White Papers

Channel: BI End-User Adoption - Marty Carney RSS Feed for BI End-User Adoption - Marty Carney

 

Displaying 1–15 (of 5450)

Popularity is determined by a calculation of page views and community comments.

Title Date
Get the Most Value Out of Network Security Summary
This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

sponsored by: HP and Intel
12-01-2014
Creating the Omnichannel Customer Experience Summary
Find out how leveraging big data, predictive analytics and real-time decision making can improve the customer experience in today's world of multi-platform, mobile and social consumers.

sponsored by: [24]7 Customer Inc.
10-23-2014
Data Protector Zero Downtime Backup for Oracle adn SAP Summary
Read this white paper to learn about a zero downtime backup solution that helps organization backup large volumes of information without impacting production environment and reduces the IT staff time required to manage backup and recovery.

sponsored by: Hewlett-Packard Limited
10-23-2014
Microsoft Windows Server in a Flash Summary
Read this white paper to learn how you can combine Violin's enterprise-class storage with the ease and capabilities of Windows Storage Server in an integrated solution so you can achieve higher performance and efficiency for your business critical Microsoft applications.

sponsored by: Violin Memory
10-23-2014
Why Business Agility Matters, Right Now Summary
Find out just how important business agility is to your organization's success, as well as systems such as ERP and the supply chain.

sponsored by: IFS
10-23-2014
Mobile App System Bolsters App Health, Boosts Customer Loyalty Summary
View this informative white paper now to learn about one solution that helps provide your business analysts, app developers, IT operations and support teams with complete visibility into your mobile apps.

sponsored by: CA Technologies.
10-23-2014
Business Process Management Suite Gives Key Reporting Summary
View this brochure now to see information on a platform that provides a new generation of open source BPM and BRM solutions. Providing standards-based modeling, automation, simulation and monitoring of business processes, companies can rapidly adjust based on compliance needs.

sponsored by: Red Hat
10-23-2014
How Henry Mayo Newhall Hospital Architected a Roadmap for BI Success Summary
The following white paper highlights several best practices in successful business intelligence deployments that will allow a provider organization to set the stage for quick wins and demonstrable ROI within the first year of BI implementation.

sponsored by: Dimensional Insight, Inc.
10-23-2014
Information-Driven Security through RSA Security Analytics 10.4 and RSA ECAT 4.0 Summary
Learn what CISOs can do to better protect their organizations from security breaches, and why a Big Data security analytics architecture is necessary for threat detection and response.

sponsored by: RSA, The Security Division of EMC
10-23-2014
Breaches Happen: Be Prepared Summary
This exclusive whitepaper will teach you how to protect yourself from damaging attacks and effectively respond to them and unveils the protection and defense life cycle.

sponsored by: Symantec Corporation
10-23-2014
Certified, integrated backup for SAP HANA Summary
Access this white paper to get insight into an enterprise grade backup and recovery solution designed for SAP HANA.

sponsored by: Hewlett-Packard Limited
10-22-2014
Go Beyond SIEM with RSA Security Analytics Summary
Today's security information and event management (SIEM) solutions aren't able to spot attacks and are far too slow to provide useful information. Learn how RSA Security Analytics can help.

sponsored by: RSA, The Security Division of EMC
10-22-2014
Case Study - NVIDIA Enables True SAP Security Summary
This whitepaper explains how NVIDIA, a well-known GPU and SOC technology provider, was able to gain the capabilities needed to effectively manage threats to its SAP systems, perform pre and post audit scans of its whole application environment, and conduct basic scans on a regular basis with continuous monitoring and detection of vulnerabilities.

sponsored by: Onapsis
10-22-2014
The lost opportunity – assessing the impact of OTT services Summary
In this special report for Computer Weekly readers, Juniper Research looks at the challenges and opportunities facing mobile operator business models.

sponsored by: ComputerWeekly.com
10-22-2014
IBM Predictive Maintenance and Quality for metals and mining Summary
The following white paper examines the current market struggles and operational challenges that are being faced by many industrial companies. Read on to learn how by implementing a predictive maintenance and quality solution, businesses can reduce operational costs, improve equipment productivity, and more.

sponsored by: IBM
10-21-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>