Business Intelligence White Papers

Business Intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all of the factors that affect your business. It is imperative that you have an in depth knowledge about factors such as your customers, competitors, business partners, economic environment, and internal operations to make effective and good quality business decisions. Business intelligence enables you to make these kinds of decisions.
Results 1 - 25 of 875Sort Results By: Published Date | Title | Company Name
By: destinationCRM.com     Published Date: Mar 25, 2015

The Golden Rule of treating others as you would like to be treated yourself is never more true than in the contact center. Creating an intelligent contact center embodies the essence of the Golden Rule by creating consistent, effective, and efficient methods of delivering customer service, regardless of the customer channel, and being fully integrated with the entire enterprise.

Tags : crm, contact center, contact center intelligence, business intelligence, customer data, customer service, customer interaction service, customer experience management
    
By: destinationCRM.com     Published Date: Mar 18, 2015

According to Forrester Research group, "Personalizing Customer Service Interactions" is among the top key trends facing customer service organizations today and a driving trend in 2015. Knowing a customer's history, communications preferences, and other unique data points is crucial to delivering a personalized and customized experience.

Tags : crm, customer data, customer personalization, prospects, business intelligence, customer interaction service, customer relationship management, social media marketing
    
By: IBM     Published Date: Feb 24, 2015

This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.

Tags : ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions, it management, knowledge management, data management
    
By: IBM     Published Date: Feb 19, 2015

Refining business processes can be the key to achieving operational excellence.

Tags : business analytics, ibm, predictive analytics, performance management, it management, knowledge management, best practices, business intelligence
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.

Tags : ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection
    
By: IBM     Published Date: Feb 18, 2015

TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.

Tags : ibm, release cycles, mobile testing, it management, business activity monitoring, business intelligence
    
By: IBM     Published Date: Feb 18, 2015

Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.

Tags : release management, market trends, customer demands, application deployment, ibm, it management, knowledge management, business analytics
    
By: Corvisa LLC     Published Date: Feb 13, 2015

Growing numbers of businesses are moving their contact center operations to the cloud. What do they know that you don’t? This whitepaper provides a practical guide to assist in the decision-making process. It offers a comparison of traditional on-premise systems versus current cloud-based solutions, responds to common cloud concerns and discusses the steps needed to begin your due diligence process.

Tags : cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics, data management
    
By: IBM     Published Date: Feb 11, 2015

IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.

Tags : ibm security, business-centric strategies, security solutions, it policies, security, it management, business intelligence, business management
    
By: IBM     Published Date: Feb 11, 2015

IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.

Tags : security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems, security, business intelligence, risk management
    
By: IBM     Published Date: Feb 11, 2015

Medical Device companies have typically shied away from design reuse because of the fear of a single point of failure. However due to market pressures, more and more medical device companies must embrace reuse to increase time to market. Unlike common perception, strategic and effective reuse can actually benefit regulated industries like medical devices by expediting compliance. This webcast will discuss the benefits of reuse as well as concepts of continuous engineering that can improve quality for medical devices.

Tags : design reuse, reuse, continuous engineering, medical device quality, compliance regulations, business analytics, business intelligence, product lifecycle management
    
By: IBM     Published Date: Feb 11, 2015

Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.

Tags : uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges, it management, platforms, business analytics
    
By: Extreme Networks     Published Date: Feb 10, 2015

Dans cet eBook, nous vous présenterons des cas d’utilisation illustrant comment une solution d’analyse des applications peut être utilisée de manière efficace par le service informatique.

Tags : extreme networks, purview, analyse des applications, sans fil, wifi, solution réseau, solution de business intelligence, business intelligence
    
By: Avaya     Published Date: Feb 06, 2015

This White Paper provides information on how mobile, cloud and UC make perfect business sense. When everyone works together, things get done. Decisions are made faster, actions are taken effectively, and results improve. That’s why tomorrow’s market leaders are acting now to harness the power of Unified Communications and Collaboration tools and unleash the potential of their business.

Tags : unified communications, managing uc, uc becoming more powerful and useful, mobile computing, mobile data systems, application integration, business integration, business intelligence
    
By: Avaya     Published Date: Feb 06, 2015

This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.

Tags : collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce, improving the customer experience, collaboration technology, virtual landscape
    
By: Harvard Business School     Published Date: Feb 04, 2015

It’s easy to generate a burst of revenue. But will your strategies deliver consistently high profits over the long term? Discover the risks of strategic inertia and learn how to develop strategies that keep your firm on top—today and tomorrow.

Tags : strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation, formulate action plans, harvard business school, executive education
    
By: Harvard Business School     Published Date: Jan 30, 2015

Market leaders build innovative strategies that drive industry change. Harvard Business School’s one-week strategy program for senior executives can help you master strategy development and execution—and set the stage for sustainable competitive advantage.

Tags : strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation, formulate action plans, harvard business school, executive education
    
By: Teradata     Published Date: Jan 30, 2015

Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.

Tags : hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications, data management
    
By: Teradata     Published Date: Jan 30, 2015

Enterprise Hadoop Implementation with Teradata and Hortonworks

Tags : ncr, big data, data warehouse, enterprise hadoop, hadoop implementation, teradata, hortonworks, performance data
    
By: Teradata     Published Date: Jan 28, 2015

Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.

Tags : teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce
    
By: Avaya     Published Date: Jan 23, 2015

This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.

Tags : collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce, improving the customer experience, collaboration technology, virtual landscape
    
By: Entrust     Published Date: Jan 16, 2015

Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.

Tags : entrust, malware, history, threat, concern, virus, sql, stuxnet
    
By: Entrust     Published Date: Jan 16, 2015

Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.

Tags : entrust, security, certificate, b2b, application, browser, applications, saas
    
By: Entrust     Published Date: Jan 16, 2015

If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.

Tags : entrust, security, certificate, b2b, application, browser, applications, saas
    
By: Comcast     Published Date: Jan 15, 2015

It’s the challenge businesses of every size wrestle with: How to improve employee productivity while driving down costs. Technology can help achieve that goal – when the right tools are used.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End