mining

Results 176 - 200 of 256Sort Results By: Published Date | Title | Company Name

Social Business in Banking

Published By: IBM     Published Date: Sep 11, 2013
Learn how mining data from social media can be a significant way for your bank to gain insights into customer mindsets and behavior by using advanced analytics tools from IBM
Tags : 
social business, banking, mining data, social media, analytics, customer
    
IBM

Three Proven Methods to Achieve a Higher ROI from Data Mining

Published By: IBM     Published Date: Nov 14, 2014
Data mining uncovers patterns in data through a variety of predictive techniques. By engaging in data mining, organizations like yours gain greater insight into external conditions, internal processes, your markets – and your customers.
Tags : 
ibm, data mining, data management, business results, predictive intelligence, business insights, best practices, business intelligence, return on investment
    
IBM

Solve Your Toughest Challenges with Data Mining

Published By: IBM     Published Date: Nov 14, 2014
IBM® SPSS® Modeler is a powerful, versatile data mining workbench that helps you gain unprecedented insight from your data.
Tags : 
ibm, data mining, data management, business results, predictive intelligence, business insights, business analytics, business intelligence, data center
    
IBM

Three Proven Methods to Achieve a Higher ROI from Data Mining

Published By: IBM     Published Date: Feb 19, 2015
Data mining uncovers hidden patterns and relationships in data, driving more informed decisions in organizations of all sizes, and in virtually every industry.
Tags : 
roi, data mining, big data, business analytics, enterprise applications, data management, data center
    
IBM

Making A Business Case For Fraud-Prevention Technology

Published By: IBM     Published Date: Oct 02, 2015
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud prevention technology, fraud loss reduction, operating costs, security, it management, knowledge management, enterprise applications
    
IBM

Ovum: Differentiate Your Business with a Cloud Contact Center

Published By: Cisco     Published Date: Jul 11, 2016
Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor.
Tags : 
    
Cisco

Comparison of VHDL, Verilog and SystemVerilog

Published By: Mentor Graphics     Published Date: Sep 11, 2009
"As the number of enhancements to various Hardware Description Languages (HDLs) has increased over the past year, so too has the complexity of determining which language is best for a particular design. Many designers and organizations are contemplating whether they should switch from one HDL to another. This paper compares the technical characteristics of three, general-purpose HDLs.
Tags : 
comparison of vhdl, verilog and systemverilog, mentor graphics, hardware description languages (hdls), vhdl (ieee-std 1076), verilog (ieee-std 1364), ieee standard, accellera, analog communications, digital signal processing, electronic design automation, system on a chip, electronic test and measurement, embedded design, boards & modules, embedded systems and networking, electromechanical & mechanical, optoelectonics & displays, packaging and interconnects, passive & discrete components
    
Mentor Graphics

Amplify Your Security to Fight Advanced Malware

Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp, networking, security, it management, data management, business technology
    
Cisco

Determining when PaaS is appropriate

Published By: OutSystems     Published Date: Jul 15, 2014
This Gigaom Research report defines PaaS, investigates the available options, and then supplies concrete recommendations for what to use where and when.
Tags : 
outsystems, paas, devops, innovation, cloud based solutions, cloud computing, it management, data center
    
OutSystems

A Smarter Approach: Inside IBM Business Analytics Solutions for Mid-Size Businesses

Published By: IBM     Published Date: Sep 27, 2013
Teams of engineers and statisticians spend their days immersed in seas of data from various sources. However, it isn't just the largest of organizations that can benefit from analytics and data-driven decision-making. Businesses of all sizes need to leverage the new currency of data and information.
Tags : 
ibm, ibm business analytics solutions, business analytics, analytics solutions, midsize businesses, financial reporting, business intelligence, desktop data visualizations, data mining
    
IBM

The Relationship Between C-suite and HR

Published By: Oracle     Published Date: Mar 10, 2014
An infographic examining the importance of the relationship between C-suite and HR.
Tags : 
talent management, hr relationships, c-suite, cfo. ceo, human resources services, workforce management software
    
Oracle

Search Innovation: An Integrated Approach to Merchandising and Content Management

Published By: IBM     Published Date: Feb 05, 2014
This Analyst Insight will look at how leading organizations are influencing average order value, customer conversion, and customer satisfaction through the integration of site search with precision marketing and product content management. Besides examining the key drivers and pain points organizations are facing in relation to their search strategy, this report will look at the key differentiating strategies, capabilities, and technologies that are driving success in the digital era.
Tags : 
ibm, aberdeen group, merchandising, ecommerce, content management, marketing, order value, customer conversion, customer satisfaction, site search, search strategy, business technology, content management system, customer experience management
    
IBM

Differentiate Your Business With a Cloud Contact Center

Published By: Cisco     Published Date: Dec 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact cen
Tags : 
    
