Business-Intelligence - Information-Management - White Papers, Case Studies, Videos, Webcasts -
Browse the newest additions to the Information Management section

The Case for Business Analytics in Midsize Firms [ Source: IBM ]

December 2013- This white paper by INC. and sponsored by IBM outlines how affordable solutions and easy implementation put the transformational power of business analytics within reach of almost any organization. Featuring John Lucas, Former Director of Operations, Cincinnati Zoo

OpenStack InfoGraphic Study [ Source: Red Hat ]

December 2013- An IDG Connect survey* of 200 US enterprise decision makers that include guidance on where to start with an OpenStack.

The Agility Gap in Private Cloud Today [ Source: Red Hat ]

December 2013- Is your private cloud truly agile? Is it helping your users overcome their business challenges as quickly and efficiently as possible? Read this whitepaper to find out.

Why Your Cloud Should be Built with Open and Hybrid In Mind [ Source: Red Hat ]

December 2013- This newsletter, featuring Gartner perspectives, investigates strategies and best practices for approaches in gaining the efficiencies and agility of cloud computing your enterprise IT infrastructure, but with consistent controls, governance and reduced complexity required by today's competitive enterprises.

Begin charting your path to your private, enterprise PaaS with the Road to Enterprise PaaS Whitepaper [ Source: Red Hat ]

November 2013- Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.

Surviving The Technical Security Skills Crisis [ Source: IBM ]

November 2013- The security world is a scary place, and it?s getting scarier. Every day brings more risks, threats, customer demands, and regulations. Worse yet, it's becoming more difficult to recruit and retain people who really get it and know how to help. It's time for a new model. A survey conducted by Forrester Consulting and commissioned by IBM shows that security leaders are partnering with managed security services providers in increasing numbers - and the ...

Supply Chain Segmentation Enabled [ Source: GT Nexus ]

November 2013- Today's supply chains -- stretched by globalization, outsourcing, and the rapid proliferation of SKUs and product configurations -- are exceedingly complex. They're also exceedingly hard to manage. Companies know that in order to provide customers with more customization, more service, and more intimacy than ever, they need to segment their supply chain. But most still rely on a "one-size-fits-all" approach.

The future belongs to companies who can reliably and profitably match their supply ...

How A Large Traffic Control Company Simplified Business Intelligence [ Source: Dell Software ]

November 2013- Collecting data for your company is only half the battle. Data becomes truly valuable when it's changed into insights.

In this case study, see how one large traffic analysis and control company turned cumbersome data into powerful analytics, thanks to the Toad Business Suite.

The Promise Of Learning Analytics: Using Data To Drive Student Outcomes [ Source: Dell Software ]

November 2013- American schools are in crisis. Thirty years after the scathing education report A Nation at Risk: The Imperative for Educational Reform, they continue to lag behind much of the developed world in reading, science and math. Only eight countries have lower high school graduation rates. Now, educators are looking to the business world for new methods to boost performance.

Download The Promise of Learning Analytics: Using Data To Drive Student outcomes, a special ...

Prev 25| Next 25
VENDOR INDEX 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

View All Categories

Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management

Development : Architecture & Design, C/C++, Database, Development Tools, Embedded Systems, High Performance Computing, Java, Mobility, Security, Web Development, Windows/.NET, Open Source

Government : Cloud/SaaS, Enterprise Applications, Enterprise Architecture, Federal, Information Management, Leadership, Mobile & Wireless, Policy & Regulation, Security, State & Local

Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers

Healthcare : Policy & Regulation, Leadership, Security & Privacy, Mobile & Wireless, Electronic medical records, Clinical information systems, Administration systems, Interoperability, The Patient

Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services

Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business

Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends

Mobility : 3G Wireless/Broadband, 802.11x, Fixed Mobile Convergence, Mobile Business, Mobile Messaging, Muni Wireless, RFID, Smartphones, Wi-Fi VOIP, Wi-Fi/WiMax, Wireless Security, WLAN

Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds

Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats

Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services

Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services

Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization

Telecom : VOIP, Unified Communications, Voice services, PBXs, Call Centers, Presence, Collaboration Systems, Business, Regulation, Internet policy

Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Office Suite, Open Source, Operating system, Security