HIT Consultant Insightful coverage of healthcare innovation
 

mining

Results 151 - 175 of 238Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Mar 14, 2014
Stop to think about how - and how often - your business interacts with customers. Most organizations believe that only a small fraction of data on interactions generated are effectively put to use. Why is that? Check out this whitepaper to see.
Tags : 
sas, voc, voice of customer, visual text analytics, best practices, customer voice, sound of sentiment, text data, customer data, analytical processing, structured data, enriched dataset, reporting, automatic generation, text analytics, text mining, data exploration
    
SAS
Published By: Port25 Solutions     Published Date: Mar 09, 2012
What it does do, in its simplest form, is validate the integrity of the message, thereby assuring that it has not been tampered with during transit.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: Cisco     Published Date: Sep 08, 2016
This white paper updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
    
Cisco
Published By: Plex Systems     Published Date: Feb 21, 2014
Implementing a Manufacturing Execution System (MES) is key to determining exactly what is happening on your shop floor. PLEX (MES) is a business enabler, dramatically increasing production throughput.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : 
visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence, real-time data, real-time data visualization, real-time data discovery, data variety software, data discovery software, data analysis software, data mining tools, data extraction, data reporting, pdf to excel, business reporting, data solutions
    
Datawatch
Published By: Oracle Social Cloud     Published Date: Jan 14, 2015
When it comes to social media marketing, there is perhaps no other topic that is discussed more than determining and reporting return on investment, or ROI. This white paper sets out to make the case that ROI determination can be approached in a unified, structured and straightforward way. It also lays out a framework for expanding the definition of ROI and increasing organizational maturity for measurement and monetization. Finally, it dispels some of the myths around ROI and seeks to show the relationship between social KPIs organizations may be collecting today and how to align them with broader organizational and business-oriented goals and objectives.
Tags : 
social roi, facebook, social listening, social marketing, customer experience, digital, cmo, social business, socially enabled enterprise, marketing cloud, crm, data
    
Oracle Social Cloud
Published By: Micro Focus     Published Date: Aug 28, 2014
Micro Focus commissioned fresh research to re-examine attitudes towards core IT systems and discover whether blue sky thinking is delivering real-world solutions. The conclusions may surprise you
Tags : 
core it systems, it debt, mainframe
    
Micro Focus
Published By: IBM     Published Date: Sep 11, 2013
Through this whitepaper from IBM you will learn how to use predictive intelligence to make faster and better decisions
Tags : 
spss, modeling, data mining, ibm, spss modeler, business analytst
    
IBM
Published By: IBM     Published Date: Sep 11, 2013
Learn how mining data from social media can be a significant way for your bank to gain insights into customer mindsets and behavior by using advanced analytics tools from IBM
Tags : 
social business, banking, mining data, social media, analytics, customer
    
IBM
Published By: IBM     Published Date: Nov 14, 2014
Data mining uncovers patterns in data through a variety of predictive techniques. By engaging in data mining, organizations like yours gain greater insight into external conditions, internal processes, your markets – and your customers.
Tags : 
ibm, data mining, data management, business results, predictive intelligence, business insights
    
IBM
Published By: IBM     Published Date: Nov 14, 2014
IBM® SPSS® Modeler is a powerful, versatile data mining workbench that helps you gain unprecedented insight from your data.
Tags : 
ibm, data mining, data management, business results, predictive intelligence, business insights
    
IBM
Published By: IBM     Published Date: Feb 19, 2015
Data mining uncovers hidden patterns and relationships in data, driving more informed decisions in organizations of all sizes, and in virtually every industry.
Tags : 
roi, data mining, big data, business analytics
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
Examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management, malware prevention
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud prevention technology, fraud loss reduction, operating costs
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor.
Tags : 
    
Cisco
Published By: Mentor Graphics     Published Date: Sep 11, 2009
"As the number of enhancements to various Hardware Description Languages (HDLs) has increased over the past year, so too has the complexity of determining which language is best for a particular design. Many designers and organizations are contemplating whether they should switch from one HDL to another. This paper compares the technical characteristics of three, general-purpose HDLs.
Tags : 
comparison of vhdl, verilog and systemverilog, mentor graphics, hardware description languages (hdls), vhdl (ieee-std 1076), verilog (ieee-std 1364), ieee standard, accellera
    
Mentor Graphics
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp
    
Cisco
Published By: OutSystems     Published Date: Jul 15, 2014
This Gigaom Research report defines PaaS, investigates the available options, and then supplies concrete recommendations for what to use where and when.
Tags : 
outsystems, paas, devops, innovation, cloud based solutions, cloud computing
    
OutSystems
Published By: IBM     Published Date: Sep 27, 2013
Teams of engineers and statisticians spend their days immersed in seas of data from various sources. However, it isn't just the largest of organizations that can benefit from analytics and data-driven decision-making. Businesses of all sizes need to leverage the new currency of data and information.
Tags : 
ibm, ibm business analytics solutions, business analytics, analytics solutions, midsize businesses, financial reporting, business intelligence, desktop data visualizations, data mining
    
IBM
Published By: Oracle     Published Date: Mar 10, 2014
An infographic examining the importance of the relationship between C-suite and HR.
Tags : 
talent management, hr relationships, c-suite, cfo. ceo
    
Oracle
Published By: IBM     Published Date: Feb 05, 2014
This Analyst Insight will look at how leading organizations are influencing average order value, customer conversion, and customer satisfaction through the integration of site search with precision marketing and product content management. Besides examining the key drivers and pain points organizations are facing in relation to their search strategy, this report will look at the key differentiating strategies, capabilities, and technologies that are driving success in the digital era.
Tags : 
ibm, aberdeen group, merchandising, ecommerce, content management, marketing, order value, customer conversion, customer satisfaction, site search, search strategy, business technology
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact cen
Tags : 
    
Cisco
Published By: Rackspace     Published Date: Aug 28, 2014
In this webinar an expert panel will examine the infrastructure needs of customer-facing applications by examining the challenges faced by businesses in the most demanding industries.
Tags : 
rackspace, cloud applications, customer service, consumer applications, ebusiness, data center, cloud computing, cloud hosting
    
Rackspace
Published By: NEC     Published Date: Nov 12, 2014
In this webinar an expert panel will examine the security and visibility needs of mesh SDN networks by examining the security challenges faced by businesses in distributed SDN environments. The webinar will also present real-world case studies of companies who excelling at providing a superior customer experience for their applications and their sites.
Tags : 
nec, software defined networking, sdn, lan, land area network, wifi, wireless network, network management, business network, network security
    
NEC
Published By: General Atomics     Published Date: Jan 13, 2015
The term “Big Data” has become virtually synonymous with “schema on read” unstructured data analysis and handling techniques like Hadoop. These “schema on read” techniques have been most famously exploited on relatively ephemeral human-readable data like retail trends, twitter sentiment, social network mining, log files, etc.
Tags : 
general atomics, big data, metadata, nirvana, hadoop
    
General Atomics
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.