it data collection

Results 1 - 25 of 47Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Sep 30, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: Find out why de-identification does not always mean anonymity Understand how privacy by design can be used for standards and product or service creation Discover how gathering just data you need will minimize the privacy impact of collection Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 26, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: • Find out why de-identification does not always mean anonymity • Understand how privacy by design can be used for standards and product or service creation • Discover how gathering just data you need will minimize the privacy impact of collection • Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: SDL     Published Date: Sep 20, 2019
Component Content Management: A New Paradigm in Intelligent Content Services While technology has changed the world, the way that companies manage information has inherently stayed the same. The advent of near-ubiquitous connectivity among applications and machines has resulted in a data deluge that will fundamentally alter the landscape of content management. From mobile devices to intelligent machines, the volume and sophistication of data have surpassed the ability of humans to manage it with outdated methods of collection, processing, storage, and analysis. The opportunity afforded by the advent of artificial intelligence (AI) has stimulated the market to search for a better way to capture, classify, and analyze this data in its journey to digital transformation (DX). The paradigm of document-based information management has proven to be a challenge in finding, reusing, protecting, and extracting value from data in real time. Legacy systems may struggle with fragmented information
Tags : 
    
SDL
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
Local and regional governments around the world are using the cloud to transform services, improve their operations, and reach new horizons for citizen services. The Amazon Web Services (AWS) cloud enables data collection, analysis, and decision making for smarter cities. This whitepaper provides strategic considerations for local and regional governments to consider as they identify which IT systems and applications to move to the cloud. Real examples that show how cities can stop wasting money, move faster, and innovate.
Tags : 
    
Amazon Web Services EMEA
Published By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
    
Gigamon
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 29, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: VMware     Published Date: Apr 09, 2019
To help their business clients unleash innovation and support growth, IT teams need to evolve to a modern data center that is virtualized, software defined and automated, with a consistent operational model for infrastructure and application delivery. In this collection of case studies, we reveal how companies are building more agile, innovative businesses based on VMware solutions.
Tags : 
    
VMware
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: IBM     Published Date: Jun 25, 2018
Vast resources of data are increasingly available, but the sheer volume can overwhelm human capability. By implementing the cognitive system of IBM Watson Discovery into their infrastructure, businesses can extract deeper and more accurate insights by efficiently identifying, collecting and curating structured and unstructured data. Watson Discovery, also capable of creating content collections and custom cognitive applications, can transform organizational processes to extend proprietary content and expert knowledge faster and at greater scales. Read more to learn how Watson Discovery can keep your organization evolving ahead of the competition. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 04, 2018
"What would you do if you didn’t have to rely on disparate analytics solutions to meet the needs of business users while following the rules of IT? View this 'Charting Your Analytical Future' webinar to learn about a world of innovation and independence for users that does not limit the confidence and controls of IT. With the cognitive-guided self-service features available in IBM business analytics solutions, more users than ever before can get the answers they need. Next-generation business analytics capabilities make it possible to access relevant data, prepare it for analysis and understand performance. But it doesn’t stop there. Users can package the results in a visually-appealing format and share them throughout the organization. Don’t miss this opportunity to hear how you can: * Benefit from advanced analytics without the complexity * Operationalize insights and dashboards from a collection of trusted data sources * Tell your story with rich visualizations and geospati
Tags : 
business analytics, analytics solutions
    
IBM
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: Tableau     Published Date: Apr 13, 2018
In this whitepaper, discover the benefits of expanding your analytics toolkit. Combine Excel’s data collection and management capabilities with Tableau’s intuitive, analytical power to transform your raw data into actionable insights. Focus on the questions that take your data beyond the spreadsheet. Read more at about this partnership.
Tags : 
    
Tableau
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Your customers are asking for it. Your developers are ready for it. Your operations team is demanding it. What’s behind this momentum? Software-as-a-Service (SaaS) is a fundamental shift away from traditional software licensing to a market-driven subscription model. Keystone engaged 20 ISVs who successfully transitioned to a SaaS model, and found: New customer segments open thanks to lower adoption and operating costs. With less complex infrastructure under SaaS, customer TCO drops. ISV products improve with value-added cloud services and SaaS data capabilities. Financial predictability improves with recurring revenue model. New pricing models aligns ISV value to customers’ business needs, driving increased revenue. Additional, significant operational benefits from switching to a SaaS model. Fill out the form at right to get the free report, The Shift to SaaS: A high-value opportunity for ISVs. The collection of product usage data increases the speed of product development by 33%. –
Tags : 
    
