collect

Results 1 - 25 of 602Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
Defense and intelligence agencies want to leverage the data they collect so they can use artificial intelligence to enhance readiness – but most who run these programs don’t know how to get started and find it difficult to make the business case to their leadership. In this research report, created by GovLoop in partnership with IBM, which provides innovative technology solutions for national security and military intelligence, you’re going to learn where your peers stand—and some practical tips on how to get started—even if you think your data is “dirty” or not ready for advanced applications.
Tags : 
    
Group M_IBM Q2'19
Published By: PGi     Published Date: May 15, 2019
Whether it’s a webinar or webcast, an online event is one of the smartest ways to connect with your audience. But not all online events are created equal. As with anything in life, your results will only be as good as the tools you’re using. We’ve collected five of the most common problems people face when producing an event so you can be prepared to fix them (or better yet, avoid them in the first place!).
Tags : 
    
PGi
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Procore     Published Date: May 13, 2019
As the construction industry becomes more competitive, regulations increase and skilled labour becomes more selective; the one thing that will define your company from the competition is your data. The best companies use real, situational data in pre-task analyses daily to report on and improve their Quality, Safety and Productivity processes and performance. Download your copy to learn: • The importance of including quality, safety and productivity in your pre-task analyses • Using the three-part task-analysis approach • How to collect meaningful data to track performance
Tags : 
    
Procore
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 29, 2019
LTI’s REDaxis Solution has helped a Global CPG Major attain Improved Cash Collection and Accounts Receivable Productivity by Identifying opportunity areas and enabled workflow-driven approach. It also helped in DSO reduction, reduced TCO and more than 40% productivity improvement.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Amazon EC2 Reserved Instances can appear complicated, but finding a solution that best suits your company doesn't mean becoming an expert yourself; you just need to know how to approach Reserved Instances and where they can make the biggest impact. This free guide delivers a collection of proven best practices to help you successfully manage Amazon EC2 Reserved Instances. The benefits include: A breakdown of reservation types and offerings, including Convertible Reserved Instances How to calculate the payback period How to modify and exchange existing reservations to match cloud usage over time How to maximise savings with automated RI management and optimisation
Tags : 
    
CloudHealth by VMware
Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. Part of the confusion stems from the fact that AI is an umbrella term that covers a range of technologies — including machine learning, computer vision, natural language processing, deep learning, and more — that are in various stages of development and deployment. The use of AI for dynamic pricing and targeted marketing has been in use for a while, but actual AI computing where machines think like humans is still many years from becoming mainstream. T
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
The Cylance 2019 Threat Report represents the company’s piece of the overall cybersecurity puzzle. It details the trends observed and the insights gained, and the threats Cylance’s consulting team, research team, and customers encountered over the past year. Cylance shares this report in the hope that you will put it to good use in our collective fight against the rising tide of cyber attacks worldwide.
Tags : 
    
BlackBerry Cylance
Published By: Oracle EMEA     Published Date: Apr 15, 2019
Forward-thinking enterprises understand what it takes to be successful in this data-rich, increasingly automated economy. According to the Harvard Business Review Analytic Services research report The Rise of Intelligent Automation: TurningComplexity into Profit, sponsored by Oracle, at least 7 in 10 executives understand that predictive analytics (80%) and AI and machine learning (68%) are important for the future of the business. Even as executives recognize the vital role data plays in their businesses, many are unable to take advantage of the value residing in their data. The old ways of collecting, managing, storing, and analyzing data are no longer effective, and are preventing businesses from extracting potential value. Many simply can’t execute on a data-driven vision.
Tags : 
    
Oracle EMEA
Published By: Cherwell Software     Published Date: Apr 12, 2019
Info-Tech’s Category Reports provide a comprehensive evaluation of popular products in the IT Service Management market. This buyer’s guide is designed to help prospective purchasers make better decisions by leveraging the experiences of real users. The data in this report is collected from real end users, meticulously verified for veracity, exhaustively analyzed, and visualized in easy to understand charts and graphs. Each product is compared and contrasted with all other vendors in their category to create a holistic, unbiased view of the product landscape. Use this report to determine which product is right for your organization. For highly detailed reports on individual products, see Info-Tech’s Product Scorecard.
Tags : 
    
