"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Business Intelligence

Business Intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all of the factors that affect your business. It is imperative that you have an in depth knowledge about factors such as your customers, competitors, business partners, economic environment, and internal operations to make effective and good quality business decisions. Business intelligence enables you to make these kinds of decisions.
Results 151 - 175 of 674Sort Results By: Published Date | Title | Company Name
Webinar Published By: IBM     Published Date: Aug 20, 2015
Adopting social cloud.
Tags : 
social, cloud, collaboration, product development, tools
    
IBM
White Paper Published By: NetApp     Published Date: Aug 14, 2015
Cloud trends.
Tags : 
virtualization, cloud, trends, automation, infrastructure
    
NetApp
White Paper Published By: NetApp     Published Date: Aug 14, 2015
Cloud enabling.
Tags : 
management, cloud computing, applications, networks, business intelligence
    
NetApp
White Paper Published By: NetApp     Published Date: Aug 14, 2015
Evolve integrated and converged infrastructure.
Tags : 
infrastructure, converged, cloud computing, data center, business intelligence
    
NetApp
White Paper Published By: NetApp     Published Date: Aug 14, 2015
Hybrid cloud strategies.
Tags : 
cloud computing, colocation, infrastructure, cloud computing, data center
    
NetApp
White Paper Published By: NetApp     Published Date: Aug 14, 2015
Choosing cloud storage consumption model.
Tags : 
cloud, storage, data, strategy, applications
    
NetApp
Case Study Published By: NetApp     Published Date: Aug 14, 2015
Technical case study.
Tags : 
it challenges, management, cloud computing, case study, networks
    
NetApp
White Paper Published By: NetApp     Published Date: Aug 14, 2015
Innovative solutions from NetApp.
Tags : 
hybrid cloud, tco, business agility, corporate performance, business value
    
NetApp
White Paper Published By: Qlik     Published Date: Aug 12, 2015
The Business Intelligence Survey provides you with well-designed KPI dashboards packed with concise information, which can be absorbed at a glance.
Tags : 
business technology, qlik, data, big data, analytics
    
Qlik
White Paper Published By: Qlik     Published Date: Aug 12, 2015
This Research Report examines the analytical strategies of organisations currently using data discovery tools and highlights their superior performance in user engagement.
Tags : 
data discovery, data, data discovery tools, analytics, benefits of using data discovery
    
Qlik
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect prominent securities.
Tags : 
firewall, intrusion detection, intrusion prevention, ips, ids
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Tags : 
threat, data, security, it management, malware
    
Vectra Networks
White Paper Published By: Dell EMC     Published Date: Aug 03, 2015
The infographic provide leading analyst insights on the all-flash array market and how innovation accelerators are driving the agile data center through high data growth and the need for increased scalability and performance.
Tags : 
innovation, industry, data center, data growth, scalability
    
Dell EMC
White Paper Published By: IBM     Published Date: Jul 31, 2015
Security organization.
Tags : 
security, data, business intelligence, productivity
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Data breach study.
Tags : 
data, cost global, security, business intelligence
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Market trends and vendor evaluation criteria.
Tags : 
security, data, event management, infrastructure, network management
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Protecting endpoints
Tags : 
enterprise, malware, tools, data, business intelligence
    
IBM
White Paper Published By: TriNet     Published Date: Jul 28, 2015
Download this white paper for best practices on how to better understand and effectively manage a multi-generational workforce.
Tags : 
leadership tips, best practices, generation x, generation y, baby boomers
    
TriNet
White Paper Published By: Oracle EPM     Published Date: Jul 28, 2015
Enterprise Data Governance is the future key to enabling both business and IT to manage change effectively as enterprises strive to adapt to the networked economy and become data-driven businesses.
Tags : 
enterprise, data, governance, agile, best practices
    
Oracle EPM
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Citrix XenApp Outperforms VMware
Tags : 
application virtualization, platform, computing, architecture, productivity
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
User-centric approach can meet needs of employees and IT.
Tags : 
mobility, virtualization, support, efficiency, productivity
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Why app and desktop virtualization should be the foundation for your layered approach.
Tags : 
information security, layered approach, mobility, application, desktop virtualization
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Reduce the work need to provide better security.
Tags : 
data, data protection, access control, security task, application
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Never refresh your PC again.
Tags : 
data, cloud, operations, desktop management, energy efficiency
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory