data types

Results 1 - 25 of 145Sort Results By: Published Date | Title | Company Name
Published By: MalwareBytes EMEA     Published Date: Feb 24, 2020
The healthcare industry was a prime target for cyber criminals in 2019. According to Malwarebytes telemetry data gathered from October 2018 thru September 2019, Healthcare was the seventh most targeted sector in the world, and cybercriminals aren’t slowing their efforts. From Q2 to Q3 in 2019, threat detections increased by 45%. This eBook gives you the facts about healthcare cybercrime in 2019, uncovering: What the most common types of threats were Why healthcare was a primary target How cybercriminals infected healthcare systems
Tags : 
    
MalwareBytes EMEA
Published By: CrowdStrike     Published Date: Feb 21, 2020
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 21, 2020
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? This white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn: • How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware • Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML • How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-gene
Tags : 
    
CrowdStrike
Published By: ARM Insight     Published Date: Feb 21, 2020
Companies in the FinTech and banking industries sit on a data treasure trove, but few truly maximize their valuable raw data. Senior-level executives often embrace the idea of monetization, but they are held back by fear of potential negative repercussions. The Three Data Types is your ticket to monetizing data safely and securely in a manner both business executives and security teams can embrace. Explore the roles played by raw and anonymous data in the monetization process, and learn how synthetic data could be the key to managing even the most complicated compliance issues. Download now, and read more today!
Tags : 
    
ARM Insight
Published By: HotSchedules     Published Date: Feb 14, 2020
To get ahead, you need to be able to take advantage of all the data [COMPANY NAME] generates. Previously, gathering and collating data was a cumbersome, manual task. Luckily, that’s no longer the case. Learn about how data and analytics have transformed the hospitality industry, and what they can do for your restaurant. In this white paper, we share: - How restaurants like yours can benefit from fully-integrated data and analytics - What types of data are available - Ways uncover hidden insights to drive stronger, quicker decision-making - How to get started Check out the free white paper to learn more. GET STARTED a/b test with SHOW ME
Tags : 
    
HotSchedules
Published By: Plotly     Published Date: Jan 30, 2020
The emergent field of bioinformatics is an amalgamation of computer science, statistics, and biology; it has proven itself revolutionary in biomedical research. As scientific techniques in areas such as genomics and proteomics improve, experimentalists in bioinformatics may find themselves needing to interpret large volumes of data. In order to use this data to efficiently provide meaningful solutions to biological problems, it is important to have robust data visualization tools. Many bioinformaticians have already created analysis and visualization tools with Dash and plotly.py, but only through significant workarounds and modifications made to preexisting graph types. We present an interface to create single-line declarations of charts for complex datasets such as hierarchical clustering and multiple sequence alignment. In addition, we introduce several new chart types, three-dimensional and interactive molecule visualization tools, and components that are specifically related to g
Tags : 
    
Plotly
Published By: TIBCO Software     Published Date: Nov 18, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: • Data processing and aggregation • Data visualization • Statistical/mathematical/machine learning modeling • Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Nov 07, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: Data processing and aggregation Data visualization Statistical/mathematical/machine learning modeling Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
    
TIBCO Software
Published By: Schneider Electric     Published Date: Nov 04, 2019
What is digital transformation? Why is everyone talking about it? And what can it do for me? Across every level of your company, people are asking themselves these questions. The Global Digital Transformation Benefits Report provides answers. It’s based on data points from over 230 cases of digital transformation from around the world, in data centers, buildings, infrastructure, and industry. The results paint a compelling picture of what digital transformation can do for businesses of all types. A selection of key findings: - On average, digital transformation helped our customers save 35% on engineering costs. - Our customers cut an average of 28% off their energy costs. - Digital transformation efforts drove productivity gains by an average of 24%.
Tags : 
digital transformation, digital transformation in business, digital transformation in healthcare, iot, data centers, buildings, infrastructure, industry
    
Schneider Electric
Published By: Datastax     Published Date: Oct 11, 2019
The first and most important step to building a successful, scalable application is getting the data model right. In this white paper, you’ll get a detailed, straightforward, five-step approach to creating the right data model right out of the gate—from mapping workflows, to practicing query-first design thinking, to using Cassandra data types effectively.
Tags : 
    
