mining

Results 1 - 25 of 256Sort Results By: Published Date | Title | Company Name

12 Strategies For Improving Online Conversion Rates

Published By: SiteSpect     Published Date: Apr 14, 2015
This e-book explores 12 strategies for maximizing conversion rates by examining the elements that are either helping or hindering the customer experience. Once you thoroughly understand these strategies, you can use multivariate testing and site optimization to improve your web and mobile conversions.
Tags : 
conversion, optimization, conversion optimisation, increase conversion rate, increase conversion rates, increase online conversion rates, increase online conversion rate, increase conversions, increase website conversions, increase web conversions, increase web page conversions, increase site conversions, improve conversion rates, improving website conversion rates, improving site conversion rates
    
SiteSpect

15 Essential KPI's of the Revenue Lifecycle

Published By: ServiceSource     Published Date: Sep 15, 2015
The principle “what gets measured gets managed” dictates that by simply examining an activity, you can get a handle on it and find ways to improve it. However, not all metrics are created equal—meaning not all things that can be measured will give you the ability to proactively take action in a timely manner. Case in point: If you measure the effectiveness of your customer success and recurring revenue growth programs based only on retention, churn, renewal or attrition rates, then you have a problem. These are very important metrics, and they are definitely key to your business. The problem is that these metrics can only tell you if you have a problem, which you often discover only after it is too late to affect real change.
Tags : 
    
ServiceSource

2012 Threatscape Report - Dell SecureWorks Counter Threat Unit Research Team

Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks, security
    
Dell SecureWorks

2016 Midyear Security Report

Published By: Cisco     Published Date: Sep 08, 2016
This white paper updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
    
Cisco

2017 Professional Services Automation End-User Survey Report

Published By: Workday     Published Date: Mar 13, 2018
This report is a must-have for all service-oriented organizations considering a PSA solution. Examining the survey responses of 68 billable organizations, this detailed report gives you a holistic understanding of the benefits PSA can offer companies like yours. Read the report to see how PSA provides the real-time visibility to improve your productivity and profit.
Tags : 
service oriented, psa, productivity, profit
    
Workday

2018 Motorola Solutions Energy Communications Survey Report

Published By: Motorola Solutions     Published Date: Nov 29, 2018
In today’s increasingly mobile world, Energy workers require instant communication and access to data intelligence wherever the job may take them. From the oil rig to the electric grid and everywhere in between, having the right data, in the right hands, at the right time, no matter the environment or device of choice — is simply non-negotiable. Organizations across various Energy segments — oil & gas, electric utilities, water utilities, and mining — are currently juggling a mix of communication devices and are hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions. Yet, citizens rely on their homes being heated in the winter, on clean running water, and on lights that turn on when they flip the switch. Meeting these expectations requires reliable, clear voice and data communications for Energy workers day-in and day-out. So oil & gas workers can communicate safely in hazardous environments. So precious resources are
Tags : 
    
Motorola Solutions

2018 Trends: Predictions From Ecommerce Marketing Experts

Published By: Bronto     Published Date: Feb 01, 2018
What you'll learn: • Why batch-and-blast email is losing its effectiveness and the email techniques to replace it. • How techniques like user-generated content and the mining of unstructured data can boost email effectiveness. • What artificial intelligence is offering today – and what it could offer years from now. • How omnichannel merchants can leverage physical locations as part of their online strategy.
Tags : 
email, omnichannel, retail, ecommerce
    
Bronto

2018 Trends: Predictions From Ecommerce Marketing Experts

Published By: Bronto     Published Date: May 31, 2018
What you'll learn: • Why batch-and-blast email is losing its effectiveness and the email techniques to replace it. • How techniques like user-generated content and the mining of unstructured data can boost email effectiveness. • What artificial intelligence is offering today – and what it could offer years from now. • How omnichannel merchants can leverage physical locations as part of their online strategy.
Tags : 
trends, ecommerce, marketing, strategy
    
Bronto

2019 SOTI Security Report: Retail and API Traffic

Published By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
    
Akamai Technologies

5 IT Mistakes to Avoid: Expert Insight on Determining Technology Need

Published By: Brother     Published Date: Nov 23, 2015
Brother conducted a series of interviews with value-added resellers (VARs) that work closely with businesses to select the right technology solutions. These VARs have a unique understanding of how IT professionals think; as a result, they have witnessed many missteps that have led to “less than optimal” IT technology integrations. What follows are five common - yet significant - mistakes identified during these discussions.
Tags : 
it management, brother, productivity, cost reduction, value-added resellers, technology integration, business technology
    
Brother

5 Reasons to Move to BoldChat

Published By: LogMeIn     Published Date: May 31, 2016
LivePerson’s forced migration to the LiveEngage platform has businesses like yours re-examining their live chat options. Given the painful relationship they’ve endured for years with LivePerson, many customers are wary, and they want to make sure that they make the right move. BoldChat is working with a number of former LivePerson customers who came to us looking for a true partner – one that not only wants to earn their business, but to continue earning it every day. What they’re getting in return is much more.
Tags : 
boldchat, logmein, liveperson, chat, customer service, customer experience, enterprise applications, customer experience management, messaging, business technology
    