Microsoft Azure
Published By: SAS     Published Date: Apr 04, 2018
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
    
SAS
Published By: UPS     Published Date: Sep 05, 2017
Our active and actively aging population is the dichotomy fueling significant growth for implantable medical devices. Innovations focused on mobility, engagement and quality of life are directly targeting this growing population. The implantable medical device industry is poised to capitalize on these unique needs, while simultaneously meeting unprecedented cost pressures. It is time for manufacturers to seek expertise in inventory management and logistics for greater visibility, control and profitability. For implantable medical device manufacturers to be as active and healthy as the patients they serve, their future depends on the ability to differentiate products — not only by price, but through cost, service and documented outcomes. New trends in personal health tracking keep patients moving, and data collection will similarly improve the health of your business.
Tags : 
medical devices, inventory management, logistics, clinical outcomes data, ups
    
UPS
Published By: Dassault Systèmes     Published Date: Jul 21, 2017
Project management relies primarily on past performance to predict future results, however many companies still lack forward-looking capabilities to predict project outcomes and ensure success. Enhancing project management with PLM analytics offers the opportunity to switch from task-based activities to performance-driven ones to improve success rates. Use PLM Analytics to: • Gain actionable insight and valuable intelligence • Dramatically boost business value and improve project management performance • Reduce error-prone behavior like manual data collection • Leverage big-data capabilities and project intelligence Learn how to extend the value of your PLM investment and improve business performance for your company.
Tags : 
product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed, manufactures
    
Dassault Systèmes
Published By: Veritas & PureStorage     Published Date: Jun 23, 2017
As flash costs continue to drop and new, flash-driven designs help to magnify the compelling economic advantages AFAs offer relative to HDD-based designs, mainstream adoption of AFAs —first for primary storage workloads and then ultimately for secondary storage workloads — will accelerate. Well-designed AFAs that still leverage legacy interfaces like SAS will be able to meet many performance requirements over the next year or two. Those IT organisations that aim to best position themselves to handle future growth will want to look at next-generation AFA offerings, as the future is no longer flash-optimised architectures (implying that HDD design tenets had to be optimised around) — it is flash-driven architectures.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
Veritas & PureStorage
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Teradata     Published Date: May 02, 2017
Constellation Research presents case studies of two companies that cut costs, gained flexibility, and eased administration by adding cloud data warehouse capacity to their on-premises environment. Both of these deployments: • Solved problems and yielded expected and unexpected benefits • Required some adjustments to administrative processes and expectations • Led to hybrid architecture as being an invaluable aspect of their respective data warehousing strategies Download the case studies now to explore each company’s journey, understand recurring themes, and walk away with actionable insights.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
Teradata
Published By: SAS     Published Date: Apr 25, 2017
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
    
SAS
Published By: IBM     Published Date: Apr 18, 2017
Are you looking to add new data domains or solve new business problems? IBM InfoSphere MDM comprises a complete MDM suite with multi-domain MDM capabilities and built-in domain patterns. IBM offers several editions of InfoSphere MDM, each designed to integrate with your existing architectures and business processes. You can choose the platform that best meets your immediate and long-term needs.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
IBM
Published By: HPE Intel     Published Date: Feb 17, 2016
Strategies for State, Local, and Education IT Management View this webinar to learn about how the explosive growth of data calls for new approaches from IT management. You'll hear from a panel of state, local, and education IT decision makers how increasing scale and complexity of data collection and storage are challenging their departments to adapt. Participants: Mark Meyers is the CTO and DIS Director of the state of Arkansas Dr. Paul Kim is the CTO and Assistant Dean of the Graduate School Education at Stanford University Leo Leung is the VP of Corporate Marketing at Scality Bob Schaar is the Segment Solutions Leader for SLED and SMB at Hewlett Parckard Enterprise Wyatt Kash is the VP of Content Strategy at Fedscoop
Tags : 
    
HPE Intel
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.