leveraging data

Results 151 - 169 of 169Sort Results By: Published Date | Title | Company Name
By: ProfitBricks     Published Date: Apr 01, 2013
The value of conventional on-premises servers is eroding. As with all decay, it starts slowly and declines steadily. Bits and pieces of the physical server market are peeling off as businesses turn away from conventional data center and IT closet deployments in favor of cloud-based infrastructure-as-a-service (IaaS). And there’s no shortage of IaaS; hosting and service-provider companies are flooding the market with low-cost access to hosted servers. The challenge for adopting businesses is leveraging hosted assets that guarantee data security and integrity with fine-grained levels of adjustable capacity, high performance and price predictability.
Tags : iaas, solution, cloud-based
     ProfitBricks
By: HP and Intel® Xeon® processors     Published Date: Feb 12, 2013
In this paper, we highlight the features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components, with a particular focus on the role that storage plays in the evolution of the data center.
Tags : datacenter, data center, architecture, virtualization, network, infrastructure
     HP and Intel® Xeon® processors
By: Optify     Published Date: Sep 13, 2012
Discover what visitor and lead intelligence details are available to B2B marketers, and how to use that info to help sales win more often.
Tags : website visitor intelligence, lead intelligence, lead generation, leveraging data, lead scoring, internet marketing
     Optify
By: IBM     Published Date: Aug 07, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threat detection.
Tags : ibm, threat detection, technology, data management, security, it security, networking, it management, data center
     IBM
By: SAP     Published Date: Jul 17, 2012
Striving for employees to be able to collect, update, and access data anytime anywhere, organizations are leveraging smartphones and tablets to extend HR data and processes, creating new thresholds of efficiency, decision-making, and competitive advantage. Read this research report for new insights and examples on how mobility is impacting enterprise applications, data and processes, with a particular focus on HR applications.
Tags : technology, white paper, employees, smartphones, tablets
     SAP
By: Bronto     Published Date: Jul 16, 2012
Email marketers should be leveraging the use of Recency, Frequency, Monetary (RFM) analysis to uncover optimal segments and untapped opportunities within their email marketing program. Email marketing provides real time data about subscriber behavior, which is ideal for RFM analysis. In order to use each metric fully we will focus on the undeniable power of Recency first.
Tags : bronto, marketing, email marketing, marketing campaigns, social media, customer
     Bronto
By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : ibm, threat detection, technology, security, security policy, risk management, vulnerability management
     IBM Software
By: Hacker Group, Inc.     Published Date: Jan 27, 2012
Finding your specific target has always been the real key to getting great results. Technology now allows marketers to create, maintain and learn from "big data" about their customers and prospects. This paper shows you how.
Tags : database marketing, marketing ideas, marketing plan, marketing tools, integrated marketing, marketing strategy, marketing campaign, strategic marketing
     Hacker Group, Inc.
By: IBM     Published Date: Nov 07, 2011
Truly understanding your customer means not just listening to what they tell you explicitly, but also interpreting their interactions and recognizing when something significant happens - or doesn't happen. SunTrust Bank has found that customers' transactional data can be a goldmine of information for use in targeted marketing efforts. Often marketers overlook this data because it's too voluminous to put into a customer database. Leveraging an event detection technology makes this data immediately actionable for you to start communicating with customers.
Tags : 
     IBM
By: IBM Software     Published Date: Oct 24, 2011
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
     IBM Software
By: EMC Backup & Recovery Solutions     Published Date: Feb 05, 2010
Read this IDC white paper to understand the various approaches to solving today's backup and recovery challenges leveraging deduplication. The paper discusses how to dramatically improve IT economics by optimizing network bandwidth, backup windows, and storage footprint requirements in distributed and datacenter locations alike.
Tags : emc, data domain, efficiency, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication
     EMC Backup & Recovery Solutions
By: IBM     Published Date: Nov 24, 2009
Server sprawl can divert valuable time and resources away from pursuing your core business goals. This white paper will show how System z can give you the visibility, control and automation your business needs to become more successful.
Tags : ibm tivoli, leveraging middleware, service management, system z, new enterprise data center, business continuity management, security, process automation
     IBM
By: IBM     Published Date: Nov 17, 2009
This paper provides an overview of what is required to create an environment to leverage information dynamically for innovation and competitive advantage.
Tags : content management, information management, data integration, ibm, li campaign, ibm li, leveraging information, data management
     IBM
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
     Trend Micro, Inc.
By: Trading Concepts     Published Date: Feb 24, 2009
Virtualization is a revolutionary technology that has emerged as one of the hottest trends in the IT segment. If you are not already leveraging the server virtualization wave as a means to deploy cost effective Disaster Recovery, then use this paper as a catalyst to transform your business today: virtualization enables greater efficiencies, faster application and data recovery, and overall cost savings.
Tags : inmage, dr scout, server virtualization, disaster recovery, continuous data protection, cdp, recovery point objectives, rpo, recovery time objectives, rto, vm infrastructure, data management
     Trading Concepts
By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's retail environment. From customer data to product placement statistics, retail organizations are constantly juggling information. As the sheer amount of data continues to grow, it becomes increasingly difficult to manage. Not only does data come in many different forms—such as reports, memos and e-mails—but often it’s scattered across multiple repositories.
Tags : ibm, ibm balanced warehouses, ibm master data management server, ibm omnifind, ibm industry data models, dynamic warehousing, retail buyer’s guide, leveraging data, customer data, product placement statistics, data management, scalable system, customer relationships, cross-sell, up-sell opportunities, db2 warehouse, oltp-based transactional data server, information management software, enterprise applications
     IBM
By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities, information on demand framework, ibm db2 warehouse, ibm master data management server, ibm omnifind, ibm industry data models, ibm balanced warehouses, oltp-based transactional data, enterprise applications
     IBM
By: Tidal Software     Published Date: Sep 03, 2008
With 50+ percent of all business processes leveraging batch operations, it is essential to keep your batch production running smoothly in order to keep your business running smoothly. Whether you are consolidating datacenter operations, moving apps to more cost-effective platforms, or transitioning from customized to packaged applications, learn how you can simplify and lower the cost of batch management with a single interface to all batch processes across platforms and applications and more.
Tags : datacenter consolidation, application consolidation, application standardization, tidal, tidal software
     Tidal Software
By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
     netForensics
Start   Previous    1 2 3 4 5 6 7     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com