data analysis

Results 301 - 325 of 437Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Mar 14, 2014
This paper will discuss the barriers to data-driven decision making for midsized businesses, and how experts and non-experts alike can use SAS Visual Analytics to unlock the value of data – including big data – to increase revenue, cut operational costs and better manage their business.
Tags : 
sas, bottom line, midsized businesses, leveraging data, data management, internal and external, decision making, big data, operational costs, decision support, operational execution, strategic analysis, predictive analytics, data landscape, real-time data, interactivity, data democracy, visual analytics, data center
    
SAS
Published By: IBM     Published Date: Apr 10, 2013
Discover how businesses can capitalize on rich data analysis to proactively implement Loyalty & Retention strategies.
Tags : 
customer, analytics, proactive, loyalty, data
    
IBM
Published By: Splunk     Published Date: Apr 16, 2012
Discover a unique approach to handling large, semi-structured or unstructured time-series data. Splunk can be deployed in a matter of days to provide rapid cross-correlation between different data types-giving you unprecedented operational visibility.
Tags : 
splunk, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance, log management operations, operations, operational intelligence, data management
    
Splunk
Published By: Splunk     Published Date: Apr 16, 2012
This analyst ROI case study reveals how Ongame, a leading online gaming platform, used Splunk to gain greater visibility and efficiency from their application production process. Discover how Ongame improved DevOps collaboration and reduced downtime.
Tags : 
splunk, ongame, gaming, gaming platform, devops, collaboration, downtime, efficiency, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance
    
Splunk
Published By: Splunk     Published Date: Apr 16, 2012
Using Splunk, Cricket was able to identify system degradation and failures, even in the application area of Cricket's highly-automated and virtualized environment. Read about Cricket's impressive hard and soft ROI.
Tags : 
splunk, cricket communications, virtualization, automation, customer behavior, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance, log management operations, operations
    
Splunk
Published By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : 
splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance
    
Splunk
Published By: Intel Corp.     Published Date: Aug 08, 2012
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP's new B6200 StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing.
Tags : 
storeonce, extends, edison, group, b6200, storeonce, backup, system, emc, data, domain, industry, leadership, deduplication, emc, competetive, analysis, scalability, capacity, performance
    
Intel Corp.
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence, security
    
Webroot Inc
Published By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : 
visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence, real-time data, real-time data visualization, real-time data discovery, data variety software, data discovery software, data analysis software, data mining tools, data extraction, data reporting, pdf to excel, business reporting, data solutions
    
Datawatch
Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
Dive into this comprehensive eBook to get the details you need for starting virtualization. Written by Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and edited by Sachin Chheda of Nutanix™, you get all the detailed analysis and key points to consider, including: ? Architectural Principles ? Building Blocks ? Infrastructure Alternatives ? Storage Requirements ? Compute Sizing
Tags : 
    
Lenovo and Intel®
Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
Accessing, analyzing, and actioning with big data are among the key challenges facing every enterprise. In this detailed report from Forrester, you’ll see key drivers and challenges with Big Data, AND some clear recommendations on how to proceed. Get the white paper to see Forrester's key findings.
Tags : 
lenovo, data access, big data, data analysis
    
Lenovo and Intel®
Published By: IBM     Published Date: Jul 27, 2015
Communications service providers have much to gain from deploying big data analytics capabilities that enable smarter campaigns.
Tags : 
ibm advanced analytics platform, big data analytics, communications service providers, analytics software, predictive analytics, analytics visualization, historical analysis
    
IBM
Published By: IBM     Published Date: Dec 24, 2014
Organizations and intelligence agencies from a variety of industries and sectors face the same challenges when it comes to big data – the need to uncover actionable insights, with limited resources, with critical speed. But with the right intelligence solution, overwhelming data won’t be a challenge, rather, it becomes your resource to smarter, more effective decision making.
Tags : 
ibm, big data, insight analysis, big data analysis, intelligence solutions, advanced analytics, business decision making, it management
    
IBM
Published By: IBM     Published Date: Dec 24, 2014
Watch the video above to learn about the new big data and advanced analytics solution from IBM.
Tags : 
ibm, big data, insight analysis, big data analysis, intelligence solutions, advanced analytics, business decision making, it management
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
big data, mdm, client analytics, real-time analysis, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, optimization, security, cyber crime, network security, it security
    
IBM
Published By: IBM     Published Date: May 27, 2015
This white paper from a leading analyst, VDC Research, outlines some of the key opportunities and challenges facing companies that make the "things" that comprise the Internet of Things.
Tags : 
internet of things, product development, time to market, data analysis, networking, security, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: May 27, 2015
Tech-Clarity offers the following ten tips to help companies transform their business to take advantage of this opportunity and prepare for growth and profitability.
Tags : 
internet of things, product development, time to market, data analysis, networking, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
Data breach study.
Tags : 
data, cost global, security
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, ponemon institute, jp morgan, global analysis, networking, security, software development, it management, knowledge management, enterprise applications, data management, business technology, research
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, analysis, ponemon institute, networking, security, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, global, ponemon institute, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
Join IBM and partner Zementis in this webcast to hear how Predictive Model Markup Language (PMML), an industry standard, is helping solve business obstacles and enabling users to: - Drive timely and relevant insights via in-line predictive analytics - Score thousands of data records per second, scaling with business needs to enable instantaneous decisions - Improve performance and cost efficiency by reducing or eliminating movement data off-platform to conduct analysis
Tags : 
ibm, z systems, predictive analytics, analytics tools, zementis, predictive model markup language, pmml, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Dec 15, 2016
The IBM DataPower Operations Dashboard provides the most robust solution in the marketplace for monitoring DataPower gateways and performing trouble-shooting & analysis. Administrators can view operational data with full-text search to immediately diagnose errors and highlight impact analysis, DevOps can view and troubleshoot their own DataPower services, and business owners can generate automated reports to meet SLA and compliance requirements without assistance from centralized IT.
Tags : 
ibm, middleware, ibm datapower gateways, ibm datapower operations dashboard, enterprise applications
    
IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.