HIT Consultant Insightful coverage of healthcare innovation
 

sas

Results 251 - 275 of 1132Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Apr 21, 2015
This white paper describes the architecture of SAS Marketing Operations Management and various aspects of its deployment and security.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 21, 2015
The synergy of creative work and powerful analytics is the route to impactful, innovative campaigns for iris Worldwide, the global creative innovation network. iris has made this strategy a reality using the advanced analytics capabilities offered by SAS.
Tags : 
    
SAS
Published By: SAS     Published Date: May 24, 2018
Constant market shifts and changing customer preferences add to the challenge of outperforming your competitors and surpassing stakeholder expectations. But what can be done to steer your organization down the path to greater success? By now, we all know it’s not just historical reporting about the past that will provide the answers needed to drive a business forward. Everyone – from executives and analysts to frontline staff – must have access to insights about the future that will enable them to make the best decisions and take the actions needed to keep their organizations agile. This means the ability to peer into data, explore it, understand it, analyze it and produce insights that provide those aha moments and take actions on it. Such things cannot be done with multiple tools that are rigid, limiting and difficult to use. A new breed of business intelligence is required. Gone are the days when reports looked at singular issues, took possibly days or weeks to create, and required
Tags : 
    
SAS
Published By: SAS     Published Date: May 24, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand. Great leaders become great by balancing strategy with tactics, future vision with current reality and strengths with weaknesses – all with the goal of accomplishing a clearly defined objective. Great leaders also understand that people are the most valuable resources within their organization. To drive and inspire their success, you must optimize strengths while recognizing inherent weaknesses. Many of our daily human experiences and interactions involve machines or devices of some sort. Technolo
Tags : 
    
SAS
Published By: SAS     Published Date: May 24, 2018
Ongoing digitization has created vast streams of data, forcing businesses to become more data-driven than ever before. While the benefits of being a data-driven organization are clear (improved performance, more profitability, stronger innovations), there are still some technical and business challenges to overcome. Thanks to technological advancements in data analytics, companies in all types of industries can become data-driven. Read this e-book to discover what it means to be a data-driven organization and to learn the basic do’s and don’ts of how to get there.
Tags : 
    
SAS
Published By: SAS     Published Date: May 24, 2018
For 20 years running, SAS has landed a coveted spot on Fortune’s 100 Best Companies to Work For list. Our HR department plays a critical role in keeping current employees engaged and productive as well as anticipating and preparing for future workforce needs. How? One reason is our use of data and analytics to drive HR decision making. It would be easy to assume other companies see the value of analytics; however, a Deloitte survey found 75 percent of HR leaders rate analytics as a priority, yet only 8 percent say their HR organization has a strong analytics capability. I had the pleasure of meeting David Harcourt, Associate Manager of Employee Insights at Yum! Brands when he spoke at the Analytics Experience 2016 conference in Las Vegas. His session, “HR Analytics from Scratch: 8 Lessons Learned in the First Year,” provided valuable insight into what it takes to build HR analytic competency from scratch. His mission is to share with others what he wishes he’d known when he started bui
Tags : 
    
SAS
Published By: SAS     Published Date: May 24, 2018
Compliance doesn’t have to be a scary word, even when facing the multifaceted challenges of the European Union’s General Data Protection Regulation. In fact, following through with plans for sustainable GDPR compliance can have many long-term benefits for your organization. That's because relying on data-driven decisions across the board sets you on track to gain a competitive edge. In February 2018, SAS conducted a survey with 183 global, cross-industry businesspeople involved with GDPR at their organizations. Based on the survey results, this e-book delves into the biggest challenges and opportunities organizations have faced on the road to GDPR compliance. Read on for advice from industry experts about the best path to compliance. Learn what steps your peers across a variety of industries have already taken and discover how an integrated approach from SAS can continue to guide your journey toward GDPR compliance.
Tags : 
    
SAS
Published By: SAS     Published Date: May 24, 2018
This paper provides an introduction to deep learning, its applications and how SAS supports the creation of deep learning models. It is geared toward a data scientist and includes a step-by-step overview of how to build a deep learning model using deep learning methods developed by SAS. You’ll then be ready to experiment with these methods in SAS Visual Data Mining and Machine Learning. See page 12 for more information on how to access a free software trial. Deep learning is a type of machine learning that trains a computer to perform humanlike tasks, such as recognizing speech, identifying images or making predictions. Instead of organizing data to run through predefined equations, deep learning sets up basic parameters about the data and trains the computer to learn on its own by recognizing patterns using many layers of processing. Deep learning is used strategically in many industries.
Tags : 
    
SAS
Published By: SAS     Published Date: May 24, 2018
Digital transformation is a reality for marketers that is wrapped in both opportunities and headaches. Marketers understand the choices and expectations that their customers now have, and they are up for the challenge. But marketers also have many obstacles to overcome to deliver the consistently good, timely and engaging customer experience, across devices, that customers demand. The good news is that the marketing technology industry is rapidly evolving to address these challenges. And in the same way that consumers have an abundance of choices, marketers also have many options when it comes to choosing partners to help. But where to start, and how to choose the right partners?
Tags : 
    
