research analysis

Results 76 - 84 of 84Sort Results By: Published Date | Title | Company Name
Published By: PdMA Corporation     Published Date: Jun 23, 2008
Over the past 20 years, Current Signature Analysis (CSA) has become an established tool for online fault analysis of AC Induction motors. Presently, very little research has been performed using current signature analysis on DC motors. This paper is a brief introduction to online fault diagnosis of DC motors using current signature analysis.
Tags : 
motor, motors, battery, pdma, manufacturing
    
PdMA Corporation
Published By: Virgin Pulse     Published Date: Oct 03, 2013
This paper draws on a wealth of experience, external research, and Virgin Pulse's robust analysis of client data to outline the key factors within your organization that can drive your employees to enroll in, and stay engaged with, your workplace wellness programs.
Tags : 
employee wellness, sustained engagement, employee wellness initiatives, employee wellness programs
    
Virgin Pulse
Published By: NETIQ     Published Date: Mar 12, 2013
Sally Hudson, IDC research and analysis, sums up thoughtful Q&A session that highlights evaluating access governance solutions, developing agile processes and policies that meet security and compliance needs.
Tags : 
idc research, governance solutions, netiq
    
NETIQ
Published By: IBM     Published Date: Apr 06, 2015
Voice of the customer (VOC) is a market research technique defined as the process of capturing a customer's expectations, preferences and aversions. Ideally, Voice of the Customer analysis produces a detailed set of customer wants and needs that is prioritized by company objectives or strategic goals. What has changed significantly is the volume and number of data sources and channels, inclusive of mobile device, kiosk, POS and tablet that are able to feed into the analysis of contextual VOC information via enabling VOC software, services and technologies.
Tags : 
market research, new technique, market analysis, customer preferences
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
This 2H-2014 Value Matrix by Nucleus Research evaluates all major BI vendors and their ability to deliver value based on usability, functionality and projects 6-month trends for each vendor to identify best-of-breed capabilities in various dimensions that have evolved in the marketplace.
Tags : 
ibm, nucleus research, market analysis, business intelligence, anallytics market
    
IBM
Published By: BlackLine     Published Date: Jan 25, 2017
Download this whitepaper to learn more about how Continuous Accounting empowers the Office of Finance with real-time intelligence, enabling skilled accountants to spend more time on strategic research and analysis, and become proactive business leaders instead of reactive operators.
Tags : 
    
BlackLine
Published By: IBM     Published Date: Jul 12, 2016
As most companies now realize, analytics is increasingly more of an integral part of their day-to-day business operations. In a recent survey by a global research firm, 80% of CIOs stated that transition from backward-looking, passive analysis must shift to forward-looking predictive analytics. The challenge is that many analytic solutions are aligned to a specific platform, tied to inflexible programming models and requiring vast data movement. In this webcast, Forrester and experts from IBM will highlight how technology like Apache Spark on z/OS allows businesses to extract deep customer insight without the cost, latency and security risks of data movement throughout the enterprise.
Tags : 
ibm, forrester, apache spark, spark technology, z systems, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
    
IBM
Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartnerís research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organizationís exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!