HIT Consultant Insightful coverage of healthcare innovation
 

mining

Results 176 - 200 of 238Sort Results By: Published Date | Title | Company Name
Published By: Domino     Published Date: Feb 25, 2019
Food and beverage manufacturers today face a host of challenges— SKU proliferation, more frequent line changeovers, finding and retaining skilled employees — all while handling the day-to-day challenges of keeping the line running smoothly in the first place. This demand for continuous improvement has plant managers and line engineers examining every aspect of the production and packaging line for ways to squeeze every bit of performance from every machine, every process, and every employee This white paper from Domino takes a look at how conducting a value stream analysis with a third-party provider can uncover a wide array of opportunities to improve productivity and efficiency. From freeing up labor and reducing errors to shortening changeover time and sharing critical operational knowledge among all stakeholders, a value stream analysis provides a collaborative opportunity to learn and discover new ways to boost productivity without major equipment investments.
Tags : 
    
Domino
Published By: IBM     Published Date: Aug 08, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
technology, fraud prevention, finance, fraud loss reduction
    
IBM
Published By: IBM     Published Date: Oct 06, 2014
This IDC white paper takes a look at the current state of enterprise email and the perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social Web by examining current email trends and the emergence of new social collaboration tools. Rather than envision "a world without email," it reveals a future where email converges with social tools and grows into an innovative hybrid productivity tool to help support the new collaborative enterprise.
Tags : 
idc report, enterprise email, email trends, productivity tool
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
Organizations are largely relying on TCO and ROI models in determining whether or not to invest in a unified communications (UC) solution. But what other factors are they considering? You’ll better understand the value that firms are deriving from UC, the status of its adoption, and the barriers to full implementation.
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges, iot, byod, infrastructure, trends, analytics, unified, communications, crm, erp, applications
    
IBM
Published By: Act-On     Published Date: Aug 28, 2012
In this Gleanster Deep Dive, analyst Ian Michiels discusses tactics for determining the ROI of social engagement for B2B, and demonstrates the Social Media Mean Performance Score (MPS) Dashboard.
Tags : 
social media roi, b2b marketing, social media engagement, gleanster, content marketing, social media metrics
    
Act-On
Published By: Trend Micro     Published Date: Oct 12, 2012
This white paper evaluates that "free" claim by examining the additional costs associated with deploying ForeFront and abandoning third party anti-malware solutions.
Tags : 
information security, licensing, software costs, trend micro
    
Trend Micro
Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment
    
BlueHornet
Published By: Bronto     Published Date: Feb 01, 2018
What you'll learn: • Why batch-and-blast email is losing its effectiveness and the email techniques to replace it. • How techniques like user-generated content and the mining of unstructured data can boost email effectiveness. • What artificial intelligence is offering today – and what it could offer years from now. • How omnichannel merchants can leverage physical locations as part of their online strategy.
Tags : 
email, omnichannel, retail, ecommerce
    
Bronto
Published By: SPSS     Published Date: Jun 30, 2009
Read how Cabelcom recognized the key to tackling churn and was able to identify the point at which customers become dissatisfied with their service.
Tags : 
spss, cablecom, customer retention, crm, churn rate, reduce churn, predictive analytics, statistics, statistical analysis, cable network operator, tailored marketing, targeted marketing, best-of-breed, data mining technology, customer feedback, customer lifecycle, cross-selling, data management, data analysis, decision-making
    
SPSS
Published By: SPSS     Published Date: Jun 30, 2009
The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte."  This article outlines some risks, debunks some myths, and attempts to provide some protective "hard hats" for data miners in the technology sector.
Tags : 
spss, data mining, data miner, data management, business process, best practices, business intelligence, statistics, statistical modeling, algorithms, predictive analysis, data analysis, scalability, optimization, business knowledge, decision-making
    
SPSS
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte."  This article outlines some risks, debunks some myths, and attempts to provide some protective "hard hats" for data miners in the marketing sector.
Tags : 
spss, data mining, data miner, data management, business process, best practices, business intelligence, statistics, statistical modeling, algorithms, predictive analysis, data analysis, scalability, optimization, business knowledge, decision-making
    
