deeper data

Results 1 - 25 of 47Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software     Published Date: May 05, 2020
A recent focus by the US Food and Drug Administration (FDA) on process monitoring and verification has highlighted a need in the biopharmaceutical industry for better collection, categorization and analysis of manufacturing data. Manufacturers are increasingly being challenged to show their systems implement some form of continued process verification and demonstrate how their data systems can provide deeper insights into the process.. However, there are a wide variety of approaches to meet this requirement. Continued Process Verification (CPV) is a business process and set of tools for improving manufacturing and product quality. It uses manufacturing data, coupled with a number of statistical signal detection algorithms to detect variations in the process that may impact product quality or process consistency. When used correctly, it allows a manufacturer to understand whether their production process is consistently delivering product with acceptable quality attributes in a repeata
Tags : 
    
TIBCO Software
Published By: Comcast Business     Published Date: Feb 07, 2020
The first phase of digital transformation laid the path through adoption of cloud, mobile, big data and social—which, combined, provided a platform for organizations to achieve greater operational efficiencies, better business insights and deeper customer engagements. The next phase involves technologies that promote data-driven intelligence for enhanced real-time decision-making, as well as those that enable or enhance automation to drive even more improved outcomes in financial services.
Tags : 
    
Comcast Business
Published By: HERE Technologies     Published Date: Jan 16, 2019
Audience segmentation is key for successful ad campaigns. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE Technologies shares insights and solutions to buying location data for better audience segmentation. Find out about the challenges and questions to ask when buying location data and download the Buyers Guide for Marketers.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 11, 2019
Increasingly sophisticated location technology makes it possible for data scientists to gain a deeper understanding of their target audiences – and how to reach them. Accurate and precise intelligence can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 11, 2019
Audience segmentation is key to any marketing strategy. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Apr 02, 2020
Until now, the browser cookie has been the go-to tool for brands wanting to understand customer behavior. Butas the cookie looks set to disappear, location data is beginning to fill the void. Not just as an alternative, but as an improvement –giving deeper insights for more accurate audience segmentations,and more successful campaigns. This eBookfrom HERElooks at why location data is replacing the cookie, and how advertisers and marketerscan best use it to their advantage.Itdiscusses why, to get ahead,you need more than just simple GPS coordinates, but arealunderstanding of behavioral patterns and purchasing habits–like the stores, restaurants and attractions consumers visit, and when. And it tells you the technology you need, for example geofencing and indoor mapping.After reading, you’ll knowhow to:?Gain context with dynamic and static location data?Refine audience segmentation?Apply location intelligence to advertisingMake sure you’re ready for a future without cookies.Download to l
Tags : 
    
HERE Technologies
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Digital transformation (DX) is a must for midsize firms (those with 100 to 999 employees) to thrive in the digital economy. DX enables firms to increase competitive advantage through initiatives such as automating business processes, creating greater operational efficiencies, building deeper customer relationships, and creating new revenue streams based on technology-enabled products and services. DX is a journey, and it starts with firms embracing an IT-centric vision that guides a data-driven, analytics-first strategy. The outcome of DX initiatives depends on the ability of a firm to efficiently leverage people (talent), process, platforms, and governance to meet the firm’s business objectives.
Tags : 
    
Hewlett Packard Enterprise
Published By: Red Hat     Published Date: Aug 22, 2018
In the emerging digital enterprise, there’s a good chance some application development will be taking place outside the information technology department. It’s not that the role of IT is in any way being diminished – in fact, IT managers are getting busier than ever, overseeing the technology strategies of their enterprises. Rather, the pieces are in place for business users to build and configure the essential business applications they need, on a self-service basis, with minimal or no involvement of their IT departments. As the world moves deeper into an era of ongoing disruption from digital players – be they startups, or teams within established enterprises – technology has become an essential part of every job, from the boardroom to the boiler room. Accordingly, the discipline of IT is no longer confined to the data center or development shop. Many business managers and professionals are building, launching or downloading their own applications to achieve productivity and respond
Tags : 
    
