people data

Results 176 - 200 of 244Sort Results By: Published Date | Title | Company Name
By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : location-based bi, business value, geographic enhancement
     SAP
By: IBM     Published Date: May 27, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : ibm, big data, insurance, insurance technology, big data solutions, business value, financial data, risk data, claims data, actuarial data
     IBM
By: SAS     Published Date: Mar 06, 2018
Machines learn by studying data to detect patterns or by applying known rules to: • Categorize or catalog like people or things • Predict likely outcomes or actions based on identified patterns • Identify hitherto unknown patterns and relationships • Detect anomalous or unexpected behaviors The processes machines use to learn are known as algorithms. Different algorithms learn in different ways. As new data regarding observed responses or changes to the environment are provided to the “machine” the algorithm’s performance improves. Thereby resulting in increasing “intelligence” over time.
Tags : 
     SAS
By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance
     Splunk
By: Symantec     Published Date: Sep 14, 2015
When organizations fail to integrate their people, processes, and technology, it hinders their ability to quickly detect and respond to an incident and keep it from becoming a data breach. The result? Increased risk for every security incident they face. The proposal? Execute a holistic approach that address the before, during, and after stages of a potential breach.
Tags : data breach, data security, increased risk
     Symantec
By: Cisco     Published Date: Sep 08, 2016
This white paper is a survey that was conducted on 150 people regarding data center security.
Tags : 
     Cisco
By: LeanData     Published Date: Oct 29, 2015
Leads mean everything to running a successful business. Managing those precious leads, though, also can be challenging. But LeanData has created a solution where leads always will get to the correct salespeople by automatically matching them to accounts with a speed and accuracy that’s impossible to duplicate manually at scale. This eBook explores the different ways that smart companies are using LeanData’s Router and Converter functions to get their leads to the right home so they can generate more pipeline and closed deals. The journey begins here.
Tags : 
     LeanData
By: IBM     Published Date: Jun 05, 2018
Keeping up with ever changing contract management work is challenging. Governing legal and procurement content is written by thousands of people and applied to hundreds of situations. To stay compliant, organizations employ knowledgeable professionals to analyze every sentence to determine the changes that need to be made to company contracts. The manual process of sifting through these dense, complicated documents is inefficient and prone to error. Watson Compare and Comply is trained on contract specific knowledge and classifications and can streamline contract workflows through semantic understanding. Join Director of Watson Offering Management, Adam Orentrichler, and Chief Data Scientist of SAP Ariba, David Herman, as they discuss how Watson can transform the way your company manages contract governance.
Tags : 
     IBM
By: Group M_IBM Q2'19     Published Date: May 21, 2019
ODM is the evolution of business rules management. It provides a complete, easy-to-use system for automating day-today operational decisions and allows businesspeople and IT to collaborate on business rules by using an interface and a language that are comfortable and intuitive for both. ODM not only allows you to automate your business rules, but also it enables you to apply insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. It ensures that you’re making the right decisions at the right time, when it can make a difference. What can this mean for your business? Adopting operational decision management can: • Improve customer centricity (acquisition and retention) by engaging individuals at the right time with the right offers
Tags : 
     Group M_IBM Q2'19
By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
     Cisco
By: InMage     Published Date: Feb 18, 2009
Replication has become a catchall phrase that while gaining in allure is also gaining in confusion – especially in the mid-tier where data is just as important as the high-end, but IT staffing and budgets are far more limited. IT people as well as vendors have a tendency to lump all data movement functions together as replication, regardless of the method or the reason.