Cisco

Customer-Driven Infrastructure Building Future-Ready Consumer Applications

Published By: Rackspace     Published Date: Aug 28, 2014
In this webinar an expert panel will examine the infrastructure needs of customer-facing applications by examining the challenges faced by businesses in the most demanding industries.
Tags : 
rackspace, cloud applications, customer service, consumer applications, ebusiness, data center, cloud computing, cloud hosting, infrastructure, customer satisfaction, enterprise software, customer experience management
    
Rackspace

Solving Enterprise Networking Challenges with SDN

Published By: NEC     Published Date: Nov 12, 2014
In this webinar an expert panel will examine the security and visibility needs of mesh SDN networks by examining the security challenges faced by businesses in distributed SDN environments. The webinar will also present real-world case studies of companies who excelling at providing a superior customer experience for their applications and their sites.
Tags : 
nec, software defined networking, sdn, lan, land area network, wifi, wireless network, network management, business network, network security, fibre channel, infrastructure, internetworking hardware, wide area networks, network attached storage, internet security, wlan, server virtualization, data center design and management
    
NEC

Tackling the Big Data Deluge in Science with Metadata

Published By: General Atomics     Published Date: Jan 13, 2015
The term “Big Data” has become virtually synonymous with “schema on read” unstructured data analysis and handling techniques like Hadoop. These “schema on read” techniques have been most famously exploited on relatively ephemeral human-readable data like retail trends, twitter sentiment, social network mining, log files, etc.
Tags : 
general atomics, big data, metadata, nirvana, hadoop, storage area networks, storage virtualization, server virtualization, data warehousing, data deduplication, data center design and management, colocation and web hosting
    
General Atomics

Walking the line: Unlock higher performance through value stream analysis on your packaging line

Published By: Domino     Published Date: Feb 25, 2019
Food and beverage manufacturers today face a host of challenges— SKU proliferation, more frequent line changeovers, finding and retaining skilled employees — all while handling the day-to-day challenges of keeping the line running smoothly in the first place. This demand for continuous improvement has plant managers and line engineers examining every aspect of the production and packaging line for ways to squeeze every bit of performance from every machine, every process, and every employee This white paper from Domino takes a look at how conducting a value stream analysis with a third-party provider can uncover a wide array of opportunities to improve productivity and efficiency. From freeing up labor and reducing errors to shortening changeover time and sharing critical operational knowledge among all stakeholders, a value stream analysis provides a collaborative opportunity to learn and discover new ways to boost productivity without major equipment investments.
Tags : 
    
Domino

Making a business case for fraud-prevention technology

Published By: IBM     Published Date: Aug 08, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security, data loss prevention
    
IBM

IDC Report: The Future of eMail is Social

Published By: IBM     Published Date: Oct 06, 2014
This IDC white paper takes a look at the current state of enterprise email and the perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social Web by examining current email trends and the emergence of new social collaboration tools. Rather than envision "a world without email," it reveals a future where email converges with social tools and grows into an innovative hybrid productivity tool to help support the new collaborative enterprise.
Tags : 
idc report, enterprise email, email trends, productivity tool, software development, knowledge management, business analytics, business intelligence, business technology
    
IBM

Mobility And Business Outcomes Are Driving The Adoption Of Unified Communications

Published By: IBM     Published Date: Jan 09, 2015
Organizations are largely relying on TCO and ROI models in determining whether or not to invest in a unified communications (UC) solution. But what other factors are they considering? You’ll better understand the value that firms are deriving from UC, the status of its adoption, and the barriers to full implementation.
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges, iot, byod, infrastructure, trends, analytics, unified, communications, crm, erp, applications, networking, security
    
IBM

Quantifying the Value of Social Media Engagement in B2B Marketing

Published By: Act-On     Published Date: Aug 28, 2012
In this Gleanster Deep Dive, analyst Ian Michiels discusses tactics for determining the ROI of social engagement for B2B, and demonstrates the Social Media Mean Performance Score (MPS) Dashboard.
Tags : 
social media roi, b2b marketing, social media engagement, gleanster, content marketing, social media metrics
    
Act-On

Free Forefront Protection?

Published By: Trend Micro     Published Date: Oct 12, 2012
This white paper evaluates that "free" claim by examining the additional costs associated with deploying ForeFront and abandoning third party anti-malware solutions.
Tags : 
information security, licensing, software costs, trend micro, security, encryption, hacker detection, intrusion detection, intrusion prevention, data protection, business technology, data loss prevention
    
Trend Micro

Data Collection Strategies for Lifecycle Messaging

Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment
    
BlueHornet

2018 Trends: Predictions From Ecommerce Marketing Experts

Published By: Bronto     Published Date: Feb 01, 2018
What you'll learn: • Why batch-and-blast email is losing its effectiveness and the email techniques to replace it. • How techniques like user-generated content and the mining of unstructured data can boost email effectiveness. • What artificial intelligence is offering today – and what it could offer years from now. • How omnichannel merchants can leverage physical locations as part of their online strategy.
Tags : 
email, omnichannel, retail, ecommerce
    
Bronto
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.