log data

Results 226 - 250 of 1814Sort Results By: Published Date | Title | Company Name
Published By: Infor     Published Date: Jan 03, 2011
When members began expressing wishes to have more exposure to information on financial investments that meet their individual needs, Navy Federal decided to turn to technology that would combine available member data into a comprehensive solution and allow real-time decisions.
Tags : 
infor, navy federal, credit union interaction advisor, case study, customer relationship management data, financial investment
    
Infor
Published By: Infor     Published Date: Jan 06, 2011
When members began expressing wishes to have more exposure to information on financial investments that meet their individual needs, Navy Federal decided to turn to technology that would combine available member data into a comprehensive solution and allow real-time decisions.
Tags : 
infor, navy federal, credit union interaction advisor, case study, customer relationship management data, financial investment
    
Infor
Published By: Adobe     Published Date: Nov 07, 2013
Aberdeen's Insights provide the analyst's perspective on the research as drawn from an aggregated view of research surveys, interviews, and data analysis.
Tags : 
adobe, aberdeen group, analyst insight, technology tools, buying behavior, customer experience management, cem, buyer interactions
    
Adobe
Published By: ServiceNow     Published Date: Oct 02, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use as the Web apps they use at home. Integration remains difficult, because it’s sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
    
ServiceNow
Published By: SAP     Published Date: Dec 04, 2015
Download this whitepaper to see how advanced technologies such as big data, cloud computing, mobile devices, and enterprise access to in-memory platforms, predictive analytics, and planning software can help CFOs make better and more sophisticated use of data, influence decisions, and take practical, timely action.
Tags : 
finance function, finance, cfo, big data, cloud computing, mobile, in-memory platforms, predictive analytics
    
SAP
Published By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
    
Teradata
Published By: Pega     Published Date: Apr 04, 2016
Customers are evolving. They are evolving in the way they get information about products, what goes into making their purchase decision and ultimately how they buy. Businesses need to evolve and adapt how they manage their customer relationships. Customer Relationship Management (CRM) software was supposed to improve front-end customer engagement across marketing, sales and service. Unfortunately, most systems have the opposite result. Companies spend too much time integrating and maintaining disconnected systems and too little time nurturing relationships. Organizations need to transform their organizations from the inside out—embracing new processes and technologies that gathers, stores and gives them access to customer data so they gain more insight into their customers and therefore create more effective marketing and service programs. Download this Ebook and gain a better understanding of how a more robust CRM system can improve customer management.
Tags : 
    
Pega
Published By: Pega     Published Date: Jul 29, 2015
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to discover how well each vendor fulfills Forrester’s criteria an
Tags : 
    
Pega
Published By: Pega     Published Date: Aug 12, 2016
Digital transformation has fundamentally disrupted global manufacturing. It’s not just a single technological advancement; it’s a full range of emerging technologies that are revolutionizing the industry. Social, mobile, Big Data, analytics, cloud, and the Internet of Things are re-defining every organization’s operating models. Within the next decade, many manufacturers will find themselves managing operations that are virtually unrecognizable from the past century.
Tags : 
pega, mobil, big data, analytics, cloud
    
Pega
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
What’s the best analytic approach for your business? As technology has evolved, so has our ability to process data at an incredible rate, making it possible to perform what has become known as Anticipatory Analytics. While still a relatively new concept, anticipatory analytics is gaining prevalence as a methodology. If you’re seeking to understand the future needs of your business before they show obvious signs, anticipatory analytics can’t be ignored. In this document, you’ll learn: • The advantages of anticipatory analytics • The key enablers of anticipatory analytics • How anticipatory can be leveraged for your business • Why anticipatory can give you first-mover advantage • When to use anticipatory or predictive analytics, based on your goals
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of today’s market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Stories and statistics behind successful analytics projects The adoption of analytics across the enterprise is accelerating, and with good reason. Analytics can offer a competitive advantage by helping to identify growth opportunities, circumnavigate risk and improve customer relationships. These insights are becoming crucial parts of the business strategy for executives representing a wide array of industries. Check out our latest eBook to see how some of the world’s leading companies are using analytics to meet their needs. You’ll receive diverse examples of how organizations applied the latest statistical methodologies, such as: scorecard build, regression, decision trees, machine learning and material change to uncover meaning in data. The examples represent global brands across critical industries – Financial Services, Insurance, High-Tech, Aerospace, Manufacturing and others – where analytics helped answer their most challenging questions.
Tags : 
    