Tags : inmage, esg, replication methodologies, replication applications, disaster recovery, recovery time objectives, rto, recovery point objectives, rpo, akamai model, remote backup consolidation, host based software, array based software, network based, hybrid methodologies, enterprise applications, data management
     InMage
By: SAS     Published Date: Dec 20, 2018
Think of the self-service things you use in a day. Gas pumps. ATMs. Online apps for shopping. They’re convenient and easy to use. People choose what they want, when they want – without involving others in their minute-to-minute decisions. What if your organization could treat data discovery and analytics the same way? SAS has combined two of its visual solutions to do just that. SAS Visual Analytics and SAS Visual Statistics share the same web-based interface to provide self-service data exploration and easy-to-use interactive predictive analytics in a collaborative environment. This white paper takes a look at this convergence and outlines how these products can be used together so that everyone, even nontechnical users, can investigate data on their own, create analytical models and uncover new insights that drive competitive differentiation. Your analytics journey just got a lot easier.
Tags : 
     SAS
By: HP-Intel®     Published Date: Jul 22, 2013
When it comes to IT risk, most people think in terms of disaster recovery and protecting critical patient data in the event of a natural disaster like a hurricane or an earthquake.
Tags : strategy guide, disaster recovery, healthcare, hp healthcare, off-site disaster recovery
     HP-Intel®
By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm
     Oracle
By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm
     Oracle
By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
     Oracle
By: IBM     Published Date: Feb 14, 2014
People, machines, data, processes are more connected than ever before, in more ways, and at a pace not previously envisioned. Because of this, the means of user interaction are evolving rapidly, and the outcome is an explosion of information increasing at epic rates. Both the opportunity and the challenge for an organization is to execute a strategy to most effectively participate in, exploit and derive ongoing value from the expansive digital world. To evaluate and ultimately better facilitate this, many organizations are specifically defining a digital strategy as part of their overall general business strategy. Central to that digital strategy is the digital experience.
Tags : ibm, social media, marketing, crm, customer interaction, digital marketing, digital strategy, customer experience, analytics, rich media, mobile marketing
     IBM
By: IBM     Published Date: Feb 14, 2014
A social business is an organization whose culture and systems encourage networks of people to create business value. Social businesses connect individuals, so they can rapidly share information, knowledge and ideas by having conversations and publishing informal content. They analyze social content from multiple channels and sources, in addition to structured data, to gain insights from both external and internal stakeholders. When those things happen, innovation and business execution rates increase, better decisions are made, and customers and employees are more engaged and satisfied. Social businesses enjoy lower operating costs, faster speed-to-market, improved customer and employee engagement, and increased profitability. Many organizations don’t fully appreciate the magnitude of the value creation potential of social business.
Tags : ibm, social business, marketing, social media, marketing management, analytics, marketing research, trends, customer interaction, customer service, crm, marketing software
     IBM
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
     Cisco
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
     Cisco
By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management
     Cisco
By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : riak, basho, telecommunications service provider, license fees, scalability, availability, data usage, big data, service operations system, networking, security, it management, data management
     Basho
By: Auth0     Published Date: May 16, 2016
When computers were mostly standalone systems, authentication (checking people are who they say they are) and authorization (allowing them access to specific information) codes, along with databases containing user information, were self-contained on the device. Even in the early days of the web, sites would handle security independently, using custom and proprietary code.
Tags : autho, industry identity, authentication, database information, custom and proprietary code, security
     Auth0
By: xMatters     Published Date: Feb 04, 2015
Staying on top of cutting-edge communication trends can be the difference in saving lives during a disaster or even preserving customer loyalty by notifying people during a major business interruption. Get the complimentary report written by industry expert Dr. Steven B. Goldman and learn the important trends you need to be aware of in 2015, including: • The increase in security budgets, as well as fines and lawsuits • The continuing rise in data breaches and malicious cyber attacks • The impact of social media on crisis preparations and response • Why natural disasters may be the least of your worries • And most importantly, how to survive the robot uprising!
Tags : security, budgets, disaster, business interruption, social media, data breaches, customer loyalty, communication trends
     xMatters
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To unlock the full potential of enterprise mobility, IT needs to allow people the freedom to access all their apps and data from any device, seamlessly and conveniently. White paper attached
Tags : citrix, mobility, security, data
     Citrix Systems, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com