mining

Results 226 - 250 of 263Sort Results By: Published Date | Title | Company Name

Experience the benefits of the Industrial Internet of Things (IIoT) through Variable Speed Drives

Published By: Schneider Electric     Published Date: May 03, 2018
The industry of tomorrow will be different. More volatile markets, new technology capabilities, and increased pressure on performance will precipitate the change. But with change comes opportunity…the Industrial Internet of Things (IIoT) has unleashed huge potential for industrial customers. There is a reported $14 trillion of new business growth up for grabs – and your goal of better business performance can help you earn your fair share of that growth. How can you make the most of this potential? Read the rest of this eBook to learn more.
Tags : 
vsd, vfd, variable speed drives, variable frequency drives, iiot, water, wastewater, oil & gas
    
Schneider Electric

Critical Success Factors Deploying Pervasive BI

Published By: Aventail     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse
    
Aventail

Choosing a Higher Performance Database

Published By: Objectivity     Published Date: Aug 21, 2009
There is often a great deal of confusion in determining whether an object database management system (ODBMS) is right for you. Most of this confusion can be resolved by focusing on your application's requirements. In those situations where the application requires the very clear advantages of an ODBMS, choosing which ODBMS becomes a continuation of the exercise of analyzing those application requirements.
Tags : 
database performance, object-oriented, database development, objectivity, software development, high availability, database security
    
Objectivity

Improving ROI with Predictive Analytics: Six Keys to Unlocking the Value of Customer Intelligence

Published By: Customer Chemistry     Published Date: Nov 14, 2006
Read this white paper to learn about the six keys to a structured approach to planning and implementation of a predictive analytics infrastructure.  Find out how you can turn customer intelligence data into actionable information for improving the accuracy, efficiency and success of your targeting efforts.
Tags : 
customer intelligence, business intelligence, marketing intelligence, customer research, predictive analytics, analytics, infrastructure, customer data
    
Customer Chemistry

Marketing Budgets: Determining the Right Amount

Published By: Customer Chemistry     Published Date: Nov 21, 2008
Since there are many ways to determine your marketing budget, it can be very overwhelming to choose which one is right for you. Even though most require a bit of trial and error, this article should help you narrow down your options. There is no one “correct” option to consider when setting your marketing budget, but here are a few methods that have worked for many companies.
Tags : 
marketing budgets, clarity quest marketing, setting marketing budgets, determining marketing budgets
    
Customer Chemistry

Converging Text and BI: The Case for a Content Mining Platform

Published By: Clarabridge     Published Date: Dec 06, 2006
This white paper describes how the Clarabridge Content Mining Platform avoids the pitfalls of previous approaches to unstructured analysis, and capitalizes on lessons learned from solving similar problems in the structured domain.
Tags : 
business intelligence, data warehousing, data mining, content integration, content management system, cms, business analytics, content mining
    
Clarabridge

TrueUpdate 2.0 Product Brochure

Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 allows any software developer to integrate automated update capabilities into their final product, providing a robust client/server framework for determining required updates, and then retrieving and applying the necessary patch or installation files using Internet or LAN protocols.
Tags : 
software development, updates, update installers, trueupdate, indigo rose
    
Indigo Rose Corporation

Protecting Your Network Against Email Threats

Published By: GFI     Published Date: Jun 12, 2007
Examining the different kinds of email threats and email attack methods, this paper describes the need for a solid server-based content-checking gateway to safeguard your business against email viruses and attacks as well as information leaks.
Tags : 
network security, virus, anti virus, anti-virus, content checking, mailsecurity, gfi, anti trojan
    
GFI

Finding Cost Hidden in Your Contact Center Plans

Published By: Interactive Intelligence     Published Date: Feb 27, 2013
Contact centers are obviously human-powered operations, and nothing is more core to the proper function of the operation than determining how many center agents are needed for a certain volume of contracts and more. Find hidden costs by reading more.
Tags : 
cost hidden, contact center plans, cutting costs, interactive intelligence, organization, contact center, knowledge management
    
Interactive Intelligence

Critical Success Factors Deploying Pervasive BI

Published By: Informatica     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse
    
Informatica

Leveraging the Right Resources to Fit Your Search Marketing Budget

Published By: WebMetro     Published Date: Mar 24, 2008
Regardless of your budget, website owners and marketers have an abundance of resources available when it comes to Search Engine Marketing (SEM). Maneuvering through those resources and determining what aptly works for your company is the tricky part.
Tags : 
search marketing, sem, seo, webmetro
    
