Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

valuable

Results 1 - 25 of 598Sort Results By: Published Date | Title | Company Name
Published By: Panduit     Published Date: Sep 03, 2015
Capacity planning is one of the most difficult aspects of building a data center today, given the complexity and number of variables to consider. This new White Paper, from leading solutions and innovation provider Panduit, brings fresh insight into the central issues facing data center planners both for initial “build” and for future growth, with valuable “real life” examples drawn from actual customer case studies. Download now to understand how best to: • Avoid capacity fragmentation: identify areas of “lost” or “stranded” capacity • Establish “best fits” for capacity in your center • Maintain equilibrium between the four critical elements of any effective data center management plan • Implement proactive planning: speed decision-making and deployment • Optimize existing resources • Improve data center operations and efficiency • Reduce OPEX • Avoid unnecessary CAPEX by extending the life of your center.
Tags : 
    
Panduit
Published By: Schneider Electric     Published Date: Aug 21, 2017
This 12-page white paper describes what a data center reference design is, what it includes, and explains how the benefits listed above are achieved. A data center reference design acts as a starting point offering a project team several valuable benefits including: • Facilitating and simplifying the planning phase • Reducing time to create buildable designs • Reducing risk, offering predictable performance and improved reliability of the data center once operational
Tags : 
data center, design, reference design
    
Schneider Electric
Published By: Oracle     Published Date: Sep 30, 2019
In the past, B2B transactions occurred in face-to-face meetings as a sales professional worked a product demo, business luncheon, or boardroom presentation to influence a customer – and close the deal. Today, however, B2B stakeholders perform much of their product and service research online. In fact, 93 percent of B2B buying starts with online searching, according to a Pinpoint Market Research study. This research occurs long before a customer engages with sales. As your prospects research and evaluate your offerings, they leave behind valuable clues to their intent. Understanding these clues – cracking the code – can help you tailor your messages to them, thereby providing them a more tailored, relevant experience. As a result, business-savvy marketing and sales departments have embraced marketing automation platforms, so their respective teams can work together on one common platform, reach B2B customers online, and drive revenue. Marketing automation platforms automate repetitive
Tags : 
    
Oracle
Published By: Dell EMC     Published Date: Oct 30, 2019
Midmarket firms face many of the same data center security risks as their enterprise counterparts with far fewer resources at their disposal to mitigate them. Downtime, data theft, and regulatory non-compliance all pose existential threats to these organizations and as they drive for continuous innovation and advantage in an increasingly competitive landscape, they must ensure valuable data and IT assets are secure, protected, and available at all times. How can midmarket organizations succeed in the face of these challenging market dynamics? This Research Insights report shows that the success organizations have enjoyed varies greatly, and further that organizations enjoying the greatest success demonstrate a clear organizational commitment to prioritizing security and operate fundamentally more secure data center environments. Download this report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
A security orchestration, automation and response (SOAR) platform is a valuable tool for organizations who have made appropriate investments in their security operations processes. This recent research from Gartner looks at the necessary preparations that security leaders need to make so that the deployment of a SOAR solution will improve the efficiency of their incident response and security operations teams.
Tags : 
    
Group M_IBM Q4'19
Published By: MicroStrategy     Published Date: Nov 08, 2019
The use of analytics has exploded across business, and the value it already has delivered has heightened executives' expectations. Now data can be processed in real time to meet a constantly widening range of analytic needs. How your organization utilizes them in the next decade will be essential to your success. These developments come at an opportune time. Organizations are being over-whelmed by the rivers of data generated by applications and systems on-premises or flowing in via the cloud. At the same time, the cost of computational power has declined dramatically, making it practical to apply analytics and generate information on just about anything. But no advance comes without challenges. While the widespread availability of analytics has created seemingly valuable insights, executives and managers are finding that those insights are not easily linked to steps that will improve business outcomes or optimize actions. So the challenge is to make analytics impactful in eve
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI. Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills. Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI. Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
The use of analytics has exploded across business, and the value it already has delivered has heightened executives' expectations. Now data can be processed in real time to meet a constantly widening range of analytic needs. How your organization utilizes them in the next decade will be essential to your success. These developments come at an opportune time. Organizations are being over-whelmed by the rivers of data generated by applications and systems on-premises or flowing in via the cloud. At the same time, the cost of computational power has declined dramatically, making it practical to apply analytics and generate information on just about anything. But no advance comes without challenges. While the widespread availability of analytics has created seemingly valuable insights, executives and managers are finding that those insights are not easily linked to steps that will improve business outcomes or optimize actions. So the challenge is to make analytics impactful in eve
Tags : 
    
MicroStrategy
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: CFA Institute     Published Date: Oct 07, 2019
Performance evaluation is coming of age. Once a narrow, back office role focused solely on crunching returns, it has become ever more integrated into the DNA of investment firms. Both internally and externally, performance evaluation adds value, helping senior management make key judgement calls where the difference between the right solution and the wrong solution is the difference between growth or decline. The performance analyst of the future will provide valuable input into nearly every area of an investment firm. What began as a mathematical task—calculating investment returns—is morphing into something much broader. The objective of performance evaluation today is determining what is behind the return being analyzed. What were the key drivers—allocation or selection? What risk was taken to achieve the return? Was it skill, or was it luck, that produced the return?
Tags : 
    