Datastax
Published By: Canon     Published Date: Oct 09, 2019
THE NOTIFIABLE DATA BREACHES (NDB) SCHEME came into effect on Feb 22nd 2018 making it obligatory for every organisation covered by the Australian Privacy Act to notify the Australian government of certain security breaches. The 2019 Canon Security Report is a guide to understanding which organisations are affected by this policy, the types of security breaches that require notification and what your organisation can do to help mitigate the risk of such breaches happening in the first place. Download this handy guide and protect your business from the business costs and legal ramifications of security breaches.
Tags : 
    
Canon
Published By: Intel     Published Date: Sep 30, 2019
Mountains of data promise valuable insights and innovation for businesses that rethink and redesign their system architectures. But companies that don’t re-architect might find themselves scrambling just to keep from being buried in the avalanche of data. The problem is not just in storing raw data, though. For businesses to stay competitive, they need to quickly and cost-effectively access and process all that data for business insights, research, artificial intelligence (AI), and other uses. Both memory and storage are required to enable this level of processing, and companies struggle to balance high costs against limited capacities and performance constraints. The challenge is even more daunting because different types of memory and storage are required for different workloads. Furthermore, multiple technologies might be used together to achieve the optimal tradeoff in cost versus performance. Intel is addressing these challenges with new memory and storage technologies that emp
Tags : 
    
Intel
Published By: Adobe     Published Date: Sep 23, 2019
Data is a company’s most valuable asset. Just look at Forbes’ World’s Most Value Brands list. No longer is a company’s worth evaluated by its tangible assets — data has changed all of that. Every business today relies on data. The ability to filter through volumes of data to capture true insights is critical to gaining a competitive advantage. Companies aspiring to deliver the best possible customer experiences must be able to unify different types of information, including behavioral, transactional , and operational data
Tags : 
    
Adobe
Published By: Dell EMC Storage     Published Date: Sep 03, 2019
The digital era has ushered in a proliferation of data that powers modern businesses. When leveraged properly, organizations are seeing the potential of data to drive better outcomes across all aspects of their business. Using data to support different workflows, analytics, and activities transforms it into data capital — a digital asset that will drive value for the business. The extent to which an enterprise aligns its organization around this data capital mindset — in both the way they use data and the way they invest in data technology — can have lasting impacts on the success of the business. In February 2019, Dell EMC and Intel commissioned Forrester Consulting to evaluate whether the ability to harness and apply data and analytics at every opportunity is fast becoming a prerequisite for success. To test this, Forrester conducted a global survey of 516 IT decision makers. The survey found that companies with more mature data capital practices — leveraging more data types, managin
Tags : 
    
Dell EMC Storage
Published By: Gigamon     Published Date: Sep 03, 2019
Dataflow is increasing at a rate unseen in history. Network managers are tasked with enabling massive quantities of new data in a secure and highly available fashion, all while facilitating access to new types of form factors and data stores. This challenge is often met with layers of networking hardware and tools resulting in a complex mess, or even worse, a culture of network protectionism that inhibits business innovation.
Tags : 
    
Gigamon
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
The digital era has ushered in a proliferation of data that powers modern businesses. When leveraged properly, organizations are seeing the potential of data to drive better outcomes across all aspects of their business. Using data to support different workflows, analytics, and activities transforms it into data capital — a digital asset that will drive value for the business. The extent to which an enterprise aligns its organization around this data capital mindset — in both the way they use data and the way they invest in data technology — can have lasting impacts on the success of the business. In February 2019, Dell EMC and Intel commissioned Forrester Consulting to evaluate whether the ability to harness and apply data and analytics at every opportunity is fast becoming a prerequisite for success. To test this, Forrester conducted a global survey of 516 IT decision makers. The survey found that companies with more mature data capital practices — leveraging more data types, managin
Tags : 
    