WebMetro

Overcoming the Information Challenge on Mining, Oil and Gas Projects

Published By: Aconex     Published Date: Jun 24, 2008
It's a common scenario in the mining and oil & gas industries: the project has been approved to proceed and the pressure is on to get multiple parties – partners, consultants, contractors and suppliers – working together efficiently to meet an aggressive schedule. This challenge is often exacerbated by globalization and by the vast volume of data that flows between the project team.
Tags : 
information management, construction, oil, mining, gas, commodities, energy, aconex
    
Aconex

Dig Your Own Hole - 12 Ways to Go Wrong With Java Security

Published By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software
    
HP - Enterprise

Designing a Defense for Mobile Applications: Examining an Ecosystem of Risk

Published By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : 
mobile applications, ecosystem, risk, defense, application, risk, application security, mobile data systems
    
HP - Enterprise

If Only I Knew - how Data Mining techniques can be used

Published By: Discovery Corps, Inc.     Published Date: Nov 20, 2009
Seeing into the hearts and minds of our customers is impossible; but this article describes how Data Mining techniques can be used to create strategies and tactics to increase customer retention and value.
Tags : 
data mining, business intelligence, predictive modeling, customer retention, high-value customers, decision support, clustering, discovery corps
    
Discovery Corps, Inc.

The Role of Software in Asset Performance Management:

Published By: IBM Software     Published Date: Oct 24, 2011
Read this in-depth report to find out how 117 executives of successful companies are reducing maintenance costs, downtime and safety incidents.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis
    
IBM Software

Data Mining: Handling Missing Data

Published By: Discovery Corps, Inc     Published Date: Jan 11, 2011
Article on how to handle missing values in a dataset during a data mining project
Tags : 
data mining, missing values, techniques, diagnosis, tips, missing data
    
Discovery Corps, Inc

The Business Value of Trust

Published By: VeriSign     Published Date: Feb 10, 2011
What companies can do to maximize online sales by increasing customer trust and confidence. This report looks into the need for trust in ecommerce and the ways in which companies are building it (and, in some cases, undermining it).
Tags : 
verisign, online sales, customer trust, ecommerce, increase conversion, ssl, secure sockets layer, customer satisfaction
    
VeriSign

Putting the "Touch" in Multi-Touch: An in-depth look at the future of interactivity

Published By: Touch International     Published Date: Mar 07, 2011
Putting the "Touch" in Multi-Touch: An in-depth look at the future of interactivity, is a must-read for anyone looking to understand how multi-touch technology works, examining the history and future of multi-touch.
Tags : 
multi-touch, touch, touch screen, touch screens, multi-touch screen, multi-touch display, touch interface, touch technologies
    
Touch International

Save Time and Money with Business Intelligence

Published By: PBI Corp     Published Date: Mar 16, 2011
Inexpensive, nimble applications can solve many problems large, expensive software cannot.
Tags : 
business intelligence, nimble, quick, inexpensive, professional, data mining, office, application
    
PBI Corp

Forrester: Top 10 Ways To Improve Digital Experiences

Published By: Adobe     Published Date: Aug 22, 2013
This report gives customer experience professionals the tools and processes they need to act on digital customer experience improvement across touchpoints like websites, mobile phones, and tablets. Forrester recommends 10 tactics for evaluating digital touchpoints and determining customers' needs, proven and emerging methodologies for redesigning digital interactions, and best practices for ensuring that your digital experiences support your business objectives.
Tags : 
customer experience management, digital experiences, customer experience
    
Adobe

2012 Threatscape Report - Dell SecureWorks Counter Threat Unit Research Team

Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks
    
Dell SecureWorks

Managing the Social Media Mix White Paper

Published By: Oracle     Published Date: Nov 05, 2013
This white paper provides a step-by-step guide for determining your strategy—and the proper mix of marketing channels—in social media.
Tags : 
marketing mix, social media marketing, 4p’s, marketing channels, digital marketing, internet marketing, marketing strategy, brand strategy
    
Oracle

Differentiate your Business with a Cloud Contact Center

Published By: Cisco     Published Date: Feb 23, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video
Tags : 
cloud computing, cisco, contact center, best practices, cloud network, storage management, data integration, data quality
    
Cisco

Bribery and Corruption Red Flags “How to Respond to Corruption Indicators”

Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.