Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

digital techniques

Results 1 - 21 of 21Sort Results By: Published Date | Title | Company Name
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security
    
Limelight Networks
Published By: Adobe     Published Date: Nov 07, 2013
Key findings and strategic opportunities for the year ahead
Tags : 
adobe, digital marketing, marketing optimization, optimization budget, marketing budget, incentivized business, adopting testing processes, improving testing processes
    
Adobe
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: HERE Technologies     Published Date: Sep 26, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: • Find out why de-identification does not always mean anonymity • Understand how privacy by design can be used for standards and product or service creation • Discover how gathering just data you need will minimize the privacy impact of collection • Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 30, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: Find out why de-identification does not always mean anonymity Understand how privacy by design can be used for standards and product or service creation Discover how gathering just data you need will minimize the privacy impact of collection Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
To become more effective, enterprises must fast-track projects to digitally connect their organizations. Building value and providing compelling customer experiences at lower cost requires more than a quick technology fix; it demands a business and technological commitment to a new target operating model (TOM). This operating model should offer a way of running the organization that combines digital technologies and operational capabilities to achieve improvements in revenue, customer experience and cost. Enabling digital capabilities via the TOM is an ongoing process that requires DevOps skills and agile development techniques. This is easier to achieve with partners that have the requisite capabilities to help with the creation of new digital assets
Tags : 
    
Group M_IBM Q3'19
Published By: TIBCO Software     Published Date: Nov 12, 2018
The insurance industry stands on the precipice of change, with waves of innovation and disruption driving new possibilities across all departments, including pricing, underwriting, claims, and fraud. This webinar recording of a live panel debate is ideal for insurance professionals wanting to understand how best to unlock the possibilities created by advanced analytical techniques such as Artificial Intelligence (AI), Machine Learning (ML), and others. This TIBCO and Marketforce webinar on “The Fourth Industrial Revolution in Insurance” includes speakers Ian Thompson, chief claims officer at Zurich; David Williams, chief underwriting officer at AXA; and Clare Lunn, GI fraud director at LV=. The panel discusses: Moving towards the algorithmic insurer: the opportunities created by AI and ML How insurers can become more agile in the face of new innovations and disruptive technologies How the industry can turn structured and unstructured data into insights
Tags : 
agile insurance, customer experience, digital initiatives, analytical techniques
    
TIBCO Software
Published By: Gameffective     Published Date: Feb 26, 2019
How to drive employee motivation and learning with gamification and feedback Digital engagement provides an exciting new way of breaking away from old paradigms to generate motivation, proficiency and engagement. In this white paper we will: * Provide ways to rethink call center agent motivation by using techniques like feedback, competition, adaptive learning and goals. * Take a look at what digital motivation looks like in the contact center from the point of view of a call center agent and his manager Using gamification can do much more than drive quality and performance. It also provides agents with much needed engagement, transparency, feedback and optimal use of best practices training.
Tags : 
    
Gameffective
Published By: TruSignal     Published Date: Jun 03, 2013
This white paper aims to provide B2C digital marketers with a better understanding of why you may need an audience expansion technique and what questions to ask yourself before you get started. We hope to not only build an imperative for audience expansion techniques, but also to offer a guide that will help you choose the right data and right techniques for reaching more of your desired prospects online. Specifically, this white paper will discuss and differentiate two specific expansion approaches: lookalike and act-alike audiences including how they are built, the problems they solve and how to use them effectively throughout the marketing funnel.
Tags : 
audience expansion, lookalike, act-alike, audience targeting, predictive analytics, big data, profile data, behavioral data
    
TruSignal
Published By: Monetate     Published Date: Jul 05, 2018
According to The Forrester Wave™: Experience Optimization Platforms, Q2 2018 report, as enterprises continue to consolidate online testing, behavioral targeting and recommendations practices, Experience Optimization Platform (EOP) Providers have been differentiating their services in two key areas: the ability to execute tests across digital channels, and sophistication of behavioral targeting and recommendation techniques. This report assesses the current offering, strategy, and market presence of eight EOP providers, including Monetate. In the report you’ll learn: • Three core capabilities Forrester considers requirements for savvy optimization. • EOP evaluation strategies you can use to evaluate your current vendor (or select a new one) • Criteria that Forrester used to determine Monetate as a “Strong Performer”
Tags : 
    
