software analysis

Results 26 - 50 of 97Sort Results By: Published Date | Title | Company Name

What is ERP? The Ultimate Guide

Published By: Sage People     Published Date: Nov 02, 2017
Did you ever wonder what enterprise resource planning or ERP is and how it can help your business? Or perhaps you know a little about ERP but you’re not sure if you should opt for an on-premise or cloud solution and what to expect from your final choice. Don’t worry. If you’re a business owner, manager or director in a mid-sized or growing business and you’re confused about ERP, this guide will help you.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting
    
Sage People

The Total Economic Impact of Sage X3

Published By: Sage People     Published Date: Nov 02, 2017
Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester’s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting
    
Sage People

Gartner Report: Cool Vendors in IoT Security, 2017

Published By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
    
Zingbox

Schneider's DCIM-Driven Cloud Service

Published By: Schneider Electric     Published Date: Aug 15, 2017
Schneider Electric is integrating datacenter infrastructure management (DCIM) software, big-data analytics and cloud services into the management of customers’ datacenters. Its recently launched StruxureOn cloud offering signals a new wave in datacenter operations, using a combination of machine learning, anomaly detection and event-stream playback to give operators real-time insights and alarming via their smartphones. More capabilities and features are planned, including predictive analysis and, eventually, automated action. Schneider’s long-term strategy is to build a partner ecosystem around StruxureOn, and provide digital services that span its traditional datacenter business.
Tags : 
incident tracking, historical trending, troubleshooting, operational analysis, prediction model, schneider equipment, maintenance, firmware updates
    
Schneider Electric

TrustRadius Report on IBM Cloudant

Published By: IBM     Published Date: Jun 21, 2017
This report is designed to help you make an informed decision about IBM Cloudant. It is based on 22 ratings and 21 in-depth user reviews of Cloudant on TrustRadius, the trusted user review site for business software. By crowd-sourcing user perspectives, we help you to get a true sense of the product. This report includes analysis of the types of customers (company sizes, industries etc.) that use Cloudant, what companies and users like most about the product, as well as areas for improvement
Tags : 
ibm, ibm cloudant, demographic, cloud computing, decision making
    
IBM

Combining IBM SPSS Statistics and R for competitive advantage

Published By: IBM     Published Date: May 12, 2017
In today’s world, the data is flowing from all directions: social media, phones, weather, location and sensor equipped devices, and more. Competing in this digital age requires the ability to analyze all of this data, and use it to drive decisions that mitigate risk, increase customer satisfaction and grow revenue. Using a combination of proprietary software and open source technology can give your data scientists and statisticians the analytical power they need to find and act on insights quickly. IBM® SPSS® Statistics provides all of the data analysis tools you need, and integrates with thousands of R extensions for maximum power and flexibility. In this next Data Science Central Webinar event, we will show how SPSS Statistics can help you keep up with the influx of new data and make faster, better business decisions without coding.
Tags : 
ibm, spss, data analysis, statistics, risk mitigation
    
IBM

Channeling Streaming Data for a Competitive Advantage

Published By: SAS     Published Date: Apr 25, 2017
Today, data is constantly flowing in and out of organizations from electrical and mechanical sensors, RFID tags, smart meters, scanners, mobile devices, vehicles, live social media, machines and other objects. Did you know that a modern plane with more than 10,000 sensors just in the wings is expected to generate more than 7 terabytes a day? And Bain predicts that by 2020 annual revenues could exceed $470 billion for the internet of things (IoT) vendors selling hardware, software and comprehensive solutions. Analysts believe that all of this data will drive a new type of industrial revolution – one that’s driven by highly accurate, real-time analysis, alerts and actions. Increasingly, machines will automate decisions and simply notify humans with instructions. Consider the promise of the IoT, where any object can be connected to the internet and continuously send and receive data. Gartner says that by 2020, 21 billion IoT devices will be in use worldwide.
Tags : 
    
SAS

2016 State of Software Security

Published By: Veracode     Published Date: Oct 27, 2016
Veracode’s State of Software Security report provides security practitioners with tangible Application Security benchmarks with which to measure their own programs against. The metrics presented here are based on real application risk postures, drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. Download the report now!
Tags : 
veracode, security, software security, application security, security benchmark, enterprise applications, business technology
    
Veracode

Getting the Infrastructure Right for Surveillance Systems

Published By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel

Creating smarter campaigns with the IBM Advanced Analytics platform

Published By: IBM     Published Date: Jul 27, 2015
Communications service providers have much to gain from deploying big data analytics capabilities that enable smarter campaigns.
Tags : 
ibm advanced analytics platform, big data analytics, communications service providers, analytics software, predictive analytics, analytics visualization, historical analysis
    
IBM

Win The Race Against Time To Stay Ahead of Cybercriminals

Published By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, optimization, security, cyber crime, network security, it security, access control, anti spyware
    
IBM

The Great Debate: One Integrated Business System VS. Siloed Applications

Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jan 30, 2015
This white paper covers the types of inefficiencies caused by running disparate business solutions for different departments and how a software platform that unifies critical business processes helps companies grow more rapidly and profitably. This paper reviews numerous case studies of companies that switched from disparate systems to an integrated software suite, and provides an analysis by independent industry expert, Nucleus Research, of customers' ROI from using an integrated software suite.
Tags : 
integrated business system, business processes, software platform, disparate systems, integrated software suite, it management
    
