"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

data information

Results 76 - 100 of 837Sort Results By: Published Date | Title | Company Name
Published By: Heiler     Published Date: Feb 22, 2012
This white paper provides insight on how PIM is changing process and offers 6 key factors on how to succeed in implementation and change management.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Heiler     Published Date: Feb 22, 2012
Many companies invest a great deal of money in optimizing their eCommerce shops. How can Product Information Management (PIM) system contribute to company's success? Read on to find out more.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Iron Mountain     Published Date: Aug 28, 2014
Download this analytics report to learn how your healthcare organization can develop a successful strategy to manage data.
Tags : 
iron mountain, healthcare it, health it, data management, healthcare data management, hit, meaniingful use, icd-10, information security, information management
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
Download this whitepaper to learn strategies for effective healthcare information lifecycle management.
Tags : 
iron mountain, healthcare data, healthcare it, hit, ehr, health information, information lifecycle management, ilm
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
The volume of information in the healthcare industry continues to grow exponentially. Meaningful Use, ICD-10, and Accountable Care are all contributing to this data growth. Download this whitepaper to learn how your organization can develop strategies to effectively manage this information throughout its life cycle.
Tags : 
iron mountain, healthcare information, information governance, information management, healthcare it, hit, data management, electronic information, healthcare roi, business intelligence
    
Iron Mountain
Published By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection, application integration, analytical applications
    
Verdasys
Published By: ServiceNow     Published Date: Oct 02, 2015
From students to executives, finding solutions to improve efficiency, productivity, and communication has become vital. These end users are trying to excel in their work, and while they don't mean to cause harm, in most organizations this desire leads to the use of applications, services, and data storage and sharing beyond IT's boundaries. This practice, known as “shadow IT,” walks a line that information security officers are uncomfortable with, and it's having an obvious impact on technical support teams. The good news is, there are opportunities for all support organizations, regardless of their stance on shadow IT.
Tags : 
    
ServiceNow
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of today’s market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
    
Dun & Bradstreet
Published By: SAP     Published Date: Sep 19, 2017
SAP S/4HANA Retail for merchandise management is at the core of a comprehensive suite of retail offerings designed to help retailers meet the demands of a digital economy. It supports retail core processes end to end, starting with master data down to point-of-sales (POS) connectivity. It allows insights into operational retail data, empowering users with contextual, real time information for faster and better decision making. Processes can easily be extended to connect to business networks to form a digital ecosystem and collaboratively drive business model improvements. Equipped with a simple and intuitive user experience, the solution offers better support for headquarters users as well as store associates to drive compelling customer experiences.
Tags : 
master data, management, retail price, merchandise buying, collaboration, vendor agreement, forecasting, sap
    
SAP
Published By: ServiceNow     Published Date: Nov 05, 2012
When IT organizations utilize social media, it can efficiently help more people inside and outside the data center quickly access more services and knowledge. Combined people's knowledge and good will and the essence of information technology service management (ITSM) can be more fully realized.
Tags : 
servicenow, social media, social it, it environment, it management
    
ServiceNow
Published By: Dell     Published Date: Aug 08, 2018
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network, application security, encryption, security management, security policies
    
Blue Coat Systems
Published By: Red Hat     Published Date: Dec 09, 2013
Linux has proven to be a key element for successful datacenter modernization. Red Hat Enterprise Linux delivers cross-architecture standardization to a single operating system (OS) and provides a target platform for migrating mission critical workloads. For more information on Red Hat Enterprise Linux datacenter modernization watch the webinar here.
Tags : 
idc, red hat, informationweek, industry solutions, webinar, standardization, cloud computing, virtualization, os dynamics, technology reset, datacenters, market trends, it infrastructure, demarcation line, al gillen, data center
    
Red Hat
Published By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : 
social media, business intelligence, customer hub, crm, oracle, knowledge management, data management
    
Oracle
Published By: CA Technologies     Published Date: Aug 26, 2016
It’s impossible for a day to pass in which we don’t hear news of yet another data breach, with its resulting loss of proprietary secrets, financial records or personal information. These incidents span all sectors of the economy: commerce, education and government
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software, content management system
    
Absolute Software
Published By: Adobe     Published Date: Jul 04, 2016
This ebook explains how to use data and software to predict what customers will do and how to turn that new knowledge into a business advantage.
Tags : 
data, information available, customer, customer experience, customer relationship
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Heute lassen sich bestimmte Prognosen deutlich einfacher treffen als früher, denn heute steht uns neben einer beispiellosen Menge an Verbraucherinformationen auch die entsprechende Technologie zur Datenauswertung zur Verfügung. Marketer können präziser denn je prognostizieren, wie sich Kunden höchstwahrscheinlich verhalten werden, gelegentlich sogar, bevor die Kunden selbst dies wissen.
Tags : 
data, information available, customer, customer experience, customer relationship
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Aujourd’hui, certaines prévisions sont moins complexes qu’elles ne l’étaient auparavant. Nous disposons désormais d’une quantité d’informations sans précédent sur les consommateurs et de la technologie adéquate pour faire parler les données. Les marketeurs peuvent prévoir avec une grande précision le comportement des clients, parfois même avant que ces derniers ne sachent eux-mêmes ce qu’ils vont faire.
Tags : 
data, information available, customer, customer experience, customer relationship
    
Adobe
Published By: Cleversafe     Published Date: Dec 07, 2012
The business case for why IT Executives are making a strategic shift from RAID to Information Dispersal
Tags : 
data, storage, information, digital, growing, software development, it management
    
Cleversafe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory