transaction data

Results 76 - 100 of 156Sort Results By: Published Date | Title | Company Name
Published By: HiQ Labs     Published Date: Apr 18, 2017
Experts predict the number of M&A transactions will increase in 2017, but the nature of M&A is changing. The old ways of collecting data are getting to be too slow, too expensive, and too subjective. The ideal M&A transaction relies on accurate, actionable scientific insights into the target’s workforce to support the investigation, due diligence and integration aspects of M&A. hiQ Labs applies scientific rigor to publicly available data sets to forecast which employees are at risk of leaving, map the target workforce’s skills onto the buyer’s company, and identify which employees have the skills critical to the deal’s success, so M&A leaders get a faster, cheaper, and accurate solution based on science.
Tags : 
hiq labs, m&a, talent
    
HiQ Labs
Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring, memory based sensors
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions
Published By: QTS Data Centers     Published Date: Mar 31, 2015
One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
    
QTS Data Centers
Published By: Teradata     Published Date: Mar 10, 2014
How the following topics help marketers in a data driven way: The Rise of Big Data, Big Data Myth, Global Perspective, Strategic Alignment, Where to Begin, The Right Technology, and Customer Success.
Tags : 
teradata, data-driven marketing, rise of big data, big data myth, global perspective, strategic alignment, right technology, customer success, marketing research, data center
    
Teradata
Published By: HP     Published Date: Jan 20, 2015
There are many new ways Big Data analytics can significantly boost marketing and promotional efforts through real-time and historical analysis of online data, such as clickstream or purchase transactions. Unstructured data based on social media—even photos and video—offers enormous potential when analyzed with the right tools.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: Datastax     Published Date: Apr 04, 2017
For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution.
Tags : 
database, cloud, applications, endpoint, datastax
    
Datastax
Published By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps
    
Cisco
Published By: MuleSoft     Published Date: Jan 16, 2018
“Today’s shoppers expect more than a transactional relationship with retailers; they want a seamless and personalized journey that reflects the context of how they shop across devices and channels. The key to success lies in connecting in-store software with online systems so retailers can provide an uninterrupted experience wherever customers shop.” - Ross Mason, Founder of MuleSoft Driving digital transformation in retail requires connectivity across an ever-increasing number of applications, data and devices. Because of this, connectivity has emerged as a bottleneck that slows the development of new applications and the adoption of new technologies to meet customer demands. In response, leading retail and CPG companies have adopted API-led connectivity, which eliminates this connectivity bottleneck and enables a 2-5x faster IT project delivery across the value chain. Download this eBook to learn: How leading retailers like Buffalo Wild Wings, TAL Apparel and PetSmart are leverag
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
“Today’s shoppers expect more than a transactional relationship with retailers; they want a seamless and personalized journey that reflects the context of how they shop across devices and channels. The key to success lies in connecting in-store software with online systems so retailers can provide an uninterrupted experience wherever customers shop.” - Ross Mason, Founder of MuleSoft Driving digital transformation in retail requires connectivity across an ever-increasing number of applications, data and devices. Because of this, connectivity has emerged as a bottleneck that slows the development of new applications and the adoption of new technologies to meet customer demands. In response, leading retail and CPG companies have adopted API-led connectivity, which eliminates this connectivity bottleneck and enables a 2-5x faster IT project delivery across the value chain. Download this eBook to learn: How leading retailers like Buffalo Wild Wings, TAL Apparel and PetSmart are leverag
Tags : 
    
MuleSoft
Published By: AppNexus     Published Date: Apr 04, 2017
Email marketing is one of digital media’s most effective channels. Inside the inbox, marketers can capture the consumer’s undivided attention in a uniquely intimate environment, creating a perfect opportunity for meaningful brand engagement and driving new purchase transactions. However, with open rates for even the most effective brands hovering around 25%, there is huge opportunity for marketers to reach their customers with impactful formats on the open internet to successfully engage them across the marketing funnel. Download the free eBook “Beyond The Inbox: How To Transform Your Email Marketing Platform Into An Omnichannel Solution” to learn: • How to rapidly build an omni-channel solution for your clients • How AppNexus can help your platform reach your marketer’s customers most cost-effectively • How AppNexus ensures complete security for your client’s CRM data assets ?
Tags : 
appnexus, email marketing, omni-channel, crm data, branding, marketing, brand engagement, customer engagement
    
AppNexus
Published By: Vertica     Published Date: Mar 15, 2010
Revenue assurance analysts at a top-tier US-based carrier studied this every day. Primarily focused on detecting fraud, revenue sharing contract violations and incomplete revenue collections, they had the need to query and analyze call detail record (CDR) databases that grow by millions of new CDRs every day.
Tags : 
vertica, ec2, cdr, elastic, saas, dbms, sql, acid transactions, jdbc, odbc, etl, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms
    
