assets

Results 226 - 250 of 485Sort Results By: Published Date | Title | Company Name
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.
Tags : 
watchguard xcs, securemail encryption, email encryption, ibe, data loss over e-mail, compliance, identity-based encryption
    
WatchGuard Technologies
Published By: SRC,LLC     Published Date: Jun 01, 2009
Companies spend millions of dollars every year on building data warehouses, buying business intelligence (BI) software tools and managing their analytic processes in the hope of gaining consumer insight and winning market share. Yet, many companies fail to realize the full benefits of their technology investments because they are hamstrung by the layers of expertise and the complexity of technology tools needed to integrate various data warehouses and associated tools within their existing analytic environments. Since analysis is only as good as the accessibility, timeliness and accuracy of the information being analyzed, the interoperability of any data warehouse with any analytic environment is essential to achieving insightful, actionable analysis and making better decisions.
Tags : 
src, enterprise, streamline, analytics, economy, analytic imperative, business intelligence, seamless, data warehouse, interoperability, analytic environment, data assets, report generation, output options, total cost of ownership, tco, roi, return on investment, olap, enterprise applications
    
SRC,LLC
Published By: SRC,LLC     Published Date: Jun 01, 2009
We work in an ever-changing landscape of competitors, market forces, customer relationships, partner alliances, political and regulatory pressures, and global climate effects. The common mechanism for coping effectively with change is to refer to canned reports and dashboards, dump reporting data into a spreadsheet and look for answers to today's questions. All too often, we have to rely on estimates rather than models, and gut feel rather than data, because we can't get answers in a timely fashion. Yet we know that the answers lie hidden in the morass of corporate data.
Tags : 
business intelligence, src, capabilities, unified enterprise, spatial intelligence, alteryx, oracle, netezza, teradata, gui, ford, experian, sql, enterprise applications
    
SRC,LLC
Published By: iKnowtion     Published Date: Nov 17, 2011
This highly successful dot-com brand leveraged its customer information assets to understand the broad range of customers attracted to its product offering, as well as how to evaluate each customer's future value potential.
Tags : 
customer intelligence, crm solutions, customer analytics, value estimation, customer potential, data modeling, marketing analytics, iknowtion
    
iKnowtion
Published By: iKnowtion     Published Date: Nov 17, 2011
Learn how a financial services company can retain critical customer assets, and their method for predicting customers that will transfer assets in and out of accounts and the expected amounts.
Tags : 
customer intelligence, customer loyalty, crm solutions, customer profiling, probability choice models, trigger marketing, financial services, profitability, data modeling, marketing analytics, iknowiton
    
iKnowtion
Published By: Limelight Networks     Published Date: Feb 14, 2012
Learn how to turn content assets into online consumer engagement andhigher web conversion rates. In this report, you'll find: An overview of content marketing strategies and solutions Keys to content development success Must-haves for content
Tags : 
    
Limelight Networks
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Now you can have easy SaaS-based Discovery and Reporting on all Physical and Virtual Systems, Security Update Status and Assets in Minutes.
Tags : 
shavlik, cloud-based it management, saas, discovery and reporting, virtual systems, security update, netchk protect, virtual infrastructure
    
Shavlik Technologies
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Patch Plus makes managing IT assets fast, easy, and automatic, reducing time to value from months to minutes.
Tags : 
shavlik, patch plus, automation, it asset, virtualization, netchk console, unified management, patch management
    
Shavlik Technologies
Published By: IBM Software     Published Date: Feb 16, 2011
IBM Cognos Business Insight changes information delivery for all business users. Watch this recorded event which originally aired on February 15, 2011 to see how this unlimited BI workspace enables business users to create, personalize and interact with all of their information assets. Through demos and discussion, you'll learn how this revolutionary interface lets users: . Satisfy all their information needs in a single, highly intuitive workspace . Blur the lines between business authoring and analysis . Easily create net-new analysis . Enhance existing reports with information from a personal data source Discover how IBM Cognos Business Insight enables self-service BI for business users, while giving IT complete confidence that data will remain secure.
Tags : 
ibm, cognos, business intelligence, query, analysis
    
IBM Software
Published By: Aberdeen Group     Published Date: Sep 11, 2012
Customers are the lifeblood of business, but their importance is sometimes forgotten when it comes time to collect payment. For most organizations, accounts receivable is one of the largest assets on the balance sheet. To maintain a competitive position in the market, companies are looking to improve asset-to-cash conversion performance. From the financial supply chain perspective, the goal of the order-to-cash cycle is simple: to translate successful sales into actual financial benefit for the organization.
Tags : 
aberdeen, accounts receivable, customers, business, organization, conversion performance, business technology
    
Aberdeen Group
Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
Companies faced with growing capacity requirements, underutilization of existing storage assets, and administrative inefficiency are searching for ways to decrease both cost and complexity. Read on to find out more about HP 3PAR Utility Storage now!
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain, integrated strategy, archival storage
    
