real time data

Results 301 - 325 of 337Sort Results By: Published Date | Title | Company Name
By: Rocket Fuel     Published Date: Mar 04, 2015
Remember back in the day when digital advertising was simple to understand? Like popping open the hood of a 1972 Ford, all the parts were simple and visible, and how they fit together was intuitive. It made sense. Now? Piecing together the modern digital advertising ecosystem is like trying to assemble a spaceship in your living room. But as Rocket Fuel Director of Artificial Intelligence Michael Benisch explains in our latest whitepaper, using advanced systems to buy media programmatically doesn't have to be overwhelming. Michael will take you "under the hood" of programmatic buying and walk you through the process of how and why a consumer sees the ads they see. Download the whitepaper and pop open the hood before choosing a programmatic partner.
Tags : programmatic, programmatic partner, digital advertising, programmatic advertising, online advertising, ad platform, digital marketing, ad network, media buying, real-time bidding, digital media buys, big data, artificial intelligence, programmatic media buying, always-on marketing, dsp, big data marketing, optimize advertising performance, fixed-price bid models, marketing roi
     Rocket Fuel
By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag, web logs, log files, server logs, server log files, log-file analysis, web metrics, on demand reporting, real time data, real-time reporting, data collection, statistics analysis, business metrics
     VisiStat
By: NetSuite     Published Date: Mar 09, 2007
This exclusive Yankee Group White Paper reveals and examines how mid-size businesses can now build a real-time enterprises and leverage real-time information. Learn how to reduce scattered information and silo databases that prevent your enterprise from achieving operational excellence.
Tags : crm, netsuite, erp, real time enterprise, mid-size businesses, silo database, customer relationship management, enterprise resource planning, netsuite, it management, enterprise applications
     NetSuite
By: Xiotech     Published Date: Apr 13, 2007
Well-publicized disasters highlight the need for an effective and timely data recovery solution. While current tape and disk backup provide some peace of mind, they do not keep up with the demands placed on your business. You cannot afford to wait hours (or days) to recover your critical applications and data.
Tags : disaster recovery, disaster plan, data backup, backup and recovery, data recovery, disk backup, tape backup, offsite storage, data protection, continuous data protection, xiotech, storage
     Xiotech
By: XLink Technology Inc.     Published Date: Jan 15, 2007
XLink ClusterReplica Enterprise software, based on CDP technology, combines conventional High Availability solutions and Microsoft DPM-like functions to create the next generation of business continuity software. ClusterReplica ENT offers real-time data replication and auto failover for MSSQL, IIS Web Server and File Servers.
Tags : servers, data protection, windows server, high availability, data replication, disaster recovery, business continuity, xlink, xlink technology
     XLink Technology Inc.
By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance, supply chain technology, wireless technology, wireless technologies, peak, peak technologies
     PEAK Technologies, Inc.
By: HP - Enterprise     Published Date: Jun 05, 2013
In today’s mobile world, the user is at the center of the application experience. This is true whether the user is a customer, a partner, or an employee. Yet meeting the needs for the enterprise user poses particular challenges. Apps must work seamlessly across devices and screen sizes, enabling real-time collaboration, without sacrificing data security. This balance requires a mobile app development platform built for the unique demands of the enterprise.
Tags : applications, apps, mobile applications, mobile, user-driven, data security
     HP - Enterprise
By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : backup infrastructure, legacy systems, overload infrastructure, cloud, security, it management, data management
     Arcserve
By: Trillium Software     Published Date: Jun 06, 2011
The fourth Web seminar in the series is titled "Tips, Tools & Best Practices" which shows how you can learn to deliver high performance data quality in real-time.
