data solutions

Results 626 - 650 of 990Sort Results By: Published Date | Title | Company Name
By: Ephesoft     Published Date: Jan 18, 2018
Insurance companies are intensely data and document driven. Learn how intelligent document capture solutions can help all types of insurance offerings improve customer service, process claims faster and create streamlined, efficient and profitable business practices.
Tags : insurance, solutions, ephesoft, data, customer service, claims, business, optimization
     Ephesoft
By: AI Business     Published Date: Mar 11, 2019
LOOK TO RELEVANT USE CASES FOR YOUR BUSINESS. While use cases vary across industries, the most common ones fall into these categories and are usually associated with the listed neural network: • Image classification or object detection: convolutional neural network (CNN) • Time-series predictions: long short-term memory (LSTM) • Natural language processing: recurrent neural network (RNN) • Unlabeled data classification and data labeling: autoencoder (AE) • Anomaly detection: autoencoder (AE) • Recommender systems: multilayer perceptron (MLP) Work with your deep learning talent or consultants to identify which use cases best match your organization and desired solutions. Then recreate a successful, already proven method.
Tags : 
     AI Business
By: Google - SAP     Published Date: Jun 20, 2019
Maximize go-to-market initiatives with SAP To succeed in today’s hypercompetitive environment, consumer products companies need greater speed and agility. See how SAP C/4HANA solutions can help you synchronize activities across your modern trade and direct-to-consumer efforts – and ultimately bring you closer to your consumers. Grow your brand and your market share with an intelligent strategy. The Crossover Effect: Positioning Consumer Products Companies for Growth Learn how SAP empowers consumer products companies to improve customer experience and leverage new types of data, digital capabilities, and success measures to drive growth. ? Join the Direct-to-Consumer Revolution Learn about how SAP Customer Experience solutions enable consumer products companies to get closer to the consumer than ever before. ? Henkel Drives Sales Innovation with SAP Trade Management Martin Reinicke of Henkel Beauty Care shares how the SAP Trade Management solution helps the company adapt to rapid m
Tags : 
     Google - SAP
By: HP     Published Date: Sep 06, 2010
HP Networking is a leading provider of converged infrastructure solutions, including networking. With its recently enhanced core and data center portfolio, HP has provided another proof point of its commitment to offering enterprise-class networking solutions. By bringing this new broader networking portfolio to market through HP's direct and indirect sales channels and combining it with HP service offerings, HP Networking has further strengthened its position as a global contender and provider to enterprises and major verticals.
Tags : 3com, roi, core, network, infrastructure, data center, portfolio
     HP
By: Sponsored by HP and Intel®     Published Date: Nov 05, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery.
Tags : dedupe, storeonce, deduplication, backup, data recovery, data management, data center
     Sponsored by HP and Intel®
By: CradlePoint     Published Date: May 17, 2016
The “consumerization” of healthcare and sweeping policy changes will require that healthcare providers become more competitive or risk being left behind. Gaining the competitive edge means finding scalable efficiencies, leveraging the wealth of available patient data for improved care, and figuring out how to meet (or sometimes treat) patients where they already are—whether that happens to be at work, at the mall, or on the street. While Machine to Machine (M2M) and Internet of Healthcare Things (IoHT) technologies promise to create massive efficiencies and a transformed patient experience, traditional wired connectivity solutions are often costly, difficult to deploy, and don’t offer the flexibility required for effective M2M and IoHT deployments.
Tags : 
     CradlePoint
By: Cumulus Networks     Published Date: Dec 30, 2016
By the year 2018, it is expected that over 25% of enterprise customers will adopt web-scale networking to build modern data centers. This rapid adoption can be attributed to businesses' increasing dependence on their data centers, while at the same time facing reduced IT budgets and limited staff to address their growing business needs. Fill out the form to download a TCO report on how organizations have saved an average of 45% on CapEx and approximately 74% on OpEx by adopting web-scale networking solutions from Cumulus Networks. You’ll learn how Cumulus modeled a real-life TCO calculator on the actual production path their customers took to build an agile, scalable, and cost-efficient data center.
Tags : 
     Cumulus Networks
By: Druva     Published Date: Jan 04, 2016
Endpoint backup has gone beyond simple backup/restore to a broader end-user data protection solution reducing various risks and increasing user productivity. This research helps I&O leaders evaluate enterprise endpoint backup solutions in two scenarios: cloud deployment and on-premises deployment.
Tags : enterprise, endpoints, backup, vendor comparison, cloud, on premise
     Druva
By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : marathon, downtime, everrun, server, failure, outage, windows, sql
     Marathon Technologies
By: Infogroup Targeting Solutions     Published Date: May 28, 2013
This paper is designed to help marketers learn how to identify patterns in data and use the data to effectively communicate with their customers.
Tags : multi-channel marketing, database marketing, retail marketing, data, analytics, strategy, consumer marketing, intelligence
     Infogroup Targeting Solutions
By: Box.net     Published Date: Jun 27, 2012
Continued data explosion is, for many organizations, the biggest challenge they must address. Companies must determine the most cost-effective technologies for storing data, yet also need to find solutions that enable employees to access information
Tags : cloud computing, storing data, cost-effective
     Box.net
By: Kronos     Published Date: Apr 15, 2015
Based on data from more than 200 organizations in Brandon Hall Group’s 2014 Workforce Management Study, this paper reviews the evolution of time and attendance, the impact of automation and integration, and the key role time and attendance solutions play in managing and measuring today’s workforce.
Tags : workforce management system, fully automated, cloud based, manufacturers, timekeeping, payroll, streamlining, manual processes
     Kronos
By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : spyware, trojan, virus, malware, web security, internet security, process software, process
     Process Software
By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
     Mimecast
By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage
     Mimecast
By: WebEx     Published Date: Apr 02, 2009
This white paper presents a simple two-step process to kicking the NetMeeting habit: 1. Admitting there is a problem by recognizing the symptoms. 2. Creating a recovery plan by finding new applications and implementing a new solution.
Tags : webex, web conferencing, netmeeting, firewalls, apis, asp, live meeting, itu-t t.120 data conferencing
     WebEx
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
By: NetApp     Published Date: Nov 01, 2009
This ESG paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs.
Tags : netapp, esg, storage efficiency, san environments, data storage infrastructure, data center, multiprotocol unified storage, data reduction
     NetApp
By: Arcserve     Published Date: Jun 11, 2014
Virtualization has without doubt enabled IT organizations to obtain maximum efficiency from their physical hardware, but virtualization has also increased the complexity these organizations have to manage, and that includes data protection. This paper discusses some of the hidden complexities virtualization introduces to backup and recovery requirements, and the challenges created when backup involves a combination of physical servers and virtual machines. It also discusses ways that backup and recovery processes can be simplified by avoiding point solutions.
Tags : arcserve, next generation architecture, data protection, data protection operations, metrics, security, it management
     Arcserve
Start   Previous    19 20 21 22 23 24 25 26 27 28 29 30 31 32 33    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com