Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

analysis

Results 51 - 75 of 1365Sort Results By: Published Date | Title | Company Name
Published By: Pega     Published Date: May 25, 2016
Adapting to changing market dynamics is not easy for any enterprise-class organization. To stay competitive, companies not only must adapt different go to market and customer service strategies but also embrace internal business process and workflow changes, which in many cases can be more difficult. Enter Intelligent Business Process Management Suites (iBPMS). According to Gartner, iBPMS compress the observation-to-action-to-outcome cycle, and help business transformation leaders, business process directors and solution architects establish a fluid capability to handle big change. Gartner evaluated 15 iBPMS vendors including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding evolving iBPMS market and the solutions offered by each iBPMS vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, enterprise management
    
Pega
Published By: Pega     Published Date: May 25, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding each vendors’ CRM Customer Engagement Center solutions.
Tags : 
best practices, customer support, business intelligence, business optimization, customer engaement
    
Pega
Published By: Pega     Published Date: May 25, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases. Download this Gartner analysis and gain a better understanding of the case management frameworks solutions offe
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, case management
    
Pega
Published By: Adobe     Published Date: Nov 09, 2017
Analysis of 55 million product SKUs. Aggregated and anonymous data from more than one trillion visits to 4,500 retail websites. Billions of data points flowing through Adobe Experience Cloud. It’s no wonder our holiday shopping predictions are the most comprehensive and accurate in the industry. View the report, Adobe Digital Insights 2017 Holiday Shopping Predictions, and learn: Total forecasted online holiday revenue, broken down by day and device Top gifts on consumers’ wish lists this holiday season Best days for buying based on discounts and out-of-stock risks
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
Patients are going digital — and taking the healthcare system with them. Learn how in the 2017 Digital Trends in Healthcare and Pharma report. Download it now to learn: Why two-thirds of healthcare companies are investing in data analysis. How they’re building content marketing programs to boost patient knowledge. What they plan to do with virtual and augmented reality this year and beyond.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
Adobe article that condenses/highlights key findings from the Econsultancy Digital Marketing in the Financial Services and Insurance Sector 2017 Study, an in-depth, 5000+ word report covering FSI executives’ opinions on: – General trends in retail banking, investment banking, and insurance – Internal structures their companies are using to execute digital transformation – The biggest threats/disruptions in the industry – The biggest priorities in 2017 (leaders are focusing on both customer retention and customer acquisition, mainstream is focusing just on customer retention) – Main sources of sales and leads (digital + mobile are steadily increasing sources) – Digital marketing budgets & investment areas (leaders are investing more in digital marketing automation and analytics) – Use of the cloud and AI to automate analysis and marketing – The importance of multichannel personalization – Innovation in the types/formats of products/services provided (leaders are focusing on i
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
With the growing size and importance of information stored in today’s databases, accessing and using the right information at the right time has become increasingly critical. Real-time access and analysis of operational data is key to making faster and better business decisions, providing enterprises with unique competitive advantages. Running analytics on operational data has been difficult because operational data is stored in row format, which is best for online transaction processing (OLTP) databases, while storing data in column format is much better for analytics processing. Therefore, companies normally have both an operational database with data in row format and a separate data warehouse with data in column format, which leads to reliance on “stale data” for business decisions. With Oracle’s Database In-Memory and Oracle servers based on the SPARC S7 and SPARC M7 processors companies can now store data in memory in both row and data formats, and run analytics on their operatio
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle CX
Published By: Gigamon     Published Date: Oct 19, 2017
Download the Forrester Total Economic Impact™ of Gigamon: Cost Savings and Business Benefits Enabled by Gigamon to see how customers benefit from comprehensive and scalable visibility across their networks. This study delves into a cost-benefit analysis of the Gigamon security delivery platform, network visibility and traffic monitoring solutions that enable companies to see what matters in order to meet their security objectives, increase productivity and keep hardware, software and personnel costs in check without affecting performance.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 25, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Persicope Data     Published Date: Mar 07, 2018
Some brands are great at connecting with new audiences. They might have a killer marketing campaign, demonstrably fulfill a gap in the marketplace, or just have that certain “it factor.” Being able to get new customers on board can lead to fantastic short-term financial gains.
Tags : 
    
Persicope Data
Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
When running core workloads, consider hyper-converged infrastructure. Solutions like Dell EMC VxRail simplify operations and significantly reduce TCO. Recent research from Evaluator Group shows how VxRail compares to AWS On-Demand: Learn how to lower TCO with Evaluator Group’s full analysis
Tags : 
    
Dell EMC & Intel
Published By: IBM APAC     Published Date: Apr 27, 2018
To make the best treatment decisions, doctors at Memorial Hermann required rapid, reliable access to patients medical records and fast insight into changing health indicators. Deploying IBM FlashSystem, physicians at Memorial Hermann can now rapidly access healthcare information and perform sophisticated analysis to identify early signs of illness and take appropriate action for patients 99% faster.
Tags : 
    
IBM APAC
Published By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
    
Preempt
Published By: IBM APAC     Published Date: Nov 22, 2017
Glossary:Terms You Should Know Take your data analysis and deep learning expertise to the next level with these industry terms.
Tags : 
api, application, programming, interface, artificial intelligence, base, encoding, chrome
    
IBM APAC
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Akamai Technologies     Published Date: Dec 11, 2018
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8
Tags : 
    
Akamai Technologies
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Dell     Published Date: Aug 11, 2015
Read this report to learn discover the five key areas in which enterprise customers highly value a notebook vendor.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Nov 09, 2015
Download this whitepaper and learn how the Dell Genomic Data Analysis Platform can accelerate discovery and insights through optimized infrastructure and support.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 19, 2015
Read this whitepaper to learn how to make better credit worthiness decisions in less time.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper for: • An overview of how manufacturing can benefit from the big data technology stack • A high-level view of common big data pain points for manufacturers • A detailed analysis of big data technology for manufacturers • A view as to how manufacturers are going about big data adoption • A proven case study with: Omneo
Tags : 
    
Dell EMC
Published By: TIBCO Software     Published Date: Jan 17, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: What data virtualization is and its benefits When and when not to use data virtualization How to deploy data virtualization to benefit your business How to unlock the value of your SAP data
Tags : 
virtualization, data, users, analytics, sql, application, access, directory
    
TIBCO Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.