CRM Research Library

Powered by Bitpipe.com

Data CollectionResearch

  • Leveraging Endpoint Backup for Legal Holds & E-Discovery

    Sponsored by: Code42

    This white paper highlights the benefits of a backup solution built to handle the requirements of volume, mobility and compliance in a more streamlined and cost-effective way.

  • Recommendations on rolling back government surveillance

    Sponsored by: ComputerWeekly.com

    Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.

  • Social Login 101

    Sponsored by: Gigya

    View this white paper to learn why social login -- with permission-based access to first-party identity data -- is the better option for getting the kind of information that creates relevant cross-channel experiences. Read now to explore the basics of social login, best practices, and benefits for consumers and businesses.

  • MDM and Data Quality for the Data Warehouse

    Sponsored by: Informatica

    This executive brief explains how the combination of master data management (MDM) and data quality (DQ) can significantly enhance the accuracy and reliability of data, enabling timely, confident decisions and accurate reporting.

  • Boosting Enterprise Security with Integrated Log Management

    Sponsored by: IBM

    Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.

  • Big Data and Content Analytics: measuring the ROI

    Sponsored by: ComputerWeekly.com

    Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals.

  • The trust advantage: How to win at big data

    Sponsored by: ComputerWeekly.com

    Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals.

  • Set Your IT Business Up For Success: Achieving Client Satisfaction in the First 30 Days

    Sponsored by: LabTech Software

    Learn the steps you can follow to make the transition as smooth as possible, so you build client confidence fast and evolve from simply being the hired help to being viewed as a trusted advisor and valuable asset to your clients' business.

  • CW buyer's guide: data management

    Sponsored by: ComputerWeekly.com

    A data management platform is a centralised computing system for collecting, integrating and managing large sets of structured and unstructured data from disparate sources. Effective use of such information management systems will provide access to consistent, accurate and current data.

  • Boosting Enterprise Security with Integrated Log Management

    Sponsored by: IBM

    Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.

  • Big Data in Big Companies

    Sponsored by: ComputerWeekly.com

    The International Institute for Analytics (IIA) and SAS, assess how 20 large firms have deployed analytics to generate value from their big data assets.

  • Privacy and Big Data

    Sponsored by: ComputerWeekly.com

    This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data.

  • Security Big Data: Preparing for a Big Data Collection Implementation

    Sponsored by: SearchSecurity.com

    This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.

  • Effectively Analyze SIEM: Data Security School

    Sponsored by: SearchSecurity.com

    This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.

  • Building Your Business Case for Managed File Transfer

    Sponsored by: OpenText

    This whitepaper details the benefits of managed file transfers and how to build an effective business case for implementation.

  • Hitachi High-Throughput with Lustre storage solution

    Sponsored by: Hitachi Data Systems

    This white paper documents how high-throughput data systems can help increase workflow.

  • Hitachi High-Throughput with Lustre storage solution Datasheet

    Sponsored by: Hitachi Data Systems

    This white paper details how a high-throughput data system can handle big data.

  • Packet Capture in High-Speed and Data Center Networks

    Sponsored by: WildPackets, Inc.

    This in-depth webcast explores the impact high-speed networking, changing traffic patterns, and new capture points have on network monitoring today and reveals key places you must capture data to truly achieve the visibility you need to ensure optimal network performance.

  • SAP predictive analysis: What you need to know

    Sponsored by: HP

    Read on to find details about SAPs BusinessObjects Predictive Analysis, including how the NBA used HANA to help cater to stat-hungry fans.

  • VIN Scanning Saves Man Hours

    Sponsored by: Intermec

    Read this case study to learn how this large European shipping company integrated an Intermec Imaging Solution and estimates an annual saving of 25,000 hours on the vehicle logistics work flow. Additional savings are estimated for improving the accuracy of the VIN reading and record keeping.

  • The Total Economic Impact of WANdisco SVN MultiSite

    Sponsored by: WANdisco

    This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months.

  • Managing the Explosion of Medical Data

    Sponsored by: HP & Intel®

    This timely white paper takes an in-depth look at the enormous growth of health care data and offers ways to overcome the challenges associated with it. Specifically, uncover how you can manage and secure the increasingly large data sets every organization is coping with.

  • Taneja Group Solution Brief: High-End Storage For Everyone

    Sponsored by: Exablox

    This white paper explores what SMB and departmental storage buyers should both require and expect from storage solutions to meet their business goals, and how traditional mid- market storage based on old technologies can fall short. Dive in to discover real-life experiences, benefits, cost effectiveness and ease of management

  • Defending Against APTs: Do You Have the Complete Picture?

    Sponsored by: Hexis Cyber Solutions Inc

    Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.

  • How to Meet the Top 5 Data Integration Requirements with Oracle

    Sponsored by: Oracle Corporation

    Combining various sources of data is often challenging, so many businesses today are turning to data integration technologies to gain visibility into all business-critical data. This white paper outlines five fundamental requirements of a successful data integration strategy, and presents a family of products that can help you meet these needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

CRM Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.