Corporate Dashboards Reports

Log Management Best Practices
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: In this presentation transcript, find out best practices in log management and how it affects the use of security dashboards. Also learn how log management differs from security information and event management (SIEM).
Posted: 14 Apr 2010 | Published: 14 Apr 2010

Hewlett Packard Enterprise

Delivering OLAP Analytics with Oracle Business Intelligence Enterprise Edition 11g
sponsored by Oracle Corporation
PRODUCT DEMO: This product demo illustrates the processes and benefits inherent in a BI solution that provides a common, unified environment that combines OLAP and relational-style analysis for a faster and more in-depth decision process.
Posted: 16 Dec 2010 | Premiered: 16 Dec 2010

Oracle Corporation

BI Without a Data Warehouse? An Effective Strategy for Midsize Companies
sponsored by IBM
WEBCAST: In this webcast, you’ll learn about a new generation of business intelligence (BI) solutions designed to take on reporting, analysis, dashboarding, scorecarding, planning, budgeting and forecasting projects while remaining affordable.
Posted: 03 Jun 2010 | Premiered: Jun 29, 2010, 11:00 EDT (15:00 GMT)

IBM

HP IT Performance Suite: Perform Better
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Your business' IT tools interact with many different facets of your business. While these tools are helpful for automating processes and streamlining business, they also need management. Read on to discover a way to monitor your business performance in conjunction with IT tools.
Posted: 21 Feb 2012 | Published: 21 Feb 2012

Hewlett Packard Enterprise

Business Process Management Today: Putting theory into practice
sponsored by ebizQ
EZINE: In this special issue, SearchSOA looks at elements that drive the fervent interest in BPM today, with a special focus on the problems teams run into when they convert theory into practice. Read about workflow do’s and don’ts, BAM strategies, and CEP implementation challenges in this first edition of SearchSOA’s BPM quarterly.
Posted: 11 Aug 2010 | Published: 10 Aug 2010

All resources sponsored by ebizQ

E-Book: Business Intelligence Best Practices and Strategies in SAP Environments
sponsored by IBM
EBOOK: As companies look to get more value from their SAP application investments, BI is hot. But for SAP customers, it’s also a confusing area. In the e-book, readers will learn best practices for forming a BI strategy in SAP environments, including whether to stick with BEx and what to do with BW.
Posted: 27 Dec 2010 | Published: 27 Dec 2010

IBM

7 Criteria to Consider When Embedding BI
sponsored by Tableau Software
WHITE PAPER: Though there’s no simple answer to “buy or build,” there are criteria — seven, in fact, that can guide you to make a well informed decision. This paper helps you identify and evaluate each one.
Posted: 16 Aug 2010 | Published: 16 Aug 2010

Tableau Software

SearchBusinessAnalytics.com eGuide: Building a predictive analytics program
sponsored by IBM
EGUIDE: In this expert e-guide, you’ll gain insight into real-world predictive analytics projects and receive advice on how to organize a predictive analytics program. Learn to develop and utilize predictive models in your business operations
Posted: 26 Sep 2011 | Published: 26 Sep 2011

IBM

E-Book: Best Practices for Buying Business Intelligence Technology
sponsored by IBM
EBOOK: The BI market offers a dizzying array of technology options. From collecting organizational requirements, writing RFPs, conducting evaluations and running proof of concept projects, there is a lot involved in BI purchases. Read on to get straightforward advice from industry analysts and expert practitioners.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

IBM

User Behavioral Analytics Tools Can Thwart Security Attacks
sponsored by Preempt Security
EGUIDE: Inside this expert e-guide, Johna Till Johnson explores the emerging world of User Behavioral Analytics (UBA) and how it can give you a clear view into what should, and what should not, be going on in your virtual environment. Inside you'll find a breakdown of the features a UBA provides, and a basic deployment plan to get your program running.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Preempt Security