Tags : trillium software, operational data quality, odq, performance management, real-time transactions, high performance data quality, business processes optimization, information integrity, reusable data quality, application optimization
     Trillium Software
By: IBM Corp     Published Date: Sep 23, 2011
ESG Lab Validation Report - Reducing Storage Capacity and Costs without Compromise. Even with the plethora of storage efficiency technologies-such as deduplication and thin provisioning-available in the market today, users have not been able to stem the growth. This ESG Lab report looks at how IBM Real-time Compression can be used to reduce the cost of storing primary file data without impacting performance. The results of hands-on testing of IBM Real-time Compression Appliances performed by ESG at an IBM facility is used to demonstrate the value of non-disruptive deployment, loss-less capacity savings, real-time performance, and non-stop high availability.
Tags : ibm, esg, lab validation, storage capacity, real-time compression, technology
     IBM Corp
By: ProcessPro Premier     Published Date: Jun 08, 2011
Integrated ERP can resolve the most critical manufacturing challenges.
Tags : inventory control, lot tracking, mrp, reporting, real-time, integrated data
     ProcessPro Premier
By: Urban Airship     Published Date: Jul 15, 2012
An analysis of the impact push notifications have on mobile application users. Based on real-time data collected from top push notification senders, the Index presents a snapshot on the impact of push messaging around the globe.
Tags : marketing, push marketing, publishers, consumers, marketing campaigns
     Urban Airship
By: Urban Airship     Published Date: Mar 15, 2013
An analysis of the impact that push notifications have on mobile application users, conducted by Urban Airship. Based on real-time data collected from the top push notification senders, the Index explores the impact of push messaging around the globe
Tags : marketing, push marketing, publishers, consumers, marketing campaigns
     Urban Airship
By: ExtraHop     Published Date: Jul 25, 2013
Worried about application performance in the cloud? Real-time analysis of wire data provides you with deterministic application response times and detailed L7 metrics. This white paper explains how you can get the visibility you need to manage P2V migrations and cloud performance.
Tags : it management, storage, data management, data center
     ExtraHop
By: ExtraHop     Published Date: Aug 19, 2013
This white paper explains how IT organizations can harness the wealth of wire data flowing through their environments for real-time IT operational intelligence. Read how companies across a wide range of industries are analyzing wire data for more agile and proactive IT operations.
Tags : extrahop, operations, technology, wire data, intel, networking, enterprise applications
     ExtraHop
By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks, security
     IBM
By: IBM     Published Date: Nov 13, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : email capabilities, integration, social software, business operations, it management, enterprise applications
     IBM
By: Epicor     Published Date: Aug 24, 2018
Collecting actionable insight is key to making informed decisions about your LBM business. Epicor BisTrack provides eight LBM analysis tools that enable LBM dealers to grow and thrive, including flexible data analysis and reporting, customer stratification, and actionable, real-time data. Download the Tip Sheet to learn how else Epicor BisTrack can empower you to make sound decisions to grow margins, profits, and loyalty.
Tags : lumber, building materials, lbm, erp, bistrack, building materials distributors, lumber distributors, lumber manufacturers
     Epicor
By: eDataSource     Published Date: May 05, 2015
Looking to improve your email performance? Over 100 emailers achieved a 40 open rate for Mothers Day alone - Learn more...
Tags : edatasource, email tools, email performance, email subject line, real-time data, email competitive intelligence
     eDataSource
By: VMware AirWatch     Published Date: May 19, 2016
The economy isn’t standing still. For your business to succeed, your employees shouldn’t either. That’s why companies of all types are moving to empower their mobile workforce and engage with customers in innovative ways. To realize their potential, enterprises need to find ways to make a mobile workforce as productive when they’re away from the office and on their mobile devices as they are in the office. This means mobility systems must give users a seamless experience across the ever-expanding types of mobile devices employees use, for easy access to business-critical applications. At the same time, it must deliver a secure workspace that complies with security regulations, protects devices, plus guards business and customer data, from expanding security threats.
Tags : innovation, best practices, mobile device, security, mobile workforce
     VMware AirWatch
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: Akamai Technologies     Published Date: Nov 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
     Akamai Technologies
By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
     AWS
By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : security, big data, ibm, data protection
     IBM
By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : carbonite, doubletake, risk mitigation
     Carbonite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com