Red Hat
Published By: OpenText     Published Date: Mar 02, 2017
Watch this webinar with IDC supply chain experts to learn how embedded analytics can provide deeper supply chain intelligence and help you extract maximum value from data for your supply chain operations.
Tags : 
idc webinar, analytics, supply chain intelligence, supply chain operations
    
OpenText
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Joint Solution Brief Gigamon Improves Security Visibility with Splunk Enterprise to see how to effectively analyze network events for security threats. Benefits include enhanced visibility and deeper, faster security analytics and intelligence based on all machine data (not just security events), among many others. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: IBM APAC     Published Date: Nov 22, 2017
Using IBM Watson’s cognitive capabilities, companies can quickly differentiate their customer service quality by being more pro active and responsive to customer needs. Simply put, chatbots and virtual agents are the future of customer interactions. Building apps from scratch that incorporate natural language processing, speech to text recognition, visual recognition, analytics, and artificial intelligence requires broad expertise in these disciplines, large staffs, and a huge financial commitment. Making use of IBM Watson cognitive services brings these capabilities in-house quickly and without the capital investment that would be needed to develop the technologies within an organization.
Tags : 
decision making, deeper data, insights, cognitive, analytics, ibm, watson, virtual agents
    
IBM APAC
Published By: Dell APAC - EMC     Published Date: Mar 04, 2020
A new dynamic between man and machine will transform our live and cities by 2030. We will experience a more immersive, deeper partnership with machines driven by the uptake of emerging technologies including 5G, artificial intelligence, extended reality and IoT. Technology-led shifts will radically transform our lives with sentient cities, connected mobility and robots becoming mainstream. They will be enabled by advancements in processing power and analytics and software, and each technology will be its own force for change. This report by the Institute of the Future, in partnership with Dell Technologies and Intel, explores the five large-scale shifts that we will experience by 2030. Organizations that wish to harness the power of these emerging technologies will need to have data at the heart of their organization and be prepared to overcome the barriers of this landscape.
Tags : 
    
Dell APAC - EMC
Published By: Dell APAC - EMC     Published Date: Feb 26, 2020
A new dynamic between man and machine will transform our live and cities by 2030. We will experience a more immersive, deeper partnership with machines driven by the uptake of emerging technologies including 5G, artificial intelligence, extended reality and IoT. Technology-led shifts will radically transform our lives with sentient cities, connected mobility and robots becoming mainstream. They will be enabled by advancements in processing power and analytics and software, and each technology will be its own force for change. This report by the Institute of the Future, in partnership with Dell Technologies and Intel, explores the five large-scale shifts that we will experience by 2030. Organisations that wish to harness the power of these emerging technologies will need to have data at the heart of their organisation and be prepared to overcome the barriers of this landscape.
Tags : 
    
Dell APAC - EMC
Published By: SPTel APAC     Published Date: Jul 03, 2020
Network diversity is a term that gets used often to assure customers that there is redundancy built in with their services. But are you truly getting a diverse solution? So, how does a truly diverse network look like? • Unique fibre paths that run alongside the power network cables instead of utilising shared infrastructure with other telco providers • Fibre entering buildings through the switch room instead of the MDF room • Cables buried deeper underground and passing through owned property • Central office (CO)/Exchange diversity as a default service with auto failover capability in the event of a network outage. • 2-tier network design with fewer number of hops needed for data to travel, therefore enabling lower latency and lesser failure points
Tags : 
    
SPTel APAC
Published By: HP Inc.     Published Date: Feb 03, 2016
Almost every organization takes its desktop/laptop security seriously – but most simply rely on software-level solutions, missing out on a deeper level of protection. Are these traditional software solutions keeping data safe enough? Not according to a recent Spiceworks survey, in which only about half of IT professionals in the Americas feel like their current, software-level solutions are very effective. Where does your organization rank?
Tags : 
    
