Skip to content
 

data

Results 1 - 25 of 12799Sort Results By: Published Date | Title | Company Name
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Schneider Electric     Published Date: Oct 28, 2019
451 Research befragte mehr als 450 Entscheidungsträger, die für die Auswahl von Colocation-Dienstleistungen verantwortlich sind, um Einblicke in Faktoren zu gewinnen, die die Nachfrage nach Colocation antreiben.
Tags : 
colocation-datacenter, schneider electric, cloud und service-anbieter
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 28, 2019
Einige potenzielle Nutzer von Colocation-Datacenter empfinden die bewährte Verfahren zur Stromversorgung und Kühlung als einschränkend. Allerdings können effektive Nutzungsbedingungen Ausfallzeiten aufgrund von thermischer Abschaltung und menschlichem Versagen verkürzen, Kapazitätseinschränkungen aufgrund von unnötigem Energieverbrauch verringern und die Lebensdauer der anfänglichen Mietfläche verlängern und somit Kosten für zu groß dimensionierte Reserveflächen vermeiden. Dieses Dokument erläutert einige Ursachen für unnötigen Energieverbrauch, Kühlung und Flächennutzung in Datacentern für Colocation-Services und erläutert, wie Stromverteilung, Luftabsaugung und andere Verfahren die Verfügbarkeit und Effizienz in kompakten Racks steigern können. Es werden Beispiele für Nutzungsbedingungen gegeben, die zur Lösung dieser Probleme beitragen.
Tags : 
colocation-datacenter, schneider electric, cloud und service-anbieter
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 28, 2019
Es gibt einen besseren Weg Gruppen (oder Pods) von IT-Racks zu implementieren und zu verwalten. Wirkungsvolle, freistehende Pod-Rahmen-Einhausungssysteme können schnell zusammengebaut und als Überkopfverlegung-Montierungspunkt für Dienste verwendet werden. Im Gegensatz zu herkömmlichen Implementierungen, ist die Lufteinhausung und unterstützende Infrastruktur am Rahmen befestigt,was ein einfaches ein- und rausfahren der Racks ermöglicht Pods und jegliche unterstützende Infrastruktur können implementiert werdenbevor die Racks in die richtige Stelle gerollt werden. Laden Sie dieses Whitepaper herunter, um mehr zu erfahren.
Tags : 
colocation-datacenter, schneider electric, cloud und service-anbieter
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 29, 2019
Colocation-Anbieter setzen sich mit Marktkräften auseinander, die sowohl große Chancen als auch bedeutende Herausforderungen darstellen – teilweise aus derselben Entwicklung. Die Anbieter müssen sich mit ständig wechselnden Käufergruppen auseinandersetzen, wobei CFOs und COOs eine zunehmend wichtige Rolle bei der Entscheidungsfindung spielen. Sie müssen auf neue Trends wie das Internet der Dinge und Cloud Computing eingehen, die sich sowohl positiv als auch negativ auf ihr Geschäft auswirken können. Laden Sie dies herunter Ein Peer-to-Peer-Roundtable-Bericht, gesponsert von Schneider Electric um mehr zu lernen.
Tags : 
colocation-datacenter, schneider electric, cloud und service-anbieter
    
Schneider Electric
Published By: Experian     Published Date: Sep 26, 2019
"We are in an age of unprecedented opportunity, where ubiquitous data and new technologies are shaping the world and dramatically changing the way consumers interact with businesses like yours. The rise of fintech companies is driving competition, e-commerce has raised the bar for digital experiences, fraud is at an all-time high, and there is pressure to grow your business. You need to meet these challenges head on and do it in a way that can scale with the increasing volume — and value — of customers. All while meeting and exceeding customer expectations. We believe rapid, sustainable growth can be fuelled by acquiring the right customers and delivering customer experiences that align with their expectations. To succeed you need a comprehensive, unified view into your customers and their needs. As a business leader, how do you achieve these objectives? What can you do to attract and acquire new customers? What tools do you need to quickly act on insights and to make consistent, relev
Tags : 
    
Experian
Published By: KPMG     Published Date: Oct 15, 2019
Consumers have become more educated about the value of data and cyber risks associated with it. As consumer awareness increases so does their expectations of trust and digital security. Read now KPMG's report Trust in the time of disruption to understand the cybersecurity gap that exists between consumers and organisations, and what asset management and financial services firms as a whole can do to close the trust gap.
Tags : 
    
KPMG
Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
As 5G is becoming a commercial reality in multiple lead markets, the question of how it should be positioned, packaged and priced will be critical in building competitive 5G propositions. Download the Strategy Analytics report to discover the results from end-user study groups and operator interviews, undertaken to answer a fundamental question: Are Telcos getting 5G right? Learn: How to build a 5G proposition to drive uptake, demand and profitability What consumers want from 5G services Where the opportunities and challenges are for operators, including content, unlimited data, enterprise offerings, network slicing, digital engagement, IoT etc.
Tags : 
    