SAS
Published By: SAS     Published Date: May 24, 2018
Implementing omnichannel marketing is often difficult, especially when using digital channels. Most products designed for digital channels lack the ability to integrate with traditional channels that have on-site processes and data. SAS Customer Intelligence 360 enables businesses to use both cloud and on-site channels and data. This integration is possible because of SAS software’s hybrid cloud architecture.
Tags : 
    
SAS
Published By: SAS     Published Date: Sep 19, 2018
We are offering this second edition resource as a business oriented, working guide to core data management practices. In this ebook you will find easy to digest resources on the value and importance of data preparation, data governance, data integration, data quality, data federation, streaming data, and master data management.
Tags : 
    
SAS
Published By: Aberdeen Group     Published Date: Jun 02, 2011
The focus of this document is to quantify the cost of IT-induced business downtime.
Tags : 
aberdeen, datacenter uptime, roi, disaster recovery, best-in-class, industry average, laggard, sla, service level agreement, business continuity, business interruptions, cost of downtime, data protection
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Jun 02, 2011
Aberdeen has ascertained that companies that backup critical data and systems at remote locations have a faster recovery time from computer-generated business interruptions.
Tags : 
aberdeen, disaster recovery, business disruption, remote data storage, data archiving, data protection
    
Aberdeen Group
Published By: Dell Storage     Published Date: Apr 21, 2011
This white paper describes how Fluid Data storage reduces the capacity required to support VMware, maximizes system performance and efficiency, accelerates storage provisioning, simplifies resource management and streamlines disaster recovery.
Tags : 
dell compellent, vmware server virtualization, compellent san, virtualized storage platform, fluid data storage, system performance, resource management, disaster recovery
    
Dell Storage
Published By: Dell Storage     Published Date: Oct 17, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : 
technology, dell, data protection, data recovery, equallogic, disaster recovery
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 02, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : 
technology, dell, data protection, data recovery, equallogic, disaster recovery
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 08, 2011
This white paper describes how Fluid Data storage reduces the capacity required to support VMware and maximizes system performance and efficiency.
Tags : 
dell compellent, vmware server virtualization, compellent san, virtualized storage platform, fluid data storage, system performance, resource management, disaster recovery
    
Dell Storage
Published By: WatchGuard     Published Date: Oct 17, 2012
The Cisco ASAs and point solutions were not cutting it. The 3-person IT team needed a solid multi-layered solution that was easy to manage and could consolidate many processes within one device. Learn how WatchGuard provided an easy to manage answer.
Tags : 
watchguard, it solution, administrator, it infrastructure, it security, data management, utm, unified threat management
    
WatchGuard
Published By: uberVU via HootSuite     Published Date: Apr 07, 2014
Las empresas tecnológicas se enorgullecen de adoptar antes que otras los portales más innovadores del mercado digital. Las empresas líderes, como IBM, son conscientes de que cuando los diversos departamentos de una empresa utilizan las redes sociales para escuchar a su audiencia y a sus colegas, consiguen más información sobre sus clientes, competidores, industria y comunidades. Descarga este informe técnico para descubrir cómo las redes sociales están creando una nueva era en cuanto a conocimiento del cliente y la industria por parte de las empresas tecnológicas. Además, los cargos directivos de la industria están superando los retos que supone integrar las redes sociales en su organización.
Tags : 
hootsuite, social relationship platforms, it leadership, social media, social media advice, success stories
    
uberVU via HootSuite
Published By: Glasshouse Technologies     Published Date: Oct 31, 2012
Implementing a multi-tiered cloud strategy offers flexibility for protection required for workloads and cost-savings of inexpensive cloud services. Learn how to execute a unified, infrastructure to enable organizations to make the best of cloud.
Tags : 
glasshouse, cloud computing, data center, disaster recovery, infrastructure operations, it consulting
    
Glasshouse Technologies
Published By: McAfee     Published Date: Sep 04, 2014
El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).
Tags : 
siem, big security data, segurança do big data, informações de segurança, ameaças avançadas, ameaças persistentes avançadas, apt, inteligência de segurança, segurança
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
De acordo com o SANS Institute, a maioria das organizações está usando dados sobre eventos de segurança para detectar e monitorar comportamentos suspeitos, auxiliar em análises periciais, bem como cumprir os requisitos regulamentares e comprovar essa conformidade. Porém, fica difícil atingir essas metas de segurança com o número cada vez maior e a natureza sofisticada dos ataques. À medida que a disputa entre a segurança e os hackers continua, a McAfee conta com os recursos de que as empresas precisam para manter seus dados seguros e identificar ataques e vulnerabilidades. De acordo com o SANS, a força do McAfee ESM vem da sua facilidade de uso, da velocidade e da flexibilidade na definição de regras e correlações.
Tags : 
siem, armazenamento de dados, análise de eventos, ataques, análise pericial, segurança
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas
    
McAfee
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.