SPSS, Inc.
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS, Inc.
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
Read how Cabelcom recognized the key to tackling churn and was able to identify the point at which customers become dissatisfied with their service.
Tags : 
spss, cablecom, customer retention, crm, churn rate, reduce churn, predictive analytics, statistics, statistical analysis, cable network operator, tailored marketing, targeted marketing, best-of-breed, data mining technology, customer feedback, customer lifecycle, cross-selling, data management, data analysis, decision-making
    
SPSS, Inc.
Published By: SAS     Published Date: Sep 30, 2014
Stop to think about how – and how often – your business interacts with customers. Every day, with each interaction, data is created. What percentage of the data generated by these interactions are you using? There are so many channels for interaction, like social media, call centers, sales staff, help and support resources, marketing and campaigns. Typically, organizations believe that they are using only a small fraction of it effectively – at best, upwards of 10 percent of all the available data. Why? One reason relates to the difficulties in collecting all this data. This limitation is beginning to wane as commodity hardware becomes increasingly popular for big data storage. But another major inhibitor to examining all customer data has been the inability to examine millions, or even billions, of data points that constitute the customer picture. And much of this is now in the form of unstructured text inputs.
Tags : 
sas, text analysis visualization, voice of the customer, unstructured text inputs
    
SAS
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the SpectorSoft Implementing Monitoring white paper and you will learn how to assist company executives with determining whether or not to implement employee activity monitoring.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 03, 2015
You just got news of yet another issue that just happened in your business that now you need to deal with – it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. Especially in cases of data theft, fraud, embezzlement, etc., having detail on everything the employee did leading up to the purported “bad deed” will be critical in determining whether something improper occurred or not.
Tags : 
sexual harrassment, embezzlement, employee investigations
    
SpectorSoft
Published By: Asure Software     Published Date: Nov 06, 2013
This paper will offer you clear insight into ways of determining how much money your organization is losing through inefficient payroll processes. More importantly, it will provide you with clear, simple directions for correcting the problem immediately with little risk to the organization’s cash flow.
Tags : 
payroll, manage costs, payroll processes, time and labor management, workforce management software, workforce management, workforce management solutions
    
Asure Software
Published By: KnowledgeVision     Published Date: Jun 29, 2012
Are you mining your database for gold? In KnowledgeVision's white paper, "The New Alchemy: 3 Tips to Turn PowerPoint into Content Gold", you'll learn how to make your slideshows viewable online, how to add video and audio to your slideshows, and how to make your presentations interactive and engaging.
Tags : 
knowledgevision, online, digital, web analytics, video, online video, content, powerpoint
    
KnowledgeVision
Published By: IBM     Published Date: May 07, 2015
Hurwitz & Associates announced the findings of its inaugural Victory Index for predictive analytics. This assessment highlights both the diverse uses of predictive analytics and vendors who make those applications.
Tags : 
predictive analytics, data sources, vendor selection, data mining
    
IBM
Published By: Oracle     Published Date: Dec 11, 2014
It used to take just a slidedeck and some brochures to “enable” the sales team. Not anymore. With modern marketing technology, you now can arm sales with ESP-like insights on their prospects’ online activities in regards to your products and services. This guide reveals the insights and ammunition Modern Marketing offers around determining buyer readiness and the most effective ways to engage each, individually. Read it now.
Tags : 
oracle, eloqua, sales enablement, high-quality leads, productive marketing
    
Oracle
Published By: Wheelhouse Enterprises     Published Date: Jul 10, 2010
The process of determining which is the best phone system for your organization's needs can be a time consuming process. Yet, it demands your due diligence because if you choose the wrong system, it can be not only a costly mistake, but one with long term consequences if your team is stuck with a system that doesn't fulfill your business needs. Here are 8 questions to ask phone system vendors before you agree to purchase.
Tags : 
phone system, telecommunications, phone vendor
    
Wheelhouse Enterprises
Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: CrowdCompass     Published Date: Jul 20, 2017
You know you need a mobile event app, but choosing the right one can sometimes be a tricky, painstaking process. Ranging from freemium/low-cost solutions to full capability, multi-event apps, determining what you need for your conferences, tradeshows, incentive events, meetings, and more is no easy task. Let us help. Download our free eBook: “Simple Questions for Success – The Definitive Guide to Selecting a Mobile App” and find the awesome event app of your, and your attendees, dreams.
Tags : 
mobile app, event app, easy planning, social media integration, social media, networking capabilities, mobile event app, return on investment, mobile personalization, mobile networking, mobile interaction, mobile security, data privacy
    
CrowdCompass
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.