Matrixx Software - Kingpin
Published By: Oracle     Published Date: Sep 25, 2019
Research shows that legacy ERP 1.0 systems were not designed for usability and insight. More than three quarters of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans 1. These systems lack modern best-practice capabilities needed to compete and grow. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. Oracle’s goal is to help you navigate your own journey to modernization by sharing the knowledge we’ve gained working with many thousands of customers using both legacy and modern ERP systems. To that end, we’ve crafted this handbook outlining the fundamental characteristics that define modern ERP.
Tags : 
    
Oracle
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Schneider Electric     Published Date: May 31, 2019
Data centers are evolving. They are much more than the data storage facilities of the past—they are gateways to emerging markets and platforms from which businesses can expand their reach through greater connectivity. These evolutions require the deployment of secured IT platforms capable of supporting and treating a huge amount of data generated in real time. Learn how Interxion partnered with Schneider Electric to meet the needs of its customers and stay relevant in the rapidly evolving colocation market.
Tags : 
customer insight, colocation business, schneider electric
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 04, 2019
What is digital transformation? Why is everyone talking about it? And what can it do for me? Across every level of your company, people are asking themselves these questions. The Global Digital Transformation Benefits Report provides answers. It’s based on data points from over 230 cases of digital transformation from around the world, in data centers, buildings, infrastructure, and industry. The results paint a compelling picture of what digital transformation can do for businesses of all types. A selection of key findings: - On average, digital transformation helped our customers save 35% on engineering costs. - Our customers cut an average of 28% off their energy costs. - Digital transformation efforts drove productivity gains by an average of 24%.
Tags : 
digital transformation, digital transformation in business, digital transformation in healthcare, iot, data centers, buildings, infrastructure, industry
    
Schneider Electric
Published By: Experian     Published Date: Aug 29, 2019
Card-not-present fraud is estimated to reach $19.3 billion by 2022. Online payment fraud will grow 13.7% from 2017-2022 – Juniper Dive deeper into these data points with a focus on assessing the impact, challenges and opportunities presented by emerging payment mechanisms and regulation, as well as an in-depth assessment of sector-specific trends and outlook in regard to digital fraud. It provides essential reading for those wishing to understand where the key strategic focus should lie and how market forces are affecting the industry.
Tags : 
    
Experian
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Workable     Published Date: Oct 09, 2019
In every organization, the recruiting process generates data: how long it took to fill one role, how many candidates progressed to the final hiring stage or how many comments hiring teams exchanged until they made a hire. Through tracking metrics, you can get tangible evidence of how successful your recruiting process is, rather than relying on intuition. In this guide, we put together everything you need to know to start making the most out of your recruiting data. You’ll find: A list of common recruiting metrics to track. A detailed look into five of the most important KPIs. How to collect data and track metrics consistently over time.
Tags : 
    
Workable
Published By: Juniper Networks     Published Date: Sep 26, 2019
"SD-WAN largely exists today to support two key enterprise transformations: multicloud and the software-defined branch (SD-Branch). Multicloud has changed the center of gravity for enterprise applications, and with that, has changed traffic patterns too. No longer does traffic need to flow to enterprise data center sites or central internet peering points and breakouts. That’s because most traffic from users and devices in the enterprise campus and branch today goes to cloud-based applications scattered across a host of clouds. It’s neither economical nor efficient to haul traffic over WAN-dedicated links to a central enterprise site. So to optimize the cost and performance of multicloud-bound traffic, modern WAN edge routers, often called customer premises equipment (CPE), are now equipped with hybrid WAN links and routing. Hybrid WAN interfaces may include WAN provider-dedicated links such as MPLS, as well as direct internet links over xDSL, broadband and 4G/LTE wireless."
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: KPMG     Published Date: Jun 06, 2019
HR’s most confident leaders are using data, predictive insights and AI to transform HR into a new value driver. Discover what it takes to become an HR transformation trailblazer. Read this report to discover: • how trailblazers are exploiting uncertainty to drive new competitive advantage • which technologies HR leaders are investing in • what it means to integrate human and digital labour in a collaborative workplace • six priorities for forward-looking HR leaders.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Getting complex decisions right across complicated operational networks is the key to optimum performance. Find out how one of the UK’s biggest bus operators is using data and analytics to make better decisions and optimise the use of resources across their network. Read this story to discover: • how data and analytics can transform operational performance • the benefits of using decision-support tools in the middle office • key lessons for getting your plans for digital transformation right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
    
KPMG
Published By: Oracle     Published Date: Sep 26, 2019
Marketing is not getting more difficult because of data— it’s actually getting easier. In the old days you needed to guess who your audience was and plan in advance what you wanted to say and wait far too long to see if it worked. Those days are long gone—now you can determine EXACTLY who your audience is, deliver a relevant, personalized message in a nanosecond, and find out almost immediately whether it worked! You no longer have to live by the spray-and-pray method— you can be tactical in your delivery. Marketing today is data-driven and uses a wealth of insights and connection points to engage with consumers one to one. Data about our customers and prospects gives us the ability to deliver the right message to the right audience at the right time. That’s audience targeting, and it’s far deeper than demo targeting, even though targeting by demo is a nice place to start. That said, the sheer volume of data and technology can be overwhelming. Cut through the noise and tackle the ba
Tags : 
    
Oracle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.