Cherwell Software
Published By: VMware     Published Date: Apr 09, 2019
To help their business clients unleash innovation and support growth, IT teams need to evolve to a modern data center that is virtualized, software defined and automated, with a consistent operational model for infrastructure and application delivery. In this collection of case studies, we reveal how companies are building more agile, innovative businesses based on VMware solutions.
Tags : 
    
VMware
Published By: Intel     Published Date: Apr 09, 2019
The retail market is evolving with the incorporation of computer vision, advanced RFID solutions, and the ability to collect and analyze data at the edge.
Tags : 
    
Intel
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
    
Group M_IBM Q2'19
Published By: Gigamon     Published Date: Mar 26, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon
Published By: SAS     Published Date: Mar 20, 2019
Seeing value from analytics and emerging technologies such as AI begins with trust in the data. That trust relies on how data is collected, shared, protected and used. The annual Data and Analytics Global Executive Study with MIT Sloan Management Review looks at how 2,400 global business leaders make decisions based on analytics insights – and what steps are needed to get trustworthy data.
Tags : 
    
SAS
Published By: HSBC     Published Date: Feb 27, 2019
So, you want to take your company global? For many organizations, forward growth means international expansion. While you may recognize the need for this growth, making it happen is another matter. In order to expand into new markets, you’ll need to identify your growth strategy, navigate unclear rules and regulations, understand cultural differences, and so much more. There are many complex considerations when growing your business globally – many of which you didn’t need to address in order to grow domestically. ____ The materials contained in this website are not intended for audiences located outside of the United States. This site does not intend to collect personal information about persons located outside the US and no marketing or services are directed at individuals located in the European Union. Content is Sponsored by HSBC
Tags : 
    
HSBC
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0’s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: • Automatic call distributors (ACDs) • Outbound dialers • Multi-channel routing platforms • Back-office employee desktops Download today to learn more.
Tags : 
    
Nice Systems
Published By: Gigamon EMEA     Published Date: Feb 20, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon EMEA
Published By: TIBCO Software APAC     Published Date: Feb 14, 2019
Tips and best practices for data analytics executives Organizations today understand the value to be derived from arguably their greatest asset—data. When successfully aggregated and analyzed, data can unlock valuable insights, solve problems, improve products and services, and help companies gain a competitive edge. However, analytics executives face significant challenges in collecting, validating and analyzing data to deliver the right analytic insight to the right person at the right time. This e-book is designed to help. First, we'll explore the growing expectations for data analytics and the rise of the analytics executive. Then we'll explore a range of specific challenges those executives face, including those around data blending, analytics, and the organization itself, and offer best practices and strategies for meeting them.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Feb 14, 2019
Tips and best practices for data analytics executives Organizations today understand the value to be derived from arguably their greatest asset—data. When successfully aggregated and analyzed, data can unlock valuable insights, solve problems, improve products and services, and help companies gain a competitive edge. However, analytics executives face significant challenges in collecting, validating and analyzing data to deliver the right analytic insight to the right person at the right time. This e-book is designed to help. First, we'll explore the growing expectations for data analytics and the rise of the analytics executive. Then we'll explore a range of specific challenges those executives face, including those around data blending, analytics, and the organization itself, and offer best practices and strategies for meeting them. We'll also provide a short overview of TIBCO Statistica, an easy-to-use predictive analytics software solution designed to turn big data into your bigg
Tags : 
    
TIBCO Software APAC
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Amazon EC2 Reserved Instances can appear complicated, but finding a solution that best suits your company doesn't mean becoming an expert yourself; you just need to know how to approach Reserved Instances and where they can make the biggest impact. This free guide delivers a collection of proven best practices to help you successfully manage Amazon EC2 Reserved Instances. The benefits include: -A breakdown of reservation types and offerings, including Convertible Reserved Instances -How to calculate the payback period -How to modify and exchange existing reservations to match cloud usage over time -How to maximize savings with automated RI management and optimization
Tags : 
cloud management, amazon web services, multicloud management, amazon ec2
    
CloudHealth by VMware
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: