White Papers: business intelligence


Sort by: Date | Company | Title


Customer Experience Metrics and KPIs
By Oracle | 27/3/2014
Read this guide to familiarize yourself with important customer experience measurements and Key Performance Indicators (KPIs) along with methods for calculating their value to your business.
Download this now


5 Things to Look for in a Cloud Provider When it Comes to Security
By Oracle | 27/3/2014
Cloud computing is changing the way enterprises do business. Learn about 5 security areas you should ask your cloud provider about during your evaluation process.
Download this now


Forbes: The Secret Sauce of Oracles Commercial Success
By Oracle | 27/3/2014
Forbes Article: Oracle Sales Cloud is the Secret Sauce Behind Oracle's Success Read how Oracle Sales Cloud helped Oracle increase annual revenue to $37 billion.
Download this now


Super Bowl XLVIII: The Social Story
By Oracle | 27/3/2014
This year the Super Bowl and all the surrounding activity just didn’t live up to the hype. The game was a blowout, the commercials were not as strong as previous years, and the broadcast was disappointing. Despite that brands found ways to engage on social channels and extend the reach of their hefty investment. Social messaging became even more paramount in this context when advertisers were reminded that they have no control over the game or audience engagement. This analysis will highlight some of the ways brands used social channels to magnify their investment, driving awareness before the game, and continuing engagement throughout the broadcast. It will also showcase how brands that didn’t drop $4M on an ad buy could still build buzz and participate in the big game conversation. Learn from brands such as Budweiser, T-Mobile, and Esurance and how they took advantage of social engagement.
Download this now


The Value of Social Data
By Oracle | 27/3/2014
Social media provides a wealth of data that can tell you a lot about your brand and your consumers - providing you can effectively act upon that data. According to Digiday, "48% of digital marketing executives say they focus 'relentlessly' on building customer insights, yet few are executing those strategies in meaningful ways." This white paper offers a brief overview of how organizations can best use social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer experience management systems in near real-time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Download this now


IBM X-Force Threat Intelligence
By IBM | 20/3/2014
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM | 20/3/2014
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
Download this now


IBM X-Force Threat Intelligence
By IBM | 20/3/2014
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM | 20/3/2014
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
Download this now


Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
By APC | 20/3/2014
While many who invest in Data Centre Infrastructure Management (DCIM) software benefit greatly, some do not. Research has revealed a number of pitfalls that end users should avoid when evaluating and implementing DCIM solutions. Choosing an inappropriate solution, relying on inadequate processes, and a lack of commitment / ownership / knowledge can each undermine a chosen toolset’s ability to deliver the value it was designed to provide. This paper describes these common pitfalls and provides practical guidance on how to avoid them.
Download this now
Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia