romi

Results 326 - 350 of 779Sort Results By: Published Date | Title | Company Name

Hadoop and Beyond: Unlock Insights in Your Big Data with Predictive Analytics

Published By: IBM     Published Date: May 22, 2015
This presentation will demonstrate that it is possible to turn the promise of Big Data into business value by applying predictive analytics to Big Data sources such as Hadoop, Cloudera, and BigInsights.
Tags : 
big data, analytics, forecasting, data management, hadoop, application integration, analytical applications, business intelligence
    
IBM

Harnessing the Power of Website Personalization to Drive B2B Marketing Improvement

Published By: Gleanster     Published Date: Mar 14, 2012
B2B marketers operate in a world where the ability to dynamically serve up relevant website content at the so-called "moment of truth" has traditionally presented a monumental challenge. This 8-page Deep Dive analyst report explores the promise of what Gleanster terms Real-time Website Content Versioning.
Tags : 
gleanster, marketing, b2b, market research, lead generation, traditional marketing
    
Gleanster

Harvard Business Review: Analytics and IT: New Opportunity for CIOs

Published By: SAS     Published Date: Oct 18, 2017
This Harvard Business Review Insight Center report is a compilation of 26 short stories -- only a page each -- from industry experts and thought leaders versed on the promises and challenges of big data.
Tags : 
    
SAS

Health Care Cyberthreat Report

Published By: Norse     Published Date: Apr 18, 2014
Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.
Tags : 
health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats, security, it management
    
Norse

Health Care Payment Integrity Through Advanced Analytics

Published By: SAS     Published Date: Jan 17, 2018
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
    
SAS

Het mobiliteitsdilemma aanpakken

Published By: Lenovo UK     Published Date: Nov 09, 2018
De opkomst van mobiliteit zorgt ervoor dat IT-teams overal hoofdpijn hebben, met het potentieel voor hogere kosten en risico's. Maar met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, krijgt u 360 graden beveiliging, betrouwbare duurzaamheid en compromisloze productiviteit op elk apparaat. Lees meer in onze white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK

Het mobiliteitsdilemma aanpakken

Published By: Lenovo UK     Published Date: May 15, 2019
De opkomst van mobiliteit zorgt ervoor dat IT-teams overal hoofdpijn hebben, met het potentieel voor hogere kosten en risico's. Maar met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, krijgt u 360 graden beveiliging, betrouwbare duurzaamheid en compromisloze productiviteit op elk apparaat. Lees meer in onze white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK

High Availability for IBM I: A Technical Review of Software and Hardware-Based Solutions

Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm, disaster recovery, policy based management
    
Vision Solutions

High Speed Ethernet WAN: Is Encryption Compromising Your Network?

Published By: SafeNet     Published Date: Oct 06, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
SafeNet

Hitting the Wall with Server Infrastructure for Artificial Intelligence

Published By: IBM     Published Date: Jul 02, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
IBM

Hitting the Wall with Server Infrastructure for Artificial Intelligence

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
Group M_IBM Q418

Hitting the Wall with Server Infrastructure for Artificial Intelligence Whitepaper

Published By: Group M_IBM Q418     Published Date: Dec 18, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy.
Tags : 
    
Group M_IBM Q418

Hitting the Wall with Server Infrastructure for Artificial Intelligence Whitepaper

Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy.
Tags : 
    
Group M_IBM Q119

Hitting the Wall with Server Infrastructure for Artificial Intelligence Whitepaper

Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy.
Tags : 
    
Group M_IBM Q2'19

How APIs Modernize Legacy Systems

Published By: MuleSoft     Published Date: Nov 27, 2018
The world is moving at lightning speed from legacy enterprise software to SOA, SaaS integration, and APIs, compelled by the power of convention over configuration and the promise of agility and operational efficiency. Yet most businesses face a widening divergence between the IT infrastructure demanded by emerging business needs and the infrastructure they’ve built up over generations. The result? Many organizations find it difficult to modernize their legacy systems in a way that enables them to create an IT strategy that supports the quick adoption of newer technologies such as cloud, big data, IoT, and mobile. This is where APIs come in. Discover how to make legacy a competitive advantage: Leverage APIs and API-led connectivity to future-proof your IT infrastructure Expose legacy systems using Anypoint Platform in a straightforward way Connect legacy systems quickly, without disruption Build on a platform that can extend legacy to SaaS and APIs Learn how MuleSoft customers like S
Tags : 
    
MuleSoft

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies

How do you balance the demands of Workforce Mobility, with data and device security?

