Find White Papers
Home
About Us
List Your Papers
    
> Technology > Enterprise Applications > Business Intelligence

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Business Intelligence

Business Intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all of the factors that affect your business. It is imperative that you have an in depth knowledge about factors such as your customers, competitors, business partners, economic environment, and internal operations to make effective and good quality business decisions. Business intelligence enables you to make these kinds of decisions.
Results 1 - 25 of 906Sort Results By: Published Date | Title | Company Name
Live Event Published By: destinationCRM.com     Published Date: Mar 25, 2015
The Golden Rule of treating others as you would like to be treated yourself is never more true than in the contact center. Creating an intelligent contact center embodies the essence of the Golden Rule by creating consistent, effective, and efficient methods of delivering customer service, regardless of the customer channel, and being fully integrated with the entire enterprise.
Tags : 
crm, contact center, contact center intelligence, business intelligence, customer data
    
destinationCRM.com
Live Event Published By: destinationCRM.com     Published Date: Mar 18, 2015
According to Forrester Research group, "Personalizing Customer Service Interactions" is among the top key trends facing customer service organizations today and a driving trend in 2015. Knowing a customer's history, communications preferences, and other unique data points is crucial to delivering a personalized and customized experience.
Tags : 
crm, customer data, customer personalization, prospects, business intelligence
    
destinationCRM.com
White Paper Published By: NFP Advisor Services     Published Date: Feb 27, 2015
Stuck in the insurance pigeonhole? Learn the top 5 ways to get out.
Tags : 
insurance, pigeonhole, nfp advisor services, wealth management, ibd advisor survey
    
NFP Advisor Services
White Paper Published By: IBM     Published Date: Feb 24, 2015
This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.
Tags : 
ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions
    
IBM
White Paper Published By: IBM     Published Date: Feb 19, 2015
Refining business processes can be the key to achieving operational excellence.
Tags : 
business analytics, ibm, predictive analytics, performance management, it management
    
IBM
Case Study Published By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation, security
    
F5 Networks Inc
White Paper Published By: IBM     Published Date: Feb 18, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
ibm, release cycles, mobile testing, it management, business activity monitoring
    
IBM
White Paper Published By: IBM     Published Date: Feb 18, 2015
Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.
Tags : 
release management, market trends, customer demands, application deployment, ibm
    
IBM
White Paper Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat
    
Cisco
White Paper Published By: Corvisa LLC     Published Date: Feb 13, 2015
Growing numbers of businesses are moving their contact center operations to the cloud. What do they know that you don’t? This whitepaper provides a practical guide to assist in the decision-making process. It offers a comparison of traditional on-premise systems versus current cloud-based solutions, responds to common cloud concerns and discusses the steps needed to begin your due diligence process.
Tags : 
cloud monitoring, cloud metrics, business analytics, performance monitoring, data
    
Corvisa LLC
White Paper Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies, security
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems
    
IBM
Webinar Published By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : 
uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges
    
IBM
White Paper Published By: Extreme Networks     Published Date: Feb 10, 2015
Dans cet eBook, nous vous présenterons des cas d’utilisation illustrant comment une solution d’analyse des applications peut être utilisée de manière efficace par le service informatique.
Tags : 
extreme networks, purview, analyse des applications, sans fil, wifi
    
Extreme Networks
White Paper Published By: Avaya     Published Date: Feb 06, 2015
This White Paper provides information on how mobile, cloud and UC make perfect business sense. When everyone works together, things get done. Decisions are made faster, actions are taken effectively, and results improve. That’s why tomorrow’s market leaders are acting now to harness the power of Unified Communications and Collaboration tools and unleash the potential of their business.
Tags : 
unified communications, managing uc, uc becoming more powerful and useful, mobile computing, mobile data systems
    
Avaya
White Paper Published By: Avaya     Published Date: Feb 06, 2015
This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.
Tags : 
collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce
    
Avaya
White Paper Published By: Harvard Business School     Published Date: Feb 04, 2015
It’s easy to generate a burst of revenue. But will your strategies deliver consistently high profits over the long term? Discover the risks of strategic inertia and learn how to develop strategies that keep your firm on top—today and tomorrow.
Tags : 
strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation
    
Harvard Business School
White Paper Published By: Harvard Business School     Published Date: Jan 30, 2015
Market leaders build innovative strategies that drive industry change. Harvard Business School’s one-week strategy program for senior executives can help you master strategy development and execution—and set the stage for sustainable competitive advantage.
Tags : 
strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation
    
Harvard Business School
White Paper Published By: Teradata     Published Date: Jan 30, 2015
Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.
Tags : 
hadoop, hadoop adoption, cornerstone, business technology, hadooponomics
    
Teradata
Case Study Published By: Teradata     Published Date: Jan 30, 2015
Enterprise Hadoop Implementation with Teradata and Hortonworks
Tags : 
ncr, big data, data warehouse, enterprise hadoop, hadoop implementation
    
Teradata
Webinar Published By: Teradata     Published Date: Jan 28, 2015
Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.
Tags : 
teradata, business, intelligence, hadoop, data
    
Teradata
White Paper Published By: Entrust     Published Date: Jan 16, 2015
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Tags : 
entrust, malware, history, threat, concern
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application
    
Entrust
White Paper Published By: Comcast     Published Date: Jan 15, 2015
It’s the challenge businesses of every size wrestle with: How to improve employee productivity while driving down costs. Technology can help achieve that goal – when the right tools are used.
Tags : 
comcast, technology, business, blueprint, plan
    
Comcast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search