mining

Results 1 - 25 of 256Sort Results By: Published Date | Title | Company Name

Overcoming the Information Challenge on Mining, Oil and Gas Projects

Published By: Aconex     Published Date: Jun 24, 2008
It's a common scenario in the mining and oil & gas industries: the project has been approved to proceed and the pressure is on to get multiple parties – partners, consultants, contractors and suppliers – working together efficiently to meet an aggressive schedule. This challenge is often exacerbated by globalization and by the vast volume of data that flows between the project team.
Tags : 
information management, construction, oil, mining, gas, commodities, energy, aconex
    
Aconex

Quantifying the Value of Social Media Engagement in B2B Marketing

Published By: Act-On     Published Date: Aug 28, 2012
In this Gleanster Deep Dive, analyst Ian Michiels discusses tactics for determining the ROI of social engagement for B2B, and demonstrates the Social Media Mean Performance Score (MPS) Dashboard.
Tags : 
social media roi, b2b marketing, social media engagement, gleanster, content marketing, social media metrics
    
Act-On

Forrester: Top 10 Ways To Improve Digital Experiences

Published By: Adobe     Published Date: Aug 22, 2013
This report gives customer experience professionals the tools and processes they need to act on digital customer experience improvement across touchpoints like websites, mobile phones, and tablets. Forrester recommends 10 tactics for evaluating digital touchpoints and determining customers' needs, proven and emerging methodologies for redesigning digital interactions, and best practices for ensuring that your digital experiences support your business objectives.
Tags : 
customer experience management, digital experiences, customer experience
    
Adobe

Data-driven Marketing is the Answer. Now, What’s the Question?

Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship
    
Adobe

Le marketing Orienté Données est la Réponse. Mais Quelle est la Question ?

Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship
    
Adobe

Datengestütztes Marketing ist die Antwort. Aber auf welche Frage?

Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship
    
Adobe

Predictive Online Ad Targeting: Benefits of a Pixel-Free Approach

Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai

Consumer Response to Travel Site Performance

Published By: Akamai     Published Date: Jun 14, 2010
Looking back to the first iterations of travel Web sites, we can appreciate just how far technology has come. As advancements like high-speed connections began to replace the now archaic dial-up experience, consumers adjusted their expectations and demands of the companies they patronized. To gain a deeper understanding of the status of travelers' current online expectations, Akamai commissioned PhoCusWright to conduct a study examining key elements of the online consumer experience.
Tags : 
akamai, travel, site performance, phocuswright, customer experience, usability, travel ecommerce, web load
    
Akamai

Protecting Your Network from Malware

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies

Protecting Your Network from Malware

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies

2019 SOTI Security Report: Retail and API Traffic

Published By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
    
Akamai Technologies

Scaling Identity Management to Ensure Customer Loyalty Program Success: Four Case Studies

Published By: Akamai Technologies     Published Date: Jul 02, 2019
Loyalty and rewards programs are powerful tools for brands to boost member engagement, acquisition, and retention. Learn why leading brands are turning to modern customer identity and access management (CIAM) solutions to scale their loyalty programs, improve user experience, and maximize ROI. In this paper, we identify the challenges associated with transforming, expanding, and scaling customer loyalty and rewards programs and related membership initiatives, and present solutions based on real-world case studies from four industries. We explore the requirements for an enterprise-grade CIAM solution and address related issues such as build vs. buy and CIAM vs. IAM. By examining four diverse case studies — and the resulting identity management solutions that were implemented by the respective companies — this paper provides valuable insight for any enterprise wishing to expand or uplift its customer loyalty program to meet membership needs in the age of the consumer.
Tags : 
    
Akamai Technologies

5 Steps to Implement and Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Jul 22, 2016
you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise.
Tags : 
    
AlienVault

5 Steps to Implement and Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault

5 Steps to Implement & Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault

Your Workday Operating Model—The Build Versus Buy Decision

Published By: Aon Hewitt     Published Date: May 26, 2015
Let experience guide you in determining the optimal mix of in-house and external support when defining a sustainable Workday operating model. This white paper will provide insights into your options, and help you find answers to these questions as you move forward on your Workday and HR journey.
Tags : 
cloud, hrms solution, saas deployments, saas, workday, hr management
    
Aon Hewitt

Reshaping Retiree Health Care Through a Private Exchange Strategy

Published By: Aon Hewitt     Published Date: Aug 06, 2015
Read this white paper to learn why it’s critical for employers to evaluate key differences between retiree exchanges— especially the level of support offered to retirees—when determining which model will best meet their organizational needs, as well as the needs of their retiree populations.
Tags : 
retirees, private exchange strategy, health care, ppaca, retiree exchanges
    
Aon Hewitt

The App Attention Index

Published By: AppDynamics     Published Date: Dec 08, 2017
A 2017 study examining the impact of app performance on consumer behavior and business outcomes
Tags : 
    
AppDynamics

The App Attention Index

Published By: AppDynamics     Published Date: Dec 08, 2017
A 2017 study examining the impact of app performance on consumer behavior and business outcomes
Tags : 
    
AppDynamics

The Most Common Types of Invoice Fraud and How to Prevent Them

Published By: AppZen     Published Date: Jun 17, 2019
Is your business falling prey to invoice fraud schemes? Download this whitepaper to learn -what to look out for when processing invoices -the best practice of examining thousands of bills that come through the door every month
Tags : 
    
AppZen

How Benefits Data Becomes Actionable

Published By: Artemis Health     Published Date: Feb 05, 2019
Self-insured employers are mining their health and benefits data to save costs and provide quality care for employees. Data is driving business decisions, but how do you get from millions of rows of data to a consumable graph to taking action? In this white paper, we’ll delve into data analytics best practices that help self-insured employers find actionable insights in their benefits data. • Which data sources will help you ensure you’re measuring the right thing at the right time • How to ensure data variety and choose key metrics • An example of a successful predictive analysis using benefits data
Tags : 
    
Artemis Health

Strategies to Cut Application Costs and Increase Productivity Using Application Mining Tools

Published By: ASG Software Solutions     Published Date: Apr 07, 2009
Application Portfolio Optimization (APO) provides executives with tools and information to assess the quality and condition of application assets as well as a means for understanding the impact of proposed application changes.
Tags : 
asg, cmdb, bsm, itil, bsm, portfolio optimization, apo, mining tools
    
ASG Software Solutions

What Are Your Obligations to Retain Email and Other Electronic Content?

Published By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : 
astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content, content delivery
    
Astaro

How To Stop Budget Leaks & See More Cash This Quarter

Published By: Asure Software     Published Date: Nov 06, 2013
This paper will offer you clear insight into ways of determining how much money your organization is losing through inefficient payroll processes. More importantly, it will provide you with clear, simple directions for correcting the problem immediately with little risk to the organization’s cash flow.
Tags : 
payroll, manage costs, payroll processes, time and labor management, workforce management software, workforce management, workforce management solutions
    
Asure Software

Critical Success Factors Deploying Pervasive BI

Published By: Aventail     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse
    
Aventail
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.