LogMeIn

5 Steps to Implement & Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault

5 Steps to Implement and Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Jul 22, 2016
you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise.
Tags : 
    
AlienVault

5 Steps to Implement and Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault

A Smarter Approach: Inside IBM Business Analytics Solutions for Mid-Size Businesses

Published By: IBM     Published Date: Sep 27, 2013
Teams of engineers and statisticians spend their days immersed in seas of data from various sources. However, it isn't just the largest of organizations that can benefit from analytics and data-driven decision-making. Businesses of all sizes need to leverage the new currency of data and information.
Tags : 
ibm, ibm business analytics solutions, business analytics, analytics solutions, midsize businesses, financial reporting, business intelligence, desktop data visualizations, data mining
    
IBM

A Smarter Process Approach to Accelerating Customer Engagements with Mobile and Social

Published By: IBM     Published Date: Oct 19, 2017
The Smarter Process platform is IBM’s solution for reinventing business operations in a way that infuses every process with intelligence and expertise to deliver greater customer centricity, which in turn fuels top-line growth. It incorporates Business Process Management, Case Management, Operational Decision Management and Process Analytics, along with Process Discovery and Design with an objective of ensuring that customers find it easy to do business and that every interaction includes positive touch points. Within the context of this new imperative, accessing cloud efficiencies, leveraging mobile for greater engagement, mining big data for insights, and enhancing customer relationships via social media, are proving to be critical and interrelated strategies.
Tags : 
customer engagement, mobile, social, bpm, case management
    
IBM

AEROSPACE & DEFENSE: FUTURE FACTORY

Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The manufacturing landscape faces dramatic change. Creating and capturing value in this new environment requires aerospace companies to not just understand what’s driving these changes, but also grasp just how consequential a role digital transformation will play in determining their future. Download this white paper now to find out how the manufacturing landscape faces dramatic change.
Tags : 
aerospace, aviation, manufacturing, product development, product lifecycle management, automation, data
    
Dassault Systèmes

Agile Data Masking for a Faster, More Secure Enterprise

Published By: Delphix     Published Date: Mar 24, 2015
Data masking has long been a key component of enterprise data security strategies. However, legacy masking tools could not deliver secure data, undermining their impact. Explore how data as a service can deliver on the promise of masking, while increasing organizational flexibility and agility.
Tags : 
    
Delphix

Amplify Your Security to Fight Advanced Malware

Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp, networking, security, it management, data management, business technology
    
Cisco

An IT Manager's Guide: Cryptojacking, The Threat To Business and How to Protect The Network

Published By: HP Inc.     Published Date: Jul 03, 2019
hile Bitcoin took a bit of a beating in August 2018, it did little to dampen interest in the obviously volatile cryptocurrency market. Bitcoin lost 20 percent of its value in just two weeks in August, according to some reports1 , and yet there appears to be substantial optimism in the currency. According to one report2 , there were 96 new crypto hedge funds launched in the first seven months of 2018 and when the Turkish Lira plummeted 20 percent in August 2018, there was a surge in Bitcoin trading3 . Cryptocurrency is clearly here to stay and while that may whet the appetite of brave investors, it’s also a magnet for crime. Unsurprisingly perhaps, hackers are targeting4 cryptocurrency exchanges but what many businesses and individuals may not realize is that there is serious money to be made in actually performing admin functions for the currencies themselves. Called cryptomining, it can be big business. Some reports5 have suggested that profits from mining have hit over $4 billion b
Tags : 
    
HP Inc.

Analytics: The Art and Science of Better

Published By: SAS     Published Date: Aug 27, 2010
Forget spreadsheets. Organizations that are winning in this down economy are using automated analytical tools to take a more scientific approach to decision making through observation, experimentation and measurement to improve their business processes.
Tags : 
sas, analytics software, business intelligence, data mining, automated analytical tools, computerworld, business analytics, business management, business process automation
    
SAS

Are subtle inefficiencies condensing your bottom line?

Published By: Magnetrol     Published Date: Nov 05, 2018
U.S. Department of Energy surveys show that minor adjustments in process management can incrementally improve efficiency in commercial and heavy industries. These include pulp & paper, chemical, petroleum refining, mining and food processing where as much as 60% of their total energy consumption goes to the production of steam. The information-packed Steam Generation & Condensate Recovery Process Optimization kit from Magnetrol explains how effective instrumentation solutions can:
Tags : 
    
Magnetrol

Benchmarking Report 2009

Published By: LANDesk     Published Date: Dec 08, 2009
This report created by the Service Desk Institute and sponsored by LANDesk provides an insight into the UK IT Support Industry by examining the core of any organisation - the Service Desk. The study covers a wide range of issues from technology and metrics through to training and salaries.
Tags : 
avocent, service desk, help desk, landesk, benchmarking, desk managers, technical desks, business management, customer relationship management, web service management, service management, desktop management, human resources services
    
LANDesk

Best Practice: Identify High Potentials Before You Lose Them!

Published By: IBM     Published Date: Mar 28, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : 
ibm, aberdeen group, talent acquisition, recruitment, employee training software, recruiting software/services, employee performance management
    
IBM

Best Practice: Identify High Potentials Before You Lose Them!

Published By: IBM     Published Date: Jul 20, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : 
ibm, aberdeen group, talent acquisition, recruitment, human resource technology
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.