CFA Institute
Published By: MuleSoft     Published Date: Oct 10, 2019
API security has become a strategic necessity for your business. APIs facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With data breaches now costing $400m or more, senior IT decision-makers are right to be concerned about API security. In this whitepaper, you'll learn: The top API security concerns for today's enterprises. How IT leaders can protect identity, integrity, and confidentiality of information without risking availability. The top three qualifications you need to keep your APIs secure.
Tags : 
    
MuleSoft
Published By: Mimecast     Published Date: Oct 02, 2019
Forrester Research provides insights into the key trends that are impacting your business today. The Information Archiving Now Tech report is an invaluable tool for anyone actively considering or comparing Information Archiving solutions. No matter where you sit in your organization, this is a must-read to help you build a modern, secure archive that’s purpose built for e-discovery, compliance and end-user productivity. With a credible, side-by-side comparison of leading products, you can make a more informed investment that best fits the diverse needs of your business.
Tags : 
    
Mimecast
Published By: Eaton     Published Date: Oct 04, 2019
Safety has always been Eaton’s highest priority and we work closely with the NEC (National Electric Code) to ensure new policies continue to protect our most valuable resources, people. Eaton, the NEC, NEMA, and other organizations have long maintained that molded case circuit breakers are not suitable for repair or refurbishment. While changes to the code for 2020 do not change that position, they do provide clarity on what it means to be refurbished and what is now required when a suitable product is refurbished, including clearly marking the item as refurbished and removing the original manufacturer’s listing mark. The new code distinguishes between general maintenance like replacing a breaker, and refurbishment, altering a piece of equipment to a once again operational state. Because a refurbished unit cannot be tested to the manufacturer’s test protocol, it cannot continue to carry the original listing mark. Read the article below and learn about "reconditioned", and what the NEC is doing to reinforce that UL489 molded case circuit breakers are not suitable for refurbishment or repair.
Tags : 
    
Eaton
Published By: Adobe     Published Date: Sep 23, 2019
Data is a company’s most valuable asset. Just look at Forbes’ World’s Most Value Brands list. No longer is a company’s worth evaluated by its tangible assets — data has changed all of that. Every business today relies on data. The ability to filter through volumes of data to capture true insights is critical to gaining a competitive advantage. Companies aspiring to deliver the best possible customer experiences must be able to unify different types of information, including behavioral, transactional , and operational data
Tags : 
    
Adobe
Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix
Published By: MEDIAPLEX     Published Date: Nov 19, 2012
An easy to read guide that explains why tag management may be valuable for your business, and what to look for in a tag management vendor.
Tags : 
    
MEDIAPLEX
Published By: SAP     Published Date: Jul 23, 2018
New market forces are creating unprecedented pressure for companies to move faster, with greater agility, and change in response to new threats and opportunities. Companies that are embracing a new approach built on Intelligent Cloud ERP are gaining valuable advantages — such as boosting profits, growing faster, entering new markets, and disrupting their industries. Learn how Intelligent Cloud ERP empowers you to leverage the opportunities presented by changes to how we work, collaborate and achieve success in this practical, actionable overview.
Tags : 
    
SAP
Published By: HERE Technologies     Published Date: Oct 23, 2019
Marketers are using more location data than ever, but consumer privacy concerns and an evolving regulatory landscape have raised new challenges. There is a need for more consideration and transparency about around collecting and using geolocation data. Watch this webinar to learn about: • The various ways marketers are using location data today • How consumers feel about location sharing • How new government regulations may impact data collection Besides the two eMarketer Analysts, Hervé Utheza, Head of Media, Advertising & Telco at HERE Technologies joins the conversation and gives valuable insight on how to improve campaign performance through real world geometry. View the webinar now on demand.
Tags : 
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Big data and analytics is a rapidly expanding field of information technology. Big data incorporates technologies and practices designed to support the collection, storage, and management of a wide variety of data types that are produced at ever increasing rates. Analytics combine statistics, machine learning, and data preprocessing in order to extract valuable information and insights from big data.
Tags : 
big data, analytics, virtualization, cloudera, ibm, sas, sap, splunk
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: May 15, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location—across time zones or simply across the conference table. And those workplaces are expanding faster than ever, powered by mobile and cloud usage that makes virtual meetings essential. With scalable and secure voice, video, and content sharing, real-time collaboration can happen anywhere. Staying connected can lead to improved productivity and faster decision-making, as well as better customer service. But only if the technology offers a seamless experience and is intuitive enough to drive user adoption. While the need for better meetings is universal, not all conferencing tools are the same. Choosing the wrong tool could actually decrease productivity by wasting valuable meeting time troubleshooting the technology, or by providing a negative experience that will deter users from embracing it. This is especially true in situations where poor meeting quality could impact
Tags : 
    
Cisco EMEA
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Data is one of the most valuable assets in your enterprise. Ensuring that your data is protected, should the worst possible scenario occur, is vital. However, no single data protection tool can offer complete peace of mind. Use the right tools for each job but manage them from one place. Read this white paper to see how Hitachi Vantara takes a unified approach to modern data protection and simplifies data protection.
Tags : 
    
Hitachi Vantara
Published By: Dell     Published Date: Sep 24, 2018
Read this paper from Dell EMC and Intel® to learn the business value of Data Domain and how it can... • Speed up your backups • Improve disaster recovery • Save valuable floor space ...and so much more!
Tags : 
solutions, data, domain, dell, emc
    
Dell
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.