Monetate
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: IBM     Published Date: Jul 22, 2016
"Increasingly, brands are looking to differentiate based on an exceptional customer experience. The key to improving the customer experience is being able to effectively measure what’s working and what you need to improve. IBM host a webinar presenting tips on how to measure the customer experience for your brand and how to use that data to build better journeys. Please join IBM and guest speaker Andrew Hogan from Forrester Research as we share tips on how to best measure the digital experiences customers have with your brand and how to use that information to build better journeys. The webinar will provide attendees with: • Best practices to measure the quality of digital customer experiences • Guidance on the kinds of tools to use to capture the right CX metrics • Tips for integrating metrics, including the role of customer journeys • Techniques to drive action and improve digital experiences"
Tags : 
ibm, commerce, customer analytics, marketing, customer experience, customer insight, forrester, digital experience
    
IBM
Published By: IBM     Published Date: Aug 17, 2016
The webinar will provide attendees with: - Best practices to measure the quality of digital customer experiences - Guidance on the kinds of tools to use to capture the right CX metrics - Tips for integrating metrics, including the role of customer journeys - Techniques to drive action and improve digital experiences"
Tags : 
ibm, customer experience, commerce, digital, digital customer experiences, cx metrics, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 12, 2016
Please join IBM and guest speaker Andrew Hogan from Forrester Research as we share tips on how to best measure the digital experiences customers have with your brand and how to use that information to build better journeys. The webinar will provide attendees with: - Best practices to measure the quality of digital customer experiences - Guidance on the kinds of tools to use to capture the right CX metrics - Tips for integrating metrics, including the role of customer journeys - Techniques to drive action and improve digital experiences"
Tags : 
ibm, commerce, customer analytics, customer experience, forrester research, enterprise applications
    
IBM
Published By: Wyng     Published Date: Nov 02, 2016
Wyng Offers Insights Into top performing Digital Marketing Campaigns and Techniques.
Tags : 
    
Wyng
Published By: SAS     Published Date: Oct 18, 2017
Machine learning uses algorithms to build analytical models, helping computers “learn” from data. It can now be applied to huge quantities of data to create exciting new applications such as driverless cars. This paper, based on presentations by SAS Data Scientist Wayne Thompson, introduces key machine learning concepts and describes SAS solutions that enable data scientists and other analytical professionals to perform machine learning at scale. It tells how a SAS customer is using digital images and machine learning techniques to reduce defects in the semiconductor manufacturing process.
Tags : 
    
SAS
Published By: Quantcast     Published Date: Feb 13, 2015
Programmatique, RTA, RTB – Qu’est ce que cela signifie? À l’heure actuelle, l’arrivée au quotidien de nouveaux acronymes et de nouvelles technologies peut rendre l’écosystème technologique vraiment compliqué. Ce guide est conçu pour vous aider à mieux saisir l’état actuel de l’écosystème technologique de la publicité digitale. Il présente également les étapes qui ont conduit le secteur à son avancement actuel et explique en termes simples les aspects technologiques et techniques de notre activité.
Tags : 
l’écosystème technologique, programmatique, rta, rtb
    
Quantcast
Published By: Ericsson     Published Date: Feb 06, 2009
Using digital control in power supplies is considerably more flexible than analog control in its ability to adapt to changes and digital control inside the power supply results in advantages to the system application such as improved efficiency, fewer external components and reduced overall cost.
Tags : 
ericsson, analog control, digital control power supply, system application, digital power management, digital power, digital techniques, power conversion
    
Ericsson
Published By: BehavioSec     Published Date: Sep 30, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.