White Papers

Channel: Business Intelligence - Claudia Imhoff RSS Feed for Business Intelligence - Claudia Imhoff

 

Displaying 1–15 (of 8482)

Popularity is determined by a calculation of page views and community comments.

Title Date
In 2017, the insider threat epidemic begins Summary
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

sponsored by: ComputerWeekly.com
02-28-2017
5 Must-Haves when Choosing a Software Development Partner Summary
This white paper explores how development has changed thanks to trends like DevOps adoption, Agile, and cloud migration. Discover how these changes impact the decision to use a software development partner and uncover 5 must-haves qualities in potential partners.

sponsored by: Sphere Consulting Inc
02-28-2017
Computer Weekly – 28 February 2017: Navigating software licences Summary
In this week's Computer Weekly, after SAP won a court case against a major customer, Diageo, over software charges, we look at what this means for users. We talk to the IT consultancy that recruits only autistic IT professionals. And we look at the CIO's big challenges for the year. Read the issue now..

sponsored by: ComputerWeekly.com
02-28-2017
Modern Warehouse Management for the New Fulfillment Economy Summary
Unaligned processes, technologies and corporate structures affect warehouse operations and the customer experience. Learn how to avoid these issues with cloud warehouse management tools.

sponsored by: Oracle Corporation
02-28-2017
Ecogas: Fueling Rapid Growth and Building Game-Changing Analytics Capabilities Summary
Learn how Ecogas replaced their legacy systems with SAP HANA and sped up payment processing by 73%.

sponsored by: IBM
02-28-2017
IDC: Who Can Benefit from SAP HANA Database and S/4HANA on Power? Summary
In this IDC report, you'll discover ways to realize performance improvements and ROI with reduced-complexity applications like an SAP HANA in-memory database.

sponsored by: IBM
02-27-2017
Disaster Recovery Guide: DR in Virtualized Environments Summary
Download this essential DR guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity in 2017, especially for modern, virtualized environments and the public cloud. Additionally, view a BD/DR technology comparison, and fully automated replication architecture.

sponsored by: Macquarie Cloud Services
02-27-2017
Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms Summary
Digital remote monitoring has evolved to become cloud-based and involve multiple channels, but this opens you up to attack. Access this white paper for an overview of secure development lifecycle (SDL) and 8 key practices that will enable you to design and build your data center remote monitoring platform without putting your security at risk.

sponsored by: APC by Schneider Electric
02-27-2017
5 Tech Trends Redefining The Customer Experience Summary
The defined customer experience is always changing. With the growth of the digital era, it's important to shift your business in the right way – and interact with your customers the way they want. In this white paper, discover the 5 biggest tech trends that are redefining the customer experience, and learn how to harness them for your business.

sponsored by: Genesys
02-27-2017
The new EUsecurityrequirements and you Summary
This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.

sponsored by: Symantec & Blue Coat Systems
02-27-2017
The Disruptive Power of SAP HANA Summary
SAP HANA and S/4HANA are key enablers of a quick, easy, flexible handling of data. Learn how to define and meet customer needs with this approach.

sponsored by: IBM
02-27-2017
3 Steps to Improving Incident Response Summary
Learn why 68% of companies want incident response tools that can detect and fully assess threats that infiltrate from an array of devices and geographies.

sponsored by: Symantec & Blue Coat Systems
02-27-2017
Building a Business Case for Project Portfolio Management Summary
This white paper explores how to build a business case for PPM that demonstrates ROI. Discover how PPM delivers value for each level of your organization and find out how to achieve 5 common project management goals including define PPM standards, metrics, and governance, enhance prioritization, and 3 more.

sponsored by: Innotas by Planview
02-24-2017
How App Refactoring is Changing Mobile App Development and Modernization Summary
Access this paper to discover how PowWow Mobile's acquisition of StarMobile is revitalizing the refactoring market and facilitating the transformation of Windows and web apps for mobile. Discover how refactoring technology is making it easier and simpler to build key native mobile apps.

sponsored by: PowWow
02-24-2017
Enable The Future of Your Business with This Family of All-Flash Arrays Summary
Data is a major business asset. In this white paper, discover a family of all-flash storage arrays that are specifically designed to deliver you high performance, low latency flash storage at an affordable cost, and which includes integrated fraud prevention, and more.

sponsored by: IBM
02-24-2017

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>