HP Inc.
Published By: AppsFlyer     Published Date: May 20, 2020
Over the last few years, performance app marketers have shifted their efforts from focusing on driving installs (via KPIs such as click-through and click-to-install rates) to post-install measurement, diving deeper into user activity after the initial app open. In a space dominated by free-to-install apps where actual value is tied to post-install in-app activity, this data helps marketers make much smarter decisions on both acquisition and re-engagement activities.
Tags : 
    
AppsFlyer
Published By: Experian     Published Date: Aug 29, 2019
Card-not-present fraud is estimated to reach $19.3 billion by 2022. Online payment fraud will grow 13.7% from 2017-2022 – Juniper Dive deeper into these data points with a focus on assessing the impact, challenges and opportunities presented by emerging payment mechanisms and regulation, as well as an in-depth assessment of sector-specific trends and outlook in regard to digital fraud. It provides essential reading for those wishing to understand where the key strategic focus should lie and how market forces are affecting the industry.
Tags : 
    
Experian
Published By: Veeam APAC     Published Date: Mar 03, 2020
Veeam® products install and configure in a simple manner, but you can get so much more out of Veeam Backup & Replication™ when you have deeper knowledge about what to do and what not to do. This session will address the 10 most common mistakes seen in the field. We will combine facts and knowledge to discuss the different roles, components and data flow specifics needed to correct or avoid those mistakes. Watch this webinar to: - Get insight and advice on the different roles, components and process flows - Learn how to get much more out of your investment by correcting mistakes or by avoiding them all together
Tags : 
    
Veeam APAC
Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 24, 2019
A leading US-based broadcasting and publishing firm, with a market value of $17 Bn plus, creates, acquires and distributes entertainment content to global consumers over diverse platforms. The Company owns iconic media brands and has the viewership base amongst the US cable networks. The Broadcaster wanted to gain deeper insights into audience viewership patterns, advertisement impressions and sales data, in order to streamline the management of its advertisement deals. LTI's ADAPT (AD Sales Audience Prediction and tracking) solution optimized allocation, management, tracking and maintenance of advertisement air time to substantial increase in Marketing ROI.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: IBM     Published Date: Jul 26, 2017
The headlines are ablaze with the latest stories of cyberattacks and data breaches. New malware and viruses are revealed nearly every day. The modern cyberthreat evolves on a daily basis, always seeming to stay one step ahead of our most capable defenses. Every time there is a cyberattack, government agencies gather massive amounts of data. To keep pace with the continuously evolving landscape of cyberthreats, agencies are increasingly turning toward applying advanced data analytics to look at attack data and try to gain a deeper understanding of the nature of the attacks. Applying modern data analytics can help derive some defensive value from the data gathered in the aftermath of an attack, and ideally avert or mitigate the damage from any future attacks.
Tags : 
cyber attacks, data breach, advanced data analytics, malware
    
IBM
Published By: Carbonite     Published Date: Oct 10, 2018
Overview Key Challenges Organizations still struggle with communication between data owners and those responsible for administering DLP systems, leading to technology-driven — rather than business-driven — implementations. Many clients who deploy enterprise DLP systems struggle to get out of the initial phases of discovering and monitoring data flows, never realizing the potential benefits of deeper data analytics or applying appropriate data protections. DLP as a technology has a reputation of being a high-maintenance control — incomplete deployments are common, tuning is a never-ending process, lack of organization buy-in is low, and calculations of ROI are complex.
Tags : 
    
Carbonite
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
For increasing numbers of organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. To accelerate innovation, improve the IT delivery economic model and reduce risk, organizations need to combine data and experience in a cognitive model that yields deeper and more meaningful insights for smarter decisionmaking. Whether the user needs a data set maintained in house for customer analytics or access to a cloud-based data store for assessing marketing program results — or any other business need — a high-performance, highly available, mixed-load database platform is required.
Tags : 
cloud, database, hybrid cloud, database platform
    
Group M_IBM Q1'18
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.