Dun & Bradstreet
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy
    
Rubrik EMEA
Published By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
    
VMware
Published By: Vmware     Published Date: Dec 13, 2019
What Every CIO Should Know about Security: Cybersecurity spend continues to increase, yet breaches continue to rise. What are we doing wrong? For starters, most organizations define cybersecurity practices through preventative technologies. What these approaches are often missing, however, are the basics: cyber hygiene, asset management, and protecting the data above all else. When talking to customers, we often hear 7 common myths and misperceptions around cybersecurity, which may be putting your organization at risk. In this brief, we debunk these misperceptions and advise CIOs of the tactics they should be focusing on to protect their most valuable assets.
Tags : 
    
Vmware
Published By: Vmware     Published Date: Dec 16, 2019
What Every CIO Should Know about Security: Cybersecurity spend continues to increase, yet breaches continue to rise. What are we doing wrong? For starters, most organizations define cybersecurity practices through preventative technologies. What these approaches are often missing, however, are the basics: cyber hygiene, asset management, and protecting the data above all else. When talking to customers, we often hear 7 common myths and misperceptions around cybersecurity, which may be putting your organization at risk. In this brief, we debunk these misperceptions and advise CIOs of the tactics they should be focusing on to protect their most valuable assets.
Tags : 
    
Vmware
Published By: ServiceNow     Published Date: Oct 18, 2013
Three IT transformations can help IT get its own house in order to become the proactive partner of the business. By applying these concepts, IT departments at major enterprises are changing the way they engage with their business peers.
Tags : 
technology, service automation, it workload, it infrastructure, service consolidation, it globalization, managing service relationships, consumerized service experience
    
ServiceNow
Published By: Hyland Software     Published Date: Jun 16, 2016
To support a more robust exchange of health information across multiple systems and care settings, HIT must embrace future-state technology: A single data management solution built on a single platform that stores all content in its native format in a single archive.
Tags : 
healthcare, technology, information technology, solutions, best practices, business management, process management, content management
    
Hyland Software
Published By: Dell     Published Date: Nov 09, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and Intel® and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about what you need to keep endpoints and data secure Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 12, 2018
Today, IT leaders address the PC lifecycle across a continuum from control to transformation. Control is geared to optimization, while transformation focuses on the business impact of technology. Though the two approaches differ, they are not in opposition. They strive for the same goals and face similar challenges. As IT leaders provide their workforce with the tools to carry out the corporate mission, they should develop a PC lifecycle strategy that encompasses the key organizational needs of systems management, end-user productivity, business innovation and data-centric security. Read this Dell whitepaper to learn more about the findings of a recent Forrester Consulting study, “Digital Transformers Innovate, Digital Controllers Optimize”. This paper will help clarify the PC lifecycle continuum, from the basics of control to the advanced levels of transformation, so you will be better equipped to determine the needs of your organization on that spectrum.
Tags : 
    
Dell
Published By: Hitachi EMEA     Published Date: Jan 13, 2020
Cisco and Hitachi have invested significant time and engineering resources to ensure that a large number of deployment options are available to all of our customers and partners. This e-Book includes tips and advice that can help you get the most out of your Cisco and Hitachi Adaptive Solutions for CI deployment. Cisco and Hitachi Adaptive Solutions for Converged Infrastructure will help organizations: Execute data-driven transformation. Simplify IT, improve agility, maintain compliance and ensure reliability. Enable IT to focus on supporting business needs. Download this e-Book now to find out more about the partnership and technology behind Cisco and Hitachi Adaptive Solutions for Converged Infrastructure and to learn how to transform your data center.
Tags : 
    
Hitachi EMEA
Published By: Dell EMC     Published Date: Feb 14, 2019
Artificial intelligence (AI) is a transformative technology that will change the way organizations interact and will add intelligence to many products and services through new insights currently hidden in vast pools of data. In 2017 alone, venture capitalists invested more than $11.7 billion in the top 100 Artificial Intelligence startups, according to CB Insights1, and the breadth of Artificial Intelligence applications continues to grow. While human-like intelligence will remain the stuff of novels and movies for the near future, most organizations can and should explore practical Artificial Intelligence projects. This technology has the potential to: • Improve productivity of internal applications • Increase revenue through enhanced customer interacton and improved customer acquisiiton • Reduce costs by optimizing operations • Enhance products and services with "smart" functionality such as vision and voice interaction and control This paper provided by Dell and Intel® gives executi
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 14, 2019
Technology is quickly moving to the forefront as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. Read this executive summary from Dell and Intel® to learn why businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading technology conglomerate had to renew the current data center agreement, also it was no longer strategic to maintain their own hardware. LTI partnered with Oracle and helped in designing and executing the migration plan that would ensure Zero business disruption without stringent timeline. LTI leveraged a toolkit built by its in-house, dedicated Oracle Innovation and Solution Center (OISC) to help ensure an error-free migration. Benefits i. $1 M Overall Cost saving ii. 40% reduced TAT Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.