Dell EMC Storage
Published By: TIBCO Software     Published Date: Jul 22, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: Data processing and aggregation Data visualization Statistical/mathematical/machine learning modeling Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software
Published By: AWS     Published Date: Jul 10, 2019
Being able to monitor and respond to patient inquiries quickly and effectively is critical to creating a positive clinical experience and delivering successful products. But compiling and monitoring this data to address customer concerns in a timely way is a challenge when you have disparate sources and systems, global teams, and multiple patients. Read how a top 10 global pharmaceutical company worked with Slalom and AWS to design and implement a unified and globally distributed event and inquiry data reporting system. By combining three types of requests into one solution, the company has improved the customer experience and increased call center and data input operational efficiency by 50%. Learn how to Increase access to relevant data to help inform future or ongoing clinical trials Adapt your existing system development processes to an agile approach Engage with Slalom and AWS throughout the lifecycle of a healthcare engagement
Tags : 
    
AWS
Published By: Group M_IBM Q2'19     Published Date: Jul 01, 2019
The days of data being narrowly defined as highly structured information from a few specific sources is long gone. Replacing that notion is the reality of a wide variety of data types coming from multiple sources, internal and external, to an organization. All of it is in service of providing everyone from IT, to line-of-business (LOB) employees, to C-level executives with insights that can have an immediate and transformative impact.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Jul 01, 2019
The days of data being narrowly defined as highly structured information from a few specific sources is long gone. Replacing that notion is the reality of a wide variety of data types coming from multiple sources, internal and external, to an organization. All of it is in service of providing everyone from IT, to line-of-business (LOB) employees, to C-level executives with insights that can have an immediate and transformative impact.
Tags : 
    
Group M_IBM Q3'19
Published By: Hewlett Packard Enterprise     Published Date: Jun 17, 2019
"Cloud-based predictive analytics platforms are a relatively new phenomenon, and they go far beyond the remote monitoring systems of a prior generation. Three key features differentiate cloud-based predictive analytics — data sharing, scope of monitoring, and use of artificial intelligence/machine learning (AI/ML) to drive autonomous operations. To help familiarize the uninitiated with specifically what types of value these systems can drive, IDC discusses them at some length in this white paper."
Tags : 
    
Hewlett Packard Enterprise
Published By: Schneider Electric     Published Date: Jun 07, 2019
Attracting Investors Webinar: With more than $18 billion in M&A activity in the first half of last year alone, the colocation industry is riding the bubble of rapid growth. Colocation data center providers are being evaluated by a wide range of investors, with varying experience and perspectives. Understanding the evaluation criteria is a critical competency for attracting the right type of investor and investment to your colocation business. Steve Wallage, Managing Director of Broad Group Consulting, has led more than 30 due diligence projects and will discuss specific areas of focus including assessment of financials, management, customers, business plan, competitive positioning and future strategy and exit. By attending this presentation colocation providers will: Hear how investors are assessing colocation providers Understand different types of investor strategy and positioning Explore actual case studies –success stories as well as examples where investors walked away Walk away with a greater understanding of how to not only attract investment, but the right type of investor to propel their business growth
Tags : 
investors, schneider electric, - colocation provider, attracting investors, colo data center
    
Schneider Electric
Published By: IBM APAC     Published Date: May 14, 2019
Machine Learning For Dummies, IBM Limited Edition, gives you insights into what machine learning is all about and how it can impact the way you can weaponize data to gain unimaginable insights. Your data is only as good as what you do with it and how you manage it. In this book, you discover types of machine learning techniques, models, and algorithms that can help achieve results for your company. This information helps both business and technical leaders learn how to apply machine learning to anticipate and predict the future. You will find topics like: - What is machine learning? - Explaining the business imperative - The key machine learning algorithms - Skills for your data science team - How businesses are using machine learning - The future of machine learning
Tags : 
    
IBM APAC
Published By: Intel     Published Date: Apr 09, 2019
Video data is a key part of surveillance as well as many other types of IoT implementations. But video data can be complex and costly to gather, transmit, and analyze. AllGoVision* provides an innovative analytics solution, purpose-built for video data. Powered by Intel® architecture, the solution has been deployed in more than 100 installations in 35 countries. It rapidly analyzes video from surveillance cameras for designated parameters, including specified factors, behavior patterns, motion tracking of people and objects, and environmental monitoring.
Tags : 
    
Intel
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.