> Technology > Data Management > Data Quality
 

Data Quality

Data Quality refers to the quality of data. Data are of high quality "if they are fit for their intended uses in operations, decision making and planning" (J.M. Juran). Alternatively, the data are deemed of high quality if they correctly represent the real-world construct to which they refer. These two views can often be in disagreement, even about the same set of data used for the same purpose.
Results 1 - 25 of 302Sort Results By:Published Date | Title | Company Name
White Paper Published By: WNS     Published Date: Apr 05, 2017
The client is one of the world's leading insurance companies. In 2007, the client embarked on a journey to transform its actuarial function. The objective was to improve the operational efficiencies and accuracy of actuarial reporting, while meeting tight timelines and reducing operational costs.
Tags : 
insurance, reporting, wns, wns solution, data
    
WNS
White Paper Published By: CyrusOne     Published Date: Jul 06, 2016
The "build-or-buy" decision between construction and colocation should be weighed carefully. This executive report will review six key factors that affect that choice, some of which extend beyond a basic TCO analysis.
Tags : 
cyrusone, colocation, hosting, data center, storage
    
CyrusOne
White Paper Published By: VMware AirWatch     Published Date: May 25, 2016
L’une des questions que de nombreux clients se posent récemment est « Comment Office 365 est-il pris en charge par VMware AirWatch® ? » Beaucoup se demandent si AirWatch peut contrôler l’accès à Office 365 (O365) non seulement sur leurs systèmes de Bureau d’entreprise mais surtout sur leurs terminaux mobiles. VMware AirWatch apporte un soutien complet aux organisations qui souhaitent utiliser O365 sur leurs terminaux mobiles. Notre récente intégration à VMware Identity Manager fournit un cadre de contrôle d’accès adaptatif pour s’assurer que toutes les applications professionnelles, dont O365, sont uniquement consultées depuis des terminaux gérés et conformes.
Tags : 
airwatch, best practices, competitive advantage, productivity, business analytics
    
VMware AirWatch
Webinar Published By: Cisco     Published Date: Mar 07, 2016
Find out how the Internet of Things (IoT) is changing manufacturing.
Tags : 
iot, plant networks, connected factory, reducing costs, quality management
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 23, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video
Tags : 
cloud computing, cisco, contact center, best practices, cloud network
    
Cisco
White Paper Published By: Dell EMC     Published Date: Nov 03, 2015
View the infographic to see why head to head against the competition, Isilon wins every time.
Tags : 
emc, data storage, unstructured data, isilon, nas
    
Dell EMC
White Paper Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection
    
IBM
Webinar Published By: IBM     Published Date: Oct 06, 2015
Learn how IBM can help you proactively safeguard your data, productivity, and reputation.
Tags : 
ibm, data protection, security, data security, ibm solutions
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2015
Diverse and proliferating data relationships are a source of growing security concern.
Tags : 
enterprise, security organization, compliance, internet security, intrusion prevention
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2015
It’s one thing to buy into the current belief that data and analytics can transform business. It’s another thing to live it.
Tags : 
cloud, engagement, customer retention, digital channel, data
    
IBM
Webinar Published By: IBM     Published Date: Sep 29, 2015
What kinds of tools do you need to navigate successfully?
Tags : 
collaboration, tools, communication, millennial, analytics
    
IBM
White Paper Published By: Oracle     Published Date: Sep 09, 2015
1,275 finance executives survey shows adopting emerging technologies drives insights and value to their businesses.
Tags : 
cloud based system, social, mobile, oracle, data quality
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 09, 2015
1,275 finance executives survey shows adopting emerging technologies drives insights and value to their businesses.
Tags : 
oracle, procurement, social, strategy, data quality
    
Oracle
White Paper Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Video conferencing has long been thought of as the technology for the other half, something to be used by the Fortune 500 companies and executives in corner offices, the ones handling mergers and acquisitions and the like—not something that the average business could afford or make use of. In the last few years, however, a series of technological advances have changed that notion, making video conferencing not only a viable technology for businesses of all sizes but a necessity.
Tags : 
business processes, compatibility, costs, quality, network management
    
LifeSize, a division of Logitech
Webinar Published By: Cisco     Published Date: Aug 27, 2015
See how factories, utility companies, railroads, and other organizations are taking advantage of Internet of Things technology.
Tags : 
connected factory, internet of things, iot solutions, data management, convergence
    
Cisco
White Paper Published By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : 
unified communication, communication trends, midsize business, byod, bring your own device
    
Cisco
White Paper Published By: Cisco     Published Date: Aug 27, 2015
Read this whitepaper to learn how top 8 ways video conferences are helping companies improve their business advantage.
Tags : 
video conferencing, business intelligence, collaboration management, forbes insights, online conferencing methods
    
Cisco
White Paper Published By: Cisco     Published Date: Aug 27, 2015
Gartner's evaluation of 16 contact center infrastructure (CCI) vendors in its 2015 CCI Magic Quadrant report.
Tags : 
contact center infrastructure, unified communication, infrastructure management, crm, customer relationship management
    
Cisco
Webinar Published By: Enterprise Management Associates     Published Date: Aug 25, 2015
This webinar talks about various issues organization's deal with on a daily basis and how Hadoop can offer solutions.
Tags : 
ema, hadoop, big data analytics, predictive insights, data lake architecture
    
Enterprise Management Associates
Webinar Published By: IBM     Published Date: Aug 20, 2015
Every day, emails flood our inbox: tasks are left undone, messages go unanswered, and meetings overwhelm us. Why does work have to be such hard work? The truth is, it doesn’t have to be.
Tags : 
mail, clarity, collaboration, innovation, network
    
IBM
White Paper Published By: NetApp     Published Date: Aug 14, 2015
Data backup and recovery is a critical priority.
Tags : 
data quality, cloud computing, infrastructure, infrastructure management
    
NetApp
Case Study Published By: Dell EMC     Published Date: Aug 04, 2015
Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO
Tags : 
vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation
    
Dell EMC
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Tags : 
threat, data, security, it management, malware
    
Vectra Networks
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.