Netsuite DWASF Leads Display Q1 2015

Web Server Benchmarking: 4 Ways to Improve Accuracy

Published By: Nginx     Published Date: Jun 25, 2014
Learn four concrete tips to help you avoid benchmarking confusion, so you can achieve the most accurate and understandable results.
Tags : 
riverbed, application delivery, application development, application infrastructure, application performance, enterprise software, load balancing, open source
    
Nginx

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager

Published By: McAfee     Published Date: Apr 16, 2014
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis, security
    
McAfee

Make Better Business Decisions Immediately with Big Data Visualization

Published By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : 
visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence
    
Datawatch

Transitioning to Cloud Business: Best Practices for ISVs

Published By: Progress Software     Published Date: Mar 12, 2014
Progress Software and Saugatuck Technology have come together to provide this Saugatuck Strategic Report which provides guidance to ISVs in transition not just to the Cloud – but to entirely new ways of doing business, new requirements from customers and partners, and new opportunities that enable significant reward, and related potential risk. This report shares not only Saugatuck’s analysis of key market shifts, and the key challenges faced by ISVs in these transitions, but also provides ISVs with critical success factors and best practices from more than seven years of Saugatuck Technology research and business consulting with a diverse range of software providers around the world.
Tags : 
progress software, saugatuck technology, isv, best practices, business challenges, cloud transition, technology challenges, knowledge management
    
Progress Software

Systems Engineering Best Practice: Model-Based Requirement Analysis

Published By: IBM     Published Date: Feb 27, 2014
This is a paper on model based requirements analysis where best practices in using modeling for requirements analysis and how that links with requirements management is discussed.
Tags : 
ibm, ibm software, systems engineering, best practices, model-based analysis, verifiable, it systems, customer needs
    
IBM

Mastering Risk with Business Forecasting

Published By: IBM     Published Date: Oct 24, 2013
Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.
Tags : 
ibm, mastering risk, business forecasting, business analytics, ibm software, variation, predictable risk, discontinuities
    
IBM

Three Capabilities to Fuel Today’s Dynamic Planning and Forecasting

Published By: IBM     Published Date: Sep 27, 2013
Today’s economy is widely characterized by skittishness and uncertainty about the future. The effect that unpredictable external forces can have on the economy can leave many business leaders feeling helpless. This fact was demonstrated in the IBM Global CFO Study, where many CFOs admitted that they lacked the ability to measure and monitor business performance effectively. The same study also found that the companies who invested in their business insight capabilities were better able to anticipate and react to external economic forces. IBM Cognos software can provide businesses with the business insight they need to be prepared, not scared. Cognos software allows businesses to analyze performance, model business strategies and processes, and contribute to a common set of business objectives.
Tags : 
ibm, ibm cognos software, dynamic planning, forecasting, analysis, financial planning, business insight, it management
    
IBM

PassMark Ranks Leading Endpoint Protection Products

Published By: Webroot     Published Date: Sep 18, 2013
In today’s challenging security environment, using the best products that fulfill your business needs is of the essence. So when evaluating solutions, be sure to look at all aspects of a product—including performance benchmark testing. PassMark Software is a leading authority in software and hardware performance benchmarking, providing independent testing and analysis. In this recent PassMark report, discover how eight different endpoint security software products compare on a variety of metrics—from performance to malware protection—to help you determine which would work best in your organization
Tags : 
security, benchmark, software, hardware, endpoint security, performance metrics, protection, software development
    
Webroot

SANS review focuses on SIEM features business demands for security and threat intelligence

Published By: McAfee     Published Date: Jul 24, 2013
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis, security, data management, business technology
    
McAfee

8 Steps to Measure ADM Vendor Deliverables

Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST

Learn how the Office of Finance Benefits from Automating Business Processes

Published By: Prophix     Published Date: Apr 24, 2013
Learn how leading companies employ Corporate Performance Management (CPM) software to automate financial processes (budgeting, forecasting, reporting, and planning) that spreadsheets complete on a manual basis and reap the rewards of advanced data analysis.
Tags : 
performance management, finance, business intelligence, cpm, enterprise, data, analytics, application integration
    
Prophix

BMC recorded webinar featuring Forrester on workload automation survey results

Published By: BMC     Published Date: Sep 11, 2012
Hear VPs from Forrester Research and BMC Software discuss the results of our 2012 job scheduling survey in "Workload Automation Survey Results: Peer Insights and Expert Analysis.
Tags : 
job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
    
BMC

Interactive Analysis for Business Information and Insights

Published By: SAP     Published Date: Jul 19, 2012
With SAP® BusinessObjectsT Web Intelligence® software, companies can perform sophisticated ad hoc reporting and analysis. Powerful functionality and an intuitive user interface enable your people to turn data into insights, improve decision making and productivity, and share knowledge across the enterprise.
Tags : 
sap, business, management, software, business information, insights, analysis, interactive
    
SAP
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.