analyze

Results 326 - 350 of 562Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 08, 2012
Read this white paper to learn how marketers are using IBM technology to learn about their customers' attitudes, preferences and buying habits from what they say on publicly available social media and through the full range of interactions that can be recorded, measured and analyzed. Discover how marketers are combining that knowledge with other sources of customer information to guide marketing decisions and shape marketing campaigns, cultivating relationships with online advocates to help steer product development, and, ultimately, boosting sales and revenue.
Tags : 
paid media, owned media, earned media, social media, ibm, social analytics, pay per click, ppc
    
IBM
Published By: IBM     Published Date: Aug 08, 2012
Your goal is clear-produce high-quality goods while optimizing resources at every step of production. And in today's uncertain economy, cost-control efforts may never have been more important. Unscheduled downtime because of equipment failure can have a serious impact on your organization's bottom line. Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible. Predictive analytics helps you in a number of ways: identify when equipment is likely to fail or need maintenance and take action to maximize uptime and reduce future warranty claims costs; optimize allocated labor resources and spare part inventories, helping eliminate undue maintenance, prevent downtime and reduce inventory costs; and determine why certain production runs fail more often than others, identify the cause and analyze whether those runs warrant a recall.
Tags : 
ibm, technology, manufacturing, predictive maintenance, productivity, minimize downtime, reduce costs, white paper
    
IBM
Published By: IBM     Published Date: Oct 23, 2012
Analytics is the key to understanding your Generation C customers-the "C" for connected-and marketing to their interests. Read on to understand customer behavior fuel interactive marketing.
Tags : 
ibm, interactive marketing, customer behavior, consumer behavior, analyze, marketing effectiveness, emerging marketing, marketing research
    
IBM
Published By: IBM     Published Date: Jan 18, 2013
Read this white paper to learn how marketers are using IBM technology to learn about their customers’ attitudes, preferences and buying habits from what they say on social media and through a range of interactions that can be measured and analyzed.
Tags : 
analytics, social media, best practices, crm, marketing
    
IBM
Published By: Esker     Published Date: Jan 06, 2014
Business performance depends on how well a company manages its internal processes. Companies with effective business process management in place are able to analyze key performance indicators to monitor efficiency of day-to-day activities and employees against operational targets.
Tags : 
esker, automation, sales order processing, order-to-cash, erp systems, automated sales, streamlining, order processing
    
Esker
Published By: SAP     Published Date: May 11, 2012
Business intelligence allows business users to analyze and better understand their organization's plans and results.
Tags : 
business intelligence, medium sized business, streamlining, kpi
    
SAP
Published By: NetProspex     Published Date: May 12, 2014
NetProspex manages B2B marketing data on a massive scale. When we analyzed the more than 61M the records we processed last year, here’s what we found.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services
    
NetProspex
Published By: NetProspex     Published Date: May 12, 2014
NetProspex analyzed the success rate of hundreds of email open rates and thousands of phone calls. The statistics proved that trigger-based emails had significantly higher conversion rates, but email sent on optimized days also did well. Download this guide on the best days to send emails.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services
    
NetProspex
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : 
targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity
    
ThreatTrack Security
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : 
custom defense, security threats, enterprise networks, intellectual property
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology
    
CDW-Trend Micro
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Learn how to break down silos, reinvent productivity, and help your sales team achieve success by unifying transactional systems, social networking, and strong customer relationships. Download this free Nucleus report that says teams using the Microsoft Relationship Sales solution increased productivity 12-15 percent.** You’ll also learn how to: Empower your sellers with savvy insights that engage and delight customers. Scale the power of one-on-one relationship selling by unifying the sales experience. Offer your team tools to reinvent the way they sell and help transform your company’s bottom line. Use Microsoft Dynamics 365 for Sales along with LinkedIn Sales Navigator to help sellers identify future customers and suggest ways to engage with them. **Claims based on a 2017 study by Nucleus Research that analyzed more than 50 ROI case studies on CRM deployments from 2015 to 2017. Companies ranged in size from small and medium-sized businesses to large multinational enterprises. Re
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
The 2017 study, The Total Economic Impact™ of Microsoft Azure IaaS, gives insight into both the costs and benefits of large-scale Azure infrastructure as a service (IaaS) implementation. This commissioned study conducted by Forrester Consulting analyzes the return on investment and business impact that several enterprises experienced when moving from a primarily on-premises environment to Azure. The companies interviewed come from a variety of industries and locations (global/multinational, North American, and European). In addition to a 435 percent overall return on an Azure IaaS investment*, the businesses also experienced: Reduced data center and outsourcing costs. Website scale and performance improvements. Ease of experimentation through virtualized environments. Developer and tester improvements. Download the study to learn about the potential ROI that could be realized by shifting some or all of your management and operations to Azure.
Tags : 
    
