reports

Results 251 - 275 of 325Sort Results By: Published Date | Title | Company Name
By: HP Enterprise System     Published Date: Apr 03, 2014
SAP HANA Operational Reporting Rapid-Deployment Solution: Ensure optimal performance while providing finance, sales, purchasing, shipping, and master data reports using SAP in-memory technology.
Tags : sap hana, as a service solution, solutions, cost effective, operational management, accelerate value, enterprise applications, data management
     HP Enterprise System
By: Mentor Graphics     Published Date: Oct 08, 2014
This paper reports on common layout requirements related to SERDES designs, and how HyperLynx DRC can help identify issues on PCB boards that violate these requirements.
Tags : mentor graphics, boards, serdes, pcb boards, drc
     Mentor Graphics
By: Readdle     Published Date: Feb 02, 2015
Does your work enviornment look anything like that of the popular TV sitcom The Office? Probably not. If your company is like most businesses, it’s highly unlikely you see coworkers regularly communicating face to face. And there’s a good chance those type of meetings will continue to decline, according to the latest statistics. The mobility trend has been accelerating in just the past few years. By the end of 2015, 38 percent of the world’s workforce will be mobile. That’s up 65% since 2011, reports Forrester Research. So what have you been doing to help your company adjust to this evolving workplace? If your answer is “not much” or “a few tweaks here and there,” you could be missing out on significant opportunities to generate efficiencies that could impact your company’s bottom line. Today, more companies are discovering that email, file sharing and other traditional methods of collaborating and completing tasks just don't cut it - especially with employees who are accustomed to
Tags : mobility, evolving workplace, generate efficiencies, collaboration, enterprise applications
     Readdle
By: Arena Solutions     Published Date: Mar 28, 2017
This white paper reports on how new innovations are helping accelerate new product introductions, improving collaboration with outsourced partners and suppliers, and enabling organizations to achieve compliance with confidence.
Tags : arena solutions, arena, bill of materials, bom, product innovation, manufacturing, collaboration
     Arena Solutions
By: Cisco     Published Date: Feb 16, 2016
While the companion comparative reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this individual test report provides detailed information not available elsewhere.
Tags : cisco, breach detection, system test, data security, threat, security
     Cisco
By: IBM     Published Date: Apr 07, 2015
Daptiv upgraded to IBM® Cognos® Business Intelligence 10.2. By combining Cognos Lifecycle Manager with custom-built tools, Daptiv successfully migrated over 30,000 reports to the new version with no disruption for its 500-plus clients.
Tags : ibm, daptiv, project portfolio management, analytics, cloud computing, saas
     IBM
By: HubSpot, Inc.     Published Date: May 19, 2010
MarketingSherpa has compiled 25 marketing lessons based on independent research featured in MarketingSherpa's Benchmark Reports. You have questions - get the answers.
Tags : hubspot, search, sem, search engine marketing, marketing sherpa, email lists, lead generation, demand generation, sales process, social media
     HubSpot, Inc.
By: SAS     Published Date: Apr 25, 2017
But if you can’t explain how you got the answer, or what it means, it’s no good. Most self-service BI solutions can only display what has already happened, through reports or dashboards. And most have a predefined path of analysis that gives users very little creative freedom to explore new lines of thought. To maintain competitive advantage, your BI solution should allow business users to quickly and easily investigate and interrogate the data to find out why something happened – to uncover the root cause behind the “what.”
Tags : 
     SAS
By: SAS     Published Date: Apr 25, 2017
If you’re in the data world, you know it’s full of discord. Multiple data sources, inconsistent standards and definitions, inaccurate reports and a lack of governance are enough to derail any organization. What’s an enterprise architect to do? With the right data governance and master data management (MDM) solution, you can set and enforce policies and establish a consistent view of your data without micromanaging it. You can eliminate duplicate and inconsistent data. You can combine traditional data and new big data sources – like streaming data from the IoT – into one harmonious view. Read this e-book for expert advice and case studies that will show you new ways to manage your big data – and make sure everyone’s on the same page.
Tags : 
     SAS
By: SAS     Published Date: Oct 18, 2017
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
     SAS
By: IntelliCorp     Published Date: Feb 12, 2015
Learn the basics of how to create a comprehensive and compliant background screening program that can help your organization reduce risk and promote a safe work environment.
Tags : background checks, background screening, employment background check, employment verification, criminal background check, education verification, drug testing, employment screening, volunteer screening, credit reports, e-verify, motor vehicle reports, fcra
     IntelliCorp
By: Oracle     Published Date: Nov 01, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
     Oracle
By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : comparitive analysis, datacenter, social, analytics, security, data management
     Cisco
By: HP     Published Date: Apr 13, 2014
Read how Specsavers reduces the time from test creation to test execution by 50% and cuts the time required for producing quality reports from 3 hours to 10 minutes a day through automated application lifecycle management.
Tags : hp agile manager, hp application, hp software tools, it case study, lifecycle intelligence, lifecycle management, specsavers, alm, agile, it management
     HP
By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : alienvault, pci dss reporting, pci dss compliance, it management
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: IBM     Published Date: Oct 22, 2013
Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in the technology marketplace. This report notes that "IBM offers a comprehensive suite of products aimed at testing the most demanding and complex apps." For more, download the report today.
Tags : ibm, info-tech, quality management, test champion report, microsoft, parasoft, software testing, vendor selection, market share, vendor landscape, infrastructure testing, future changes, development platform toolset, leveraging tool, testing functionality, product selection, vendor selection, information gathering, software testing solutions
     IBM
By: IBM     Published Date: Jan 10, 2014
Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in the technology marketplace. This report notes that "IBM offers a comprehensive suite of products aimed at testing the most demanding and complex apps." For more, download the report today.
Tags : ibm, info-tech, rational quality manager, quality management, integration, automation, software, virtualization, software development, it management
     IBM
By: Backupify     Published Date: Jul 15, 2013
The data that resides within Salesforce.com is arguably some of an organization’s most valuable data for all current and future revenue – including contacts, purchase history, lead information, reports on prospects, sales quotes, signed contracts, and customer invoices. Salesforce has a robust data center and the infrastructure to protect your data from hardware failure, even on a catastrophic scale. However, it does not protect you from user error or data being overwritten.
Tags : roi, salesforce, backup, calculate, data center
     Backupify
By: Marketo     Published Date: Jul 25, 2016
To get the metrics that matter most, download The Essential 8 Marketing Reports. Inside you'll find: -The key high level metrics to track as you run reports -When to examine programs over time -Our 8 most essential reports, from top-funnel lead analysis to complex opportunity
Tags : marketo, marketing, marketers, reporting, analytics, metrics, leads, lead analysis
     Marketo
By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : hackers, information technology, symantec, verisign, web applications, security
     Symantec
By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
     Symantec
By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
     AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com