall customer success.
Tags : 
    
Salesforce
Published By: Salesforce     Published Date: Jan 12, 2016
This report highlights sales trends in 2015, including the central role of sales teams in an integrated customer success platform. Throughout the report, data is examined relative to sales performance to identify patterns for overall customer success.
Tags : 
    
Salesforce
Published By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
    
Intel
Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.