Microsoft Azure
Published By: Cherwell Software     Published Date: Apr 12, 2019
Info-Tech’s Category Reports provide a comprehensive evaluation of popular products in the IT Service Management market. This buyer’s guide is designed to help prospective purchasers make better decisions by leveraging the experiences of real users. The data in this report is collected from real end users, meticulously verified for veracity, exhaustively analyzed, and visualized in easy to understand charts and graphs. Each product is compared and contrasted with all other vendors in their category to create a holistic, unbiased view of the product landscape. Use this report to determine which product is right for your organization. For highly detailed reports on individual products, see Info-Tech’s Product Scorecard.
Tags : 
    
Cherwell Software
Published By: EvolveIP     Published Date: Sep 15, 2015
Evolve IP has created an easy-to-use, comprehensive financial tool designed to estimate the costs of purchasing, installing, maintaining, and administering an on-premise PBX deployment – not just upfront, but over five years. When completed, the tool gives you the ability to analyze your decision from a cost perspective.
Tags : 
evolve ip, ownership calculator, pbx deployment, cost perspective, financial tool
    
EvolveIP
Published By: AWS     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
AWS
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analyst’s findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: • How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster • How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
    
CrowdStrike
Published By: Fitbit     Published Date: Mar 16, 2017
In a three-year retrospective study that analyzed health care claims and wearable device data from a self-insured employer, Springbuk looked at the potential impact of Fitbit technology as part of a wellness program. The analysis shows that connected health and fitness interventions can close the gap between the everyday actions that change health and drive outcomes for employee health and employer cost. Some of the key findings include: * Employees who opted into the Fitbit program demonstrated significant cost savings when compared to the control group. * Engaged users cost less than non-engaged users. * The opportunity for cost savings is potentially the highest with less active individuals.
Tags : 
    
Fitbit
Published By: Zebra Technologies     Published Date: Aug 09, 2018
The exponential growth of omnichannel shopping and ever-burgeoning demand for faster merchandise deliveries is redefining the supply chain’s distribution of consumer products goods. A seminal shift in how shoppers increasingly buy via multiple touch points — online from desktop computers, mobile devices and in-store — has created the need for the “smarter” warehouse to serve today’s connected consumer. As retailers look to merge their brick-and-mortar and online operations to cut costs and boost efficiency, warehouse management systems must keep pace. For this report, Zebra Technologies analyzed the state of the warehousing marketplace among firms in the US and Canada with at least $15 million in annual revenues. The online survey asked IT and operations personnel in the manufacturing, retail, transportation and wholesale market segments to share their insights and business plans over the next five years, in light of a rapidly changing industry.
Tags : 
fulfillment, vision, study, technology, manufacturer
    
Zebra Technologies
Published By: Epson     Published Date: Dec 18, 2017
When it comes to display technology today, businesses tend to invest in flat panel TVs without much thought. But visual communication is an important element essential for success. When a new product is unveiled to a room of editors, when engineers analyze a circuit board, or when a teacher attempts to bring a classroom subject to life, visuals are as powerful as the spoken word, if not more. This paper offers insight on the state of visual display to ensure you make the right decision on your next investment, whether it’s a replacement, revamp, or remodel. Learn how to use and maintain visual display technology to make the greatest positive impact on your organization with the highest return of investment.
Tags : 
display technology, visual communication, virtual display, projectors
    
Epson
Published By: 15five     Published Date: Jul 17, 2019
Learn best practices for choosing performance management software and advice for getting everyone at your company excited for this critical piece of HR Tech: • How to identify HR pain points • A list of sample questions for your Needs Assessment • Conducting your due diligence • A framework to analyze HR solution options • Six steps to gain executive buy-in
Tags : 
    
15five
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
Qualys
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance
    
Brainloop
Published By: VMware AirWatch     Published Date: May 19, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
mobile management, best practices, providers, vendors, enterprise
    
VMware AirWatch
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: