Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

business information systems

Results 51 - 75 of 75Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: May 15, 2008
Read this white paper by Don Tapscott and explore the criteria best-in-class hospitals use for selecting business intelligence solutions. Companies that learn to effectively harness the information generated by their IT systems will enjoy substantial productivity improvements.
Tags : 
sap, business intelligence, healthcare sector, healthcare industry, bi applications, bi tools, inter-departmental processes
    
SAP
Published By: SAP     Published Date: Jun 23, 2009
Discover the importance of data integration in your environment, and learn about the key challenges, benefits, and approaches to integrating data.
Tags : 
business intelligence, data integration, sap, businessobjects, data warehousing, sarbanes-oxley, data consolidation, data marts
    
SAP
Published By: SAP     Published Date: Jun 27, 2009
Read this white paper by Don Tapscott and explore the criteria best-in-class retailers use for selecting business intelligence solutions. Companies that effectively harness the vast quantities of information that IT systems generate - both within the corporation and outside its walls - are poised to gain competitive advantage.
Tags : 
sap, business intelligence, it systems, price, promotion, markdown, businessobjects, rfid
    
SAP
Published By: SAP     Published Date: Nov 22, 2011
FreshDirect found it very challenging to get operational insights from its information systems. In order to improve, it was critical to FreshDirect that they select a BI technology that allows the company to measure and report on operational metrics across departmental applications without requiring the building of IT-intensive data marts. With this requirement as one of the key selection criteria, the company evaluated multiple vendors. Download this case study to learn more.
Tags : 
sap, businessobjects, business, technology, case study, freshdirect, bi technology, information systems
    
SAP
Published By: SAP Inc.     Published Date: Jul 28, 2009
While historically consumer packaged goods (CPG) organizations have made significant investments in data collection and integration, much of the data stored in their IT infrastructures has not been analyzed or deployed to further the firms' business performance.  Those enterprises that learn to effectively harness the vast quantities of information generated by their IT systems - both within and outside the corporation - will enjoy a substantial competitive advantage.
Tags : 
sap, business intelligence, business processes, consumer packaged goods, integrating cross-enterprise processes
    
SAP Inc.
Published By: Schneider Electric     Published Date: Mar 28, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: SRC,LLC     Published Date: Jun 01, 2009
To mine raw data and extract crucial insights, business decision‐makers need fast and comprehensive access to all the information stored across their enterprise, regardless of its format or location. Furthermore, that data must be organized, analyzed and visualized in ways that permit easy interpretation of market opportunities growth, shifts and trends and the business‐process changes required to address them. Gaining a true perspective on an organization’s customer base, market area or potential expansion can be a challenging task, because companies use so many relational databases, data warehouse technologies, mapping systems and ad hoc data repositories to gather and house information for a wide variety of specialized purposes.
Tags : 
src, enterprise, enterprise applications, convergence, compared, counted, combined, reorganized
    
SRC,LLC
Published By: Symantec     Published Date: Nov 30, 2015
The Symantec Website Security Threat Report gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
The Symantec Website Security Threat Report gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.
Tags : 
    
Symantec
Published By: Tealium     Published Date: Mar 12, 2014
In this paper, Web Analytics Demystified presents an approach towards big data that has the potential to simplify the quest for whole customer data and improve your companys odds of success.
Tags : 
tealium, big data, data analytics, business analytics, information technology, data distribution, tag management systems, marketing
    
Tealium
Published By: Tealium     Published Date: Mar 12, 2014
The Rise of Data Activism: How Digital Data Distribution Platforms (D3P) Enable Marketers to Act on Their Data discusses how marketers can solve the optimization gap and leverage new solutions to take action on their most actionable audience segments in real time.
Tags : 
tealium, big data, data analytics, business analytics, information technology, data distribution, tag management systems, digital data distribution platform
    
Tealium
Published By: TIBCO Software     Published Date: Aug 02, 2019
As an insurer, the challenges you face today are unprecedented. Siloed and heterogeneous existing systems make understanding whats going on inside and outside your business difficult and costly. Your systems werent set up to take advantage of, or even handle, the volume, velocity, and variety of new data streaming in from the internet of things, sensors, wearables, telematics, weather, social media, and more. And they werent designed for heavy human interaction. Millennials demand immediate information and services across digital channels. Can your systems keep up?
Tags : 
    
TIBCO Software
Published By: VMware     Published Date: Feb 26, 2009
VMware Virtual Infrastructure and CA Recovery Management (CA ARCserve Backup and CA Xosoft products) team up to deliver higher availability and risk-resistance for business-critical information and applications, while lowering management and operational costs and complexity.
Tags : 
vmware, it infrastructure, virtual infrastructure, ca recovery management, business critical information, business continuity, disaster recovery, high availability
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch's leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch's leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch's leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch's leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch's leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch's leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch's leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch's leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware Dell     Published Date: Sep 29, 2008
Business operations that are heavily dependent on information systems may be significantly impacted even by a brief application outage. Impact of a data loss is even more drastic. IDC estimates that in a disaster situation, the average loss is $3 million per incident and $81,000 per hour.
Tags : 
vmware, dell, disaster recovery, storage area network, enterprise applications
    
VMware Dell
Published By: Workday     Published Date: Jul 19, 2017
Todays business climate demands that corporations have a flexible computing infrastructure. Because of the agility it provides, cloud computing is garnering interest in many organisations. As they look at such possible deployments, however, some CIOs become hamstrung by security concerns. They feel that the traditional method of securing information in premises-based systems is the best way. While that option worked for many years, the threat landscape today is more diverse and more potentially damaging than ever before.
Tags : 
security, it department, system set-up, cloud suppliers, frameworks, human resources, enterprise financial, planning data
    
Workday
Published By: Workday     Published Date: Nov 03, 2017
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business.
Tags : 
    
Workday
Start   Previous    1 2 3     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.