Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

data mining

Results 1 - 25 of 83Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship, customer engagement
    
Adobe
Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship, customer engagement
    
Adobe
Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship, customer engagement
    
Adobe
Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai
Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : 
astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content
    
Astaro
Published By: Aventail     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica
    
Aventail
Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment
    
BlueHornet
Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
    
Burton Group
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp, networking, security, it management
    
Cisco
Published By: Clarabridge     Published Date: Dec 06, 2006
This white paper describes how the Clarabridge Content Mining Platform avoids the pitfalls of previous approaches to unstructured analysis, and capitalizes on lessons learned from solving similar problems in the structured domain.
Tags : 
business intelligence, data warehousing, data mining, content integration, content management system, cms, business analytics, content mining, holistic, clarabridge
    
Clarabridge
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : 
collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue, media promotions, measurable influence, maturity level, data center design and management, data center
    
Collaborative Consulting
Published By: Customer Chemistry     Published Date: Nov 14, 2006
Read this white paper to learn about the six keys to a structured approach to planning and implementation of a predictive analytics infrastructure.  Find out how you can turn customer intelligence data into actionable information for improving the accuracy, efficiency and success of your targeting efforts.
Tags : 
customer intelligence, business intelligence, marketing intelligence, customer research, predictive analytics, analytics, infrastructure, customer data, data mining, customer chemistry, enterprise applications
    
Customer Chemistry
Published By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : 
visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence, real-time data, real-time data visualization, real-time data discovery, data variety software, data discovery software, data analysis software, data mining tools, data extraction, data reporting, pdf to excel, business reporting, data solutions
    
Datawatch
Published By: Delphix     Published Date: Mar 24, 2015
Data masking has long been a key component of enterprise data security strategies. However, legacy masking tools could not deliver secure data, undermining their impact. Explore how data as a service can deliver on the promise of masking, while increasing organizational flexibility and agility.
Tags : 
    
Delphix
Published By: Discovery Corps, Inc     Published Date: Jan 11, 2011
Article on how to handle missing values in a dataset during a data mining project
Tags : 
data mining, missing values, techniques, diagnosis, tips, missing data
    
Discovery Corps, Inc
Published By: Discovery Corps, Inc.     Published Date: Nov 20, 2009
Seeing into the hearts and minds of our customers is impossible; but this article describes how Data Mining techniques can be used to create strategies and tactics to increase customer retention and value.
Tags : 
data mining, business intelligence, predictive modeling, customer retention, high-value customers, decision support, clustering, discovery corps
    
Discovery Corps, Inc.
Published By: Dun & Bradstreet     Published Date: Feb 02, 2016
Take the mystery out of business credit data The modern-day explosion in data has presented new challenges for interpreting financial reports to uncover meaningful insight. We often struggle to be efficient with the resources we have and the data we use to make our decisions, whether we’re talking with a new customer or an existing one.
Tags : 
hoovers, credit data, data analysis, credit report, evaluation, risk assessment
    
Dun & Bradstreet
Published By: Epson     Published Date: May 10, 2018
Online, mobile, omnichannel, untethered, data mining, automation, and remote communication are all now buzzwords surrounding the new technologies and resources financial institutions have to help them re-invent their branch experience. Capabilities are available today that were not imagined a decade ago. This is an exciting time for those institutions that can look to the future and enhance their offerings. While technology is driving change, it can also be a tremendous challenge for financial institutions as they work to keep pace and even take advantage of the dramatic shift in customer needs and expectations. Millennials, baby boomers, small businesses – all are important market segments with very different wants and needs. Driven by technology, the new demand is for a complete online presence, complemented by more flexibility in personalized services, and specialized expertise available in every branch. Suffice it to say, financial institutions of all sizes and in every geography a
Tags : 
    
Epson
Published By: Extreme Networks     Published Date: Sep 17, 2014
In this eBook, we will demonstrate specific use cases for how a business intelligence solution can be used effectively by IT operations.
Tags : 
extreme networks, purview, application analytics, wifi/wireless, network solutions, business intelligence solutions, business intelligence, it operations, it management, data mining, networking, network technology, network optimization, business analytics, application, application security
    
Extreme Networks
Published By: Extreme Networks     Published Date: Feb 10, 2015
Dans cet eBook, nous vous présenterons des cas d’utilisation illustrant comment une solution d’analyse des applications peut être utilisée de manière efficace par le service informatique.
Tags : 
extreme networks, purview, analyse des applications, sans fil, wifi, solution réseau, solution de business intelligence, business intelligence, analyse applicative, datamining, réseau, optimisation du réseau, business analytics, application, sécurité des applications, wireless
    
Extreme Networks
Published By: FICO     Published Date: Sep 02, 2016
The unifying concept that defines FICO and its substantial technology and solutions stack is Decision Management. This term has not yet become mainstream - but it will. All business analytics activities are performed with the single aim of improving the accuracy and efficiency of business decisions. This applies to business intelligence, data visualization, data mining, business rules management, and many other forms of analysis. Unifying these activities under a single discipline means that currently fragmented analytical efforts can be combined into a single whole, with benefits that will be discussed in this review.
Tags : 
    
FICO
Start   Previous   1 2 3 4    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.