RecruitingBlogscom

Follow Us:

 

data landscape

Results 101 - 125 of 140Sort Results By: Published Date | Title | Company Name
Published By: Skillsoft     Published Date: Mar 03, 2015
This paper examines how the role of the CIO has been evolving to meet today’s new world of IT.
Tags : 
skillsoft, cio, role, shift, workplace, business, management, skills
    
Skillsoft
Published By: MarkLogic     Published Date: Nov 30, 2017
The OPDBMS market in 2017 brings cloud and fully managed options center stage for execution. Market-defining vision includes features for machine learning, serverless scenarios and streaming integration. Data and analytics leaders must balance current and future needs against this market landscape.
Tags : 
    
MarkLogic
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.
Published By: Bazaarvoice     Published Date: Nov 05, 2014
To compete in the new environment of always connected, highly informed consumers, retailers need to leverage five trends to realize higher conversions and larger transaction sizes. Find out how you can apply these 5 trends to your business.
Tags : 
bazaarvoice, retail trends, consumer trends, ecommerce, retailers, reail tips, integration, social
    
Bazaarvoice
Published By: Lumension     Published Date: Jun 05, 2015
Lumension’s fourth-annual survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.
Tags : 
data protection, threats, security landscape, shifting data, data maturity
    
Lumension
Published By: Mintigo     Published Date: Nov 20, 2017
Lead scoring models were put in place to prioritize leads for follow-up, nurture and marketing investment. However, with guesswork and data coming from disparate sources, traditional lead scoring has a host of limitations. In today’s competitive landscape, organizations needs to embrace more advanced and reliable scoring models to succeed. Read this ebook to learn 4 reasons why traditional lead scoring is not adequate, and why scoring with AI is necessary.
Tags : 
    
Mintigo
Published By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS Inc.
Published By: Arcserve     Published Date: Apr 22, 2015
We’ll walk you through the driving forces behind these rapidly evolving data protection architectures, the trends you’ll want to be keeping an eye on, what we should all demand of next generation architectures, and the state of the current market landscape.
Tags : 
network architecture, security, backup, disaster recovery, data loss
    
Arcserve
Published By: Arcserve     Published Date: Jul 15, 2015
We’ll walk you through the driving forces behind these rapidly evolving data protection architectures, the trends you’ll want to be keeping an eye on, what we should all demand of next generation architectures, and the state of the current market landscape.
Tags : 
    
Arcserve
Published By: SAS     Published Date: Mar 14, 2014
This paper will discuss the barriers to data-driven decision making for midsized businesses, and how experts and non-experts alike can use SAS Visual Analytics to unlock the value of data – including big data – to increase revenue, cut operational costs and better manage their business.
Tags : 
sas, bottom line, midsized businesses, leveraging data, data management, internal and external, decision making, big data
    
SAS
Published By: Dell Software     Published Date: May 28, 2013
If your IT isn’t 100% virtualized, you’re stuck managing backups both for virtual and physical. So how do you balance ease-of-use with staying ahead of the curve? We drew upon the best research to help you find the optimal solution for your organization: Vendor Landscape: Virtual Backup Software.
Tags : 
dell quest, data backup, virtual backup, backup software, vendor landscape
    
Dell Software
Published By: QTS Data Centers     Published Date: Feb 17, 2017
As businesses and agencies face increasingly complex security requirements, it makes less and less sense for these organizations to invest resources in the operation and management of their own data centers. Enterprises are leaving the data center business, opting instead to seek a partner for their data center, colocation and cloud needs.
Tags : 
    
QTS Data Centers
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Over 90% of organizations believe that the GDPR will impact the way they collect, use and process personal data. It’s one of the biggest changes to hit the digital privacy landscape in 20 years. And, in May 2018, the EU General Data Protection Regulation (GDPR) will introduce maximum fines of €20 million for non-compliance.
Tags : 
digital privacy, data protection, gdpr, organization optimization, technical challenges, data regulation, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
networks, ibm, redefining networks, cloud, analytics, mobile, social, security
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
ibm, network, cloud, analytics, mobile, social, big data, it security
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi, security
    
IBM
Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
This commissioned study conducted by Forrester Consulting evaluates the state of enterprises’ data privacy compliance in a shifting regulatory landscape. The survey of 218 global enterprise decision makers with responsibility over privacy or data protection analyzed how they are evolving to meet the heightened data protection and privacy expectations of legislators and consumers, along with the benefits they can expect from a holistic data privacy approach.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco
Published By: SAS     Published Date: Aug 28, 2018
With the widespread adoption of predictive analytics, organizations have a number of solutions at their fingertips. From machine learning capabilities to open platform architectures, the resources available to innovate with growing amounts of data are vast. In this TDWI Navigator Report for Predictive Analytics, researcher Fern Halper outlines market opportunities, challenges, forces, status and landscape to help organizations adopt technology for managing and using their data. As highlighted in this report, TDWI shares some key differentiators for SAS, including the breadth and depth of functionality when it comes to advanced analytics that supports multiple personas including executives, IT, data scientists and developers.
Tags : 
    
SAS
Published By: IBM     Published Date: Oct 15, 2013
Understanding customer behavior can be as inscrutable as a foreign language unless you use analytics to decipher it.
Tags : 
ibm enterprise marketing management, emm, predictive analytics, visual exploration, likes and dislikes, collecting customer data, monitor customer behavior, understanding individuals
    
IBM
Published By: Nexsan by Imation     Published Date: May 11, 2015
It is an inescapable fact that massive, relentless data growth now defines the IT landscape for organizations of all sizes.
Tags : 
nexsan, imation, data growth, data protection, massive data, dig data, secure storage
    
Nexsan by Imation
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS, Inc.
Published By: Symantec     Published Date: Jun 10, 2014
This Lab Validation report from ESG provides you with best practices to create an environment that offers you simple unified data protection across physical and virtual landscapes, maximum protection and data availability, and reduced storage needs and operational costs. Find out how Symantec Backup Exec 2014 measures up against best practices in virtual data protection. Download Now.
Tags : 
symantec, esg, virtual machine back up, lab validation, protection, data availability, storage, operational costs
    
Symantec
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top