Published By: Lenovo     Published Date: Aug 31, 2018
You shouldn't have to trade one for the other. We'll show you where organizations typically make compromises for mobility, to help you avoid the trade-off pitfall and select the best devices for your mobile organization: • Insist on uncompromising productivity • Demand 360° security • Choose reliable durability first Lenovo is the first, best and most innovative leader in building devices to support your mobile workforce.
Tags : 
    
Lenovo

How do you know your security’s working?

Published By: Lenovo - APAC     Published Date: Aug 13, 2019
How much money does the average data breach cost? How many days of downtime does ransomware cause? How many millions of people have their data exposed? Discover the vast impact on time, money & productivity of security breaches. Investing up front in strong security, will save you in the long run. Comprehensive end-to-end security not only reduces the risk of being compromised, it also brings benefit to the business., Taking steps to invest in the right solutions, that use rigorous, trackable and auditable security standards, across their entire supply chain is a must to mitigate risks. ThinkShield provides that and so much more. It is a security solution that offers end-to-end protection that drives productivity, innovation, and profitability.
Tags : 
    
Lenovo - APAC

how intelligent cloud content management is fulfilling the original Promise of ECM

Published By: Box     Published Date: Nov 06, 2019
The value proposition of ECM is in transition. The promise of 1990s-architected ECM suites — to standardize all your content on a single ECM solution — failed to materialize. The complexity and inflexibility of these heterogeneous platforms never solved the original challenge of managing ungoverned and fragmented content stores — and make them increasingly unviable for today’s business needs. To find out more download this whitepaper today.
Tags : 
    
Box

How intelligent cloud content management is fulfilling the original Promise of ecm

Published By: Box     Published Date: Nov 07, 2019
The value proposition of ECM is in transition. The promise of 1990s-architected ECM suites — to standardize all your content on a single ECM solution — failed to materialize. The complexity and inflexibility of these heterogeneous platforms never solved the original challenge of managing ungoverned and fragmented content stores — and make them increasingly unviable for today’s business needs. To find out more download this whitepaper today.
Tags : 
    
Box

How Retailers Overcome Promiscuous Purchasing

Published By: Workplace by Facebook     Published Date: Sep 10, 2018
Body: Almost half of all retail purchasing journeys now involve a mobile device. This means shoppers have more choice, and exposure to more influencers that shape their buying decisions. Learn consumers are evolving and how tools like Workplace by Facebook can help overcome these new challenges in the retail industry.
Tags : 
collaboration software, collaboration portal, business communication, workforce management, project management, team work
    
Workplace by Facebook

How Retailers Overcome Promiscuous Purchasing

Published By: Workplace by Facebook     Published Date: Dec 21, 2018
Almost half of all retail purchasing journeys now involve a mobile device. This means shoppers have more choice, and exposure to more influencers that shape their buying decisions. Download this info-graphic now to learn how consumers are evolving and how tools like Workplace by Facebook can help overcome these new challenges in the retail industry.
Tags : 
    
Workplace by Facebook

How Service-Oriented Architecture (SOA) Impacts Your IT Infrastructure

Published By: IBM     Published Date: Mar 28, 2008
More than likely you’ve heard quite a bit about service-oriented architecture (SOA) and how it holds the promises of quicker response to market trends, improved customer services and lower application development costs. From an infrastructure perspective, an SOA implementation contains all the same pieces and parts as your traditional environment.
Tags : 
infrastructure, service oriented architecture
    
IBM

How To Build a SOC With Limited Resources

Published By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm

How to Build a SOC with Limited Resources

Published By: LogRhythm     Published Date: Feb 22, 2018
Some organizations have formal security operations centers (SOCs). Formal 24x7 SOCs are tightly secured areas where teams of dedicated analysts carefully monitor for threats around the clock, every day of the year. The analysts are checking their organization’s enterprise security controls to identify possible signs of intrusion and compromise that may require a response by the organization’s incident responders.
Tags : 
    
LogRhythm
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.