HP and Intel® Xeon® processor
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
For many organizations facing IT budget challenges, delaying capital expenses by prolonging the life of hardware assets is a common strategy.
Tags : 
intel, idc analyst connection, it budget, server refresh cycles, business technology
    
Sponsored by HP and Intel® Xeon® processors
Published By: Attachmate     Published Date: Feb 05, 2014
Watch this video and find out how easy it can be to make your legacy mainframe applications work with new technologies. Using Attachmate Verastream, you can roll out integrated, fully functional applications tailored to each line of business. They get the modern capabilities they need and you get quick development cycles because you don’t have to change host application code. The demo breaks the process down into some basic steps that will help you breathe new life into your legacy mainframe assets.
Tags : 
attachmate, verastream, functional applications, development cycle, best practices, legacy applications, legacy systems, legacy modernization, legacy integration, host applications, enterprise applications
    
Attachmate
Published By: Kaseya     Published Date: Mar 12, 2015
Turn management data into actionable business information that helps create operational efficiencies and demonstrate value.
Tags : 
data management, business information, audits, inventory information, it policies, automation management systems, it assets, it solutions
    
Kaseya
Published By: ITinvolve     Published Date: Apr 16, 2013
Most assets in IT are governed by one or more policies, yet there is usually no quick and easy method to determine which policies apply to which assets and what specifically those policies govern. This means that IT teams are often making changes to assets that violate the policies meant to govern them. Read this use case document to understand how social knowledge collaboration techniques can help you to easily assign and track the policies that govern your assets to avoid out of compliance situations.
Tags : 
itinvolve, policies, it teams, compliance situations, social knowledge collaboration, techniques
    
ITinvolve
Published By: VeloCloud Networks     Published Date: Feb 19, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
    
VeloCloud Networks
Published By: JBoss Developer     Published Date: Oct 21, 2016
Digital transformation (DX) is the continuous process by which enterprises adapt to or drive disruptive change by leveraging digital competencies, such as harnessing sensor data or using location, customer profile, and a mobile app to make shopping recommendations. DX reshapes the organization's culture where required; leverages existing processes, systems, and assets; and creates net-new digital capabilities as needed. With DX, there is the need to embrace new business models and new architectures and technologies that will help an enterprise with customer-facing innovation as well as transition existing systems, processes, organization structure, and relationships to support the transformation.
Tags : 
api, market intelligence, advisory services, digital transformation, data
    
JBoss Developer
Published By: AppNexus     Published Date: Apr 04, 2017
Email marketing is one of digital media’s most effective channels. Inside the inbox, marketers can capture the consumer’s undivided attention in a uniquely intimate environment, creating a perfect opportunity for meaningful brand engagement and driving new purchase transactions. However, with open rates for even the most effective brands hovering around 25%, there is huge opportunity for marketers to reach their customers with impactful formats on the open internet to successfully engage them across the marketing funnel. Download the free eBook “Beyond The Inbox: How To Transform Your Email Marketing Platform Into An Omnichannel Solution” to learn: • How to rapidly build an omni-channel solution for your clients • How AppNexus can help your platform reach your marketer’s customers most cost-effectively • How AppNexus ensures complete security for your client’s CRM data assets ?
Tags : 
appnexus, email marketing, omni-channel, crm data, branding, marketing, brand engagement, customer engagement
    
AppNexus
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: AWS - ROI DNA     Published Date: Aug 09, 2018
In today's data -driven digital environment, companies are collecting, transforming and connecting data in innovative and meaningful ways. A robust information and data management solution enables you to leverage the power of your data, exploring and uncovering insights in documents, images and audio across billions of inputs and existing data assets.
Tags : 
    
AWS - ROI DNA
Published By: GreenOrbit     Published Date: Jan 23, 2019
It’s time to get going on using your intranet as a strategic advantage. Most companies don’t, seeing their intranet as a place to dump random assets. That’s not going to benefit you in 2019. Here’s the path to actually follow.
Tags : 
intranet, collaboration tools, intranet effectiveness, intranet vendors, intranet best practices
    
GreenOrbit
Published By: Vertica     Published Date: Dec 09, 2008
BlueCrest Capital Management is a leading European hedge fund, with $15B in assets-under-management. Learn how BlueCrest uses Vertica Analytic DBMS to obtain real-time analysis while simultaneously loading vast amounts of new market data.
Tags : 
vertica, data management, data warehousing, dbms, data mining, data source, data, security, business intelligence
    
Vertica
Published By: Acquia     Published Date: Sep 13, 2011
Considering migrating your website to open-source Drupal? This paper examines scenarios, reasons, and methods for migration. Learn about available tools and best practices to help make you successful.
Tags : 
acquia, drupal, open-source, evolving web trends, site assets
    
Acquia
Published By: IBM     Published Date: Feb 08, 2008
Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.
Tags : 
bank, banks, financial, financial institutions, fisma, compliance, data security, information management, information security, database security, customer data, ibm
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com