CRM Research Library

Powered by Bitpipe.com

Data CollectionResearch

  • MDM and Data Quality for the Data Warehouse

    Sponsored by: Informatica

    This executive brief explains how the combination of master data management (MDM) and data quality (DQ) can significantly enhance the accuracy and reliability of data, enabling timely, confident decisions and accurate reporting.

  • Concur Travel and Expense solution

    Sponsored by: Concur Technologies

    This guide talks about a solution that allows users to capture all of their travel and expense information digitally and present it all in an accurate automated report.

  • Boosting Enterprise Security with Integrated Log Management

    Sponsored by: IBM

    Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.

  • Can you standardize enterprise backup?

    Sponsored by: Dell Software

    This E-Guide gives information on the current state of the backup application processes of most organizations. Most are utilizing multiple backup applications, and many would prefer to standardize one for all purposes. This talks about why that isn’t usually possible and what can be done to consolidate instead.

  • Big Data and Content Analytics: measuring the ROI

    Sponsored by: ComputerWeekly.com

    Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals.

  • The trust advantage: How to win at big data

    Sponsored by: ComputerWeekly.com

    Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals.

  • Set Your IT Business Up For Success: Achieving Client Satisfaction in the First 30 Days

    Sponsored by: LabTech Software

    Learn the steps you can follow to make the transition as smooth as possible, so you build client confidence fast and evolve from simply being the hired help to being viewed as a trusted advisor and valuable asset to your clients' business.

  • Automation Suite for NERC CIP Compliance

    Sponsored by: LogRhythm, Inc.

    Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.

  • Security Intelligence: Ensure Compliance, Optimize Performance, Boost Security

    Sponsored by: LogRhythm, Inc.

    Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.

  • Big Data Intersection with Security Analytics

    Sponsored by: LogRhythm, Inc.

    This webcast explores the impact the looming intersection of big data and security analytics will have on your organization and explores why you should be looking forward to it.

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: LogRhythm, Inc.

    This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs.

  • CW buyer's guide: data management

    Sponsored by: ComputerWeekly.com

    A data management platform is a centralised computing system for collecting, integrating and managing large sets of structured and unstructured data from disparate sources. Effective use of such information management systems will provide access to consistent, accurate and current data.

  • Boosting Enterprise Security with Integrated Log Management

    Sponsored by: IBM

    Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.

  • Big Data in Big Companies

    Sponsored by: ComputerWeekly.com

    The International Institute for Analytics (IIA) and SAS, assess how 20 large firms have deployed analytics to generate value from their big data assets.

  • Privacy and Big Data

    Sponsored by: ComputerWeekly.com

    This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data.

  • Building Your Business Case for Managed File Transfer

    Sponsored by: OpenText

    This whitepaper details the benefits of managed file transfers and how to build an effective business case for implementation.

  • Hitachi High-Throughput with Lustre storage solution

    Sponsored by: Hitachi Data Systems

    This white paper documents how high-throughput data systems can help increase workflow.

  • Hitachi High-Throughput with Lustre storage solution Datasheet

    Sponsored by: Hitachi Data Systems

    This white paper details how a high-throughput data system can handle big data.

  • Packet Capture in High-Speed and Data Center Networks

    Sponsored by: WildPackets, Inc.

    This in-depth webcast explores the impact high-speed networking, changing traffic patterns, and new capture points have on network monitoring today and reveals key places you must capture data to truly achieve the visibility you need to ensure optimal network performance.

  • SAP predictive analysis: What you need to know

    Sponsored by: HP

    Read on to find details about SAPs BusinessObjects Predictive Analysis, including how the NBA used HANA to help cater to stat-hungry fans.

  • VIN Scanning Saves Man Hours

    Sponsored by: Intermec

    Read this case study to learn how this large European shipping company integrated an Intermec Imaging Solution and estimates an annual saving of 25,000 hours on the vehicle logistics work flow. Additional savings are estimated for improving the accuracy of the VIN reading and record keeping.

  • The Total Economic Impact of WANdisco SVN MultiSite

    Sponsored by: WANdisco

    This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months.

  • Managing the Explosion of Medical Data

    Sponsored by: HP & Intel®

    This timely white paper takes an in-depth look at the enormous growth of health care data and offers ways to overcome the challenges associated with it. Specifically, uncover how you can manage and secure the increasingly large data sets every organization is coping with.

  • Taneja Group Solution Brief: High-End Storage For Everyone

    Sponsored by: Exablox

    This white paper explores what SMB and departmental storage buyers should both require and expect from storage solutions to meet their business goals, and how traditional mid- market storage based on old technologies can fall short. Dive in to discover real-life experiences, benefits, cost effectiveness and ease of management

  • Defending Against APTs: Do You Have the Complete Picture?

    Sponsored by: Hexis Cyber Solutions Inc

    Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

CRM Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.