Vertica
Published By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's retail environment. From customer data to product placement statistics, retail organizations are constantly juggling information. As the sheer amount of data continues to grow, it becomes increasingly difficult to manage. Not only does data come in many different forms—such as reports, memos and e-mails—but often it’s scattered across multiple repositories.
Tags : 
ibm, ibm balanced warehouses, ibm master data management server, ibm omnifind, ibm industry data models, dynamic warehousing, retail buyer’s guide, leveraging data, customer data, product placement statistics, data management, scalable system, customer relationships, cross-sell, up-sell opportunities, db2 warehouse, oltp-based transactional data server, information management software
    
IBM
Published By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : 
ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities, information on demand framework, ibm db2 warehouse, ibm master data management server, ibm omnifind, ibm industry data models, ibm balanced warehouses, oltp-based transactional data
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.
Tags : 
pci dss, ibm, mmdg, payment card industry, assessment, design, deployment, management, report on compliance, roc, vulnerabilities, threat, solutions, compliance, secure, cardholder, encryption, hospitality, retail, transportation
    
IBM
Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, tjx
    
Secure Computing
Published By: NexGen     Published Date: Feb 09, 2015
Data integrity and ultra-high performance dictate the success and growth of many companies. One of these companies is BridgePay Network Solutions, a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Due to the nature of their business, their IT team needed to strike the perfect balance between meeting regulatory-mandated data security measures with the lowest possible levels of latency and response times. As their growth accelerated, BridgePay realized the need to immediately address infrastructure shortcomings and prepare for their future growth. Download the case study now and see how BridgePay built a competitive advantage and scaled transactions by 500% in the same storage footprint using some of the most advanced and differentiated technology available today.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash, it management
    
NexGen
Published By: IBM     Published Date: Nov 07, 2011
Truly understanding your customer means not just listening to what they tell you explicitly, but also interpreting their interactions and recognizing when something significant happens - or doesn't happen. SunTrust Bank has found that customers' transactional data can be a goldmine of information for use in targeted marketing efforts. Often marketers overlook this data because it's too voluminous to put into a customer database. Leveraging an event detection technology makes this data immediately actionable for you to start communicating with customers.
Tags : 
    
IBM
Published By: Liaison Technologies     Published Date: Feb 07, 2014
This how-to-guide has been designed to help you better evaluate a VAN provider and determine the real value of the offer.
Tags : 
liaison, van, value-added network, transaction management, real value, reduce errors, accuracy of data, provider consolidation, platform capabilities, growing adoption, unreliable network, vendor technical support, ease of migration
    
Liaison Technologies
Published By: IBM     Published Date: Aug 06, 2012
With customer analytics-including predictive analytics, social analytics, business intelligence, and decision management-companies are empowered to improve the customer experience and maximize business outcomes by being proactive, rather than reactive. Comments made in social channels about a perceived problem with a checkout tool on a company's website, for example, can alert company decision-makers about a potential issue before it hits the contact center.
Tags : 
customer analytics, loyalty, profitability, revenue, ibm, transaction data, customer survey data, demographics, contact center, customer behavior, decision-makers, integrate, granular attributes, predictive analytics, life-stage changes, data management, business technology
    
IBM
Published By: IBM     Published Date: Oct 01, 2012
Read this data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
automated deployment, automated management, smbs, it solutions, business technology
    
IBM
Published By: IBM     Published Date: Jul 11, 2012
This paper discusses the challenges of managing applications in highly dynamic IT environments such as public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over flexible IT infrastructures.
Tags : 
modern applications, architectures, infrastructure, cloud, dynamic it, web traffic, scalability, reliability, flexibility, public cloud, private cloud, mission-critical applications, custom applications, service oriented architecture, soa, virtualization, addm, diagnostics, discovery, end-user monitoring
    
IBM
Published By: IBM     Published Date: Jul 09, 2012
IBM PureFlex Systems combine advanced IBM hardware and software with "patterns of expertise" and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
ibm, technology, software, customer, smb group research, storage, business technology
    
IBM
Published By: SAP     Published Date: Jul 17, 2012
Relational database management systems (RDBMSs) are systems of software that manage databases as structured sets of tables containing rows and columns with references to one another through key values. They include the ability to optimize storage, process transactions, perform queries, and preserve the integrity of data structures. When used with applications, they provide the beating heart of the collection of business functions supported by those applications. They vary considerably in terms of the factors that impact the total cost of running a database application, yet users seldom perform a disciplined procedure to calculate such costs. Most users choose instead to remain with a single vendor's RDBMS and never visit the question of ongoing hardware, software, and staffing fees.
Tags : 
sap, infrastructure, database, data management, white paper, management, storage, business functions, business technology
    
SAP
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.