> Home

information

Results 1 - 25 of 3281Sort Results By: Published Date | Title | Company Name
Published By: NTT Data APAC     Published Date: Jan 16, 2019
NTT Data services has over 600+ BI experts and over 250+ implementations in India, receiving high accolades from Gartner and AMR research. NTT Data Services offers Industry focused offerings and pre-configured models. Some of our offerings include: - Guided Analytics Strategy - Proven Framework & Methodology for ĎCí level executives - Solution lab for Co-Innovation and Proof of Concepts - Advisory Services - BI Transformations, Big Data Strategy, Information Governance, Health Checks - Proprietary Tools & Accelerators Ė System Optimization, Architect to Archive, User Adoption - Flexible Delivery - Rapid Development Factory, Shared Services Find more details in this deck.
Tags : 
    
NTT Data APAC
Published By: Google     Published Date: Dec 03, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Workday     Published Date: Mar 02, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
cloud-based system, data analytics, real time
    
Workday
Published By: Lucidchart     Published Date: Nov 28, 2018
Does it take forever for your sales team to close deals? Thereís a potential roadblock you may have missed: your internal sales communication. Take a look aroundónew sales reps are overwhelmed with processes and messaging during onboarding, your sales reps donít pass discovery information off to sales engineers or customer support, and you arenít always sure where deals stand, which makes it rather difficult to predict pipeline. If the members of your org arenít completely aligned, you canít take a prospect across the finish line or keep the org running smoothly. Download this eBook to see how visuals can solve these communication breakdowns and align your sales organization to close bigger and faster.
Tags : 
    
Lucidchart
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
We are renegades and realists who blend strategy, technology and creativity to tackle every client challenge. We imagine the businesses that will shape tomorrowís world and help our clients make them real. We uncover insights from data that others canít see and deliver progressive ideas through the use of IBM Design Thinking. We ground every strategy with a focus on delivering the ultimate experience Ė for customers, for employees, for shareholders. Everything we do drives measurable impact at scale. For more information, visit ibm.com/ibmix
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Car-sharing, ride-sharing and ride-hailing arenít new. Uber and other personal mobility services have redefined how people move from place to place. And now these services are beginning to redefine traditional car ownership itself. As people move from one vehicle to another, their personal information and preferences need to follow them, so the car they use feels like their own. Blockchain is defined as a shared, immutable ledger, and it can address many of the challenges that new types of personal mobility present.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
The discipline of data quality assurance ensures that data is "fit for purpose" in the context of existing business operations, analytics and emerging digital business scenarios. It covers much more than just technology. It includes program management, roles, organizational structures, use cases and processes (such as those for monitoring, reporting and remediating data quality issues). It is also linked to broader initiatives in the field of enterprise information management (EIM), including information governance and master data management (MDM)
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Jan 10, 2019
It is breathing life into our existing energy resources and creating new opportunities. Better use of data has visible, tangible and immediate results. It is helping energy companies become safer, more reliable and more efficient. This is good for both our wallets and our planet. For more information visit: www.ibm.com/energy or watch our webinar here
Tags : 
    
Group M_IBM Q119
Published By: Epicor     Published Date: Jan 09, 2019
The plan is to move what you currently have onto a platform that gives you new capabilities to better support your transformation goals. Aberdeen Group has found that those who stay up to date with their ERP are, for example, almost three times as likely to have mobile ERP functionality, twice as likely to have integrated ERP and eCommerce, and five times more likely to have social business capabilities.1 Is it time for you to take the next step on your journey by moving to the Epicor ERP system? Consider these questions: XX How much time and money could your business save by eliminating inefficient processes, increasing worker productivity, and improving customer service? XX What goals can you achieve when your core software is integrated with Industry 4 .0 technologies to support the factory of the future? XX What would your business look like if you had real-time information to make informed business decisions that drive growth and profitability?
Tags : 
    
Epicor
Published By: Forcepoint     Published Date: Jan 03, 2019
How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizationís traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services. Read the eBook to find out the five information security lessons learned from transitioning to the cloud.
Tags : 
data security, cloud security, digital transformation, email security, cyber security, secure web gateway, web proxy, ngfw, next generation firewall, forcepoint, distributed offices, distributed network, firewall, swg, cloud web protection, cloud migration, cloud applications
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizationís traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services. Read the eBook to find out the five information security lessons learned from transitioning to the cloud.
Tags : 
data security, cloud security, digital transformation, email security, cyber security, secure web gateway, web proxy, ngfw, next generation firewall, forcepoint, distributed offices, distributed network, firewall, swg, cloud web protection, cloud migration, cloud applications
    
Forcepoint
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, infrastructure, load balancing, servers, storage virtualization, green computing
    
Coyote Point Systems
Published By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Oktaís mailing list at any time, by following this process. Additional details about Oktaís privacy practices are available in our Privacy policy.
Tags : 
    
Okta APAC
Published By: MuleSoft     Published Date: Nov 27, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability and shared service models as a means towards increasing IT delivery capacity. But those approaches are easier talked about than executed. As agencies embark on legacy modernization, it becomes imperative to open up the existing technology so that new innovations can be delivered as needed in a secure way. In this guide, produced in partnership with Govloop, we will discuss A five-play roadmap to help those in government get a better sense of where to start on modernization projects. An overview of the Information Technology Modernization Fund (ITMF). Featured government success stories highlighting their modernization projects. The IT Modernization Lifecycle, based on the recent report by the American Council for Technology-Industry Advisory Council.
Tags : 
    
MuleSoft
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Attivio     Published Date: Aug 20, 2010
With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob, business intelligence, database development, data protection, data quality, data warehousing
    
Attivio
Published By: Attivio     Published Date: Aug 20, 2010
Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob, database development, data protection, data warehousing
    
Attivio
Published By: SAP     Published Date: Feb 05, 2011
Learn how best-in-class companies access information faster to improve key business performance metrics.
Tags : 
business performance, sap, real time analytics, business intelligence, analytics, business analytics, business process management, analytical applications
    
SAP
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application integration, application performance management, business activity monitoring, business process automation, business process management, analytical applications
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 20, 2009
Managing service delivery in todayŪs complex and dynamic business environments demands new and different approaches from IT. The explosive growth and the rate of change of information has brought particularly daunting challenges for IT that have contributed to incredibly complex underlying infrastructures. To get a true picture of all of the components necessary to support an IT or Business Service, you must access and bring together data that resides in disparate data silos throughout the enterprise.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application performance management, business activity monitoring, business intelligence, business management, business process automation, enterprise resource planning
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 29, 2008
Aligning IT and business perspectives requires the ability to create links between configuration information in the CMDB and the business service as experienced by the user. Service Dependency Mapping (SDM) products automate the process of creating and maintaining these links.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration, business activity monitoring, business analytics, business integration, business intelligence
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Dec 09, 2008
Generally, CMDBs populated by discovery tools alone simply aren't usable. They fail because they contain massive amounts of irrelevant information. You avoid this pitfall by correctly populating your CMDB in four simple steps.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application performance management, best practices, business activity monitoring
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration, application performance management, best practices
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 07, 2009
Application Portfolio Optimization (APO) provides executives with tools and information to assess the quality and condition of application assets as well as a means for understanding the impact of proposed application changes.
Tags : 
asg, cmdb, bsm, itil, bsm, portfolio optimization, apo, mining tools, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Home