Business Intelligence White Papers

Business Intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all of the factors that affect your business. It is imperative that you have an in depth knowledge about factors such as your customers, competitors, business partners, economic environment, and internal operations to make effective and good quality business decisions. Business intelligence enables you to make these kinds of decisions.
Results 1 - 25 of 590Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 09, 2015

This webinar will focus on why analytics matters for all areas of your business, and provide a guide for how exactly to implement analytics in a way that lends itself to action and results.

Tags : ibm, business analytics, data analytics, telecommunications, telecom analytics, ip telephony, network management, mobile computing
    
By: CDW     Published Date: Aug 28, 2015

The deployment of a converged FlexPod infrastructure is already exceeding expectations and facilitating the nonprofit’s ambitious fundraising goals.

Tags : storage, servers, cloud computing, architecture, application integration, application performance management, business management, analytical applications
    
By: CDW     Published Date: Aug 28, 2015

The label company’s newly consolidated server infrastructure takes on a string of global acquisitions — and delivers.

Tags : storage, servers, cloud computing, architecture, application integration, analytical applications, business intelligence, productivity
    
By: IBM     Published Date: Aug 20, 2015

Every day, emails flood our inbox: tasks are left undone, messages go unanswered, and meetings overwhelm us. Why does work have to be such hard work? The truth is, it doesn’t have to be.

Tags : mail, clarity, collaboration, innovation, network, business intelligence, data quality, productivity
    
By: IBM     Published Date: Aug 20, 2015

The workplace—and they way we perform our jobs—is changing rapidly. What is the future of work, and what kinds of tools do you need to navigate it successfully?

Tags : collaboration, communication, competition, cost, management, business intelligence, infrastructure
    
By: NetApp     Published Date: Aug 14, 2015

Cloud trends.

Tags : virtualization, cloud, trends, automation, infrastructure, data center, business intelligence, cloud computing
    
By: NetApp     Published Date: Aug 14, 2015

Evolve integrated and converged infrastructure.

Tags : infrastructure, converged, cloud computing, data center, business intelligence, data protection
    
By: NetApp     Published Date: Aug 14, 2015

Technical case study.

Tags : it challenges, management, cloud computing, case study, networks, business intelligence, infrastructure
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect prominent securities.

Tags : firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt, identity management
    
By: Vectra Networks     Published Date: Aug 03, 2015

The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.

Tags : malware, data, malware, banking, malware sandbox, authentication, two-factor authentication, identity management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.

Tags : threat, data, security, it management, malware, banking, cyber theft, remote access tool
    
By: IBM     Published Date: Jul 31, 2015

Market trends and vendor evaluation criteria.

Tags : security, data, event management, infrastructure, network management, application integration, business intelligence, productivity
    
By: Citrix Systems     Published Date: Jul 17, 2015

Why app and desktop virtualization should be the foundation for your layered approach.

Tags : information security, layered approach, mobility, application, desktop virtualization, application security, compliance, application integration
    
By: Citrix Systems     Published Date: Jul 17, 2015

Reduce the work need to provide better security.

Tags : data, data protection, access control, security task, application, desktop virtualization, compliance, business intelligence
    
By: Citrix Systems     Published Date: Jul 17, 2015

Adoption of mobile devices continues to expand.

Tags : windows, applications, platform, security, performance, application security, business intelligence, employee performance
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.