data mining

Results 1 - 25 of 85Sort Results By: Published Date | Title | Company Name
By: SPSS     Published Date: Jun 02, 2010
This paper illustrates data mining will enable clinicians and managers to find valuable new patterns in data, leading to potential improvement of resource utilization and patient health. As the patterns are based on recent clinical practice, they represent the ultimate in evidence-based care. This paper briefly introduces the PASW Modeler* data mining system, which incorporates advanced machine learning technologies that extract complex interrelationships and decision-making rules from the data.
Tags : 
spss, it
    
SPSS
By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : 
astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content
    
Astaro
By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : 
collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue
    
Collaborative Consulting
By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship
    
Adobe
By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship
    
Adobe
By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship
    
Adobe
By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai
By: IBM     Published Date: Oct 13, 2011
This whitepaper from IBM reveals three ways that the most successful companies are taking action when they deploy business analytics.
Tags : 
ibm, big data, analytics, knowledge discovery, data mining, business analytics and optimization, bao, business analytics
    
IBM
By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
By: Success Factors     Published Date: Aug 10, 2012
Will the people you need for your future workforce be there? This complimentary SuccessFactors white paper shows how to shorten the journey to data-driven decision-making about talent. Download it today.
Tags : 
successfactors, sap, best practices, workforce planning, data-driven decisions, workforce analytics, data mining, predictive modeling
    
Success Factors
By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
By: Dun & Bradstreet     Published Date: Feb 02, 2016
Take the mystery out of business credit data The modern-day explosion in data has presented new challenges for interpreting financial reports to uncover meaningful insight. We often struggle to be efficient with the resources we have and the data we use to make our decisions, whether we’re talking with a new customer or an existing one.
Tags : 
hoovers, credit data, data analysis, credit report, evaluation, risk assessment
    
Dun & Bradstreet
By: Extreme Networks     Published Date: Feb 10, 2015
Dans cet eBook, nous vous présenterons des cas d’utilisation illustrant comment une solution d’analyse des applications peut être utilisée de manière efficace par le service informatique.
Tags : 
extreme networks, purview, analyse des applications, sans fil, wifi, solution réseau, solution de business intelligence, business intelligence
    
Extreme Networks
By: SAS     Published Date: May 24, 2018
This paper provides an introduction to deep learning, its applications and how SAS supports the creation of deep learning models. It is geared toward a data scientist and includes a step-by-step overview of how to build a deep learning model using deep learning methods developed by SAS. You’ll then be ready to experiment with these methods in SAS Visual Data Mining and Machine Learning. See page 12 for more information on how to access a free software trial. Deep learning is a type of machine learning that trains a computer to perform humanlike tasks, such as recognizing speech, identifying images or making predictions. Instead of organizing data to run through predefined equations, deep learning sets up basic parameters about the data and trains the computer to learn on its own by recognizing patterns using many layers of processing. Deep learning is used strategically in many industries.
Tags : 
    
SAS
By: Topsy     Published Date: Jul 16, 2013
Marketing today is real-time, always-on, pervasive, and constant—but following these 5 simple rules guarantees that you’ll stand out from the crowd.
Tags : 
twitter, advertising, real-time, realtime marketing, real-time marketing, social marketing, social strategy, social listening
    
Topsy
By: Oracle     Published Date: Jan 28, 2015
Traditional brick-and-mortar multi-channel retailers have online competitors ruled by data scientists who define retail as a data mining and optimization problem. John Bible, Senior Director of Retail Data Science and Insight at Oracle Retail discusses the science of pricing, and predictions for the role of science in retail over the next five years.
Tags : 
    
Oracle
By: Sybase     Published Date: Dec 01, 2011
This e-Brochure shows why Sybase IQ is the essential foundation for advanced analytics.
Tags : 
analytics software, analytics server, analytics server software, data warehousing, data mining, data warehouse, data mining software, business intelligence data mining
    
Sybase
By: Sybase     Published Date: Dec 01, 2011
Sybase IQ can give you smarter answers now. See how in this free webinar from Forester Research
Tags : 
analytics software, analytics server, analytics server software, data warehousing, data mining, data warehouse, data mining software, business intelligence data mining
    
Sybase
By: Sybase     Published Date: Dec 01, 2011
Learn why Sybase IQ is purpose-built for predictive analytics.
Tags : 
analytics software, analytics server, analytics server software, data warehousing, data mining, data warehouse, data mining software, business intelligence data mining
    
Sybase
By: Sybase     Published Date: Dec 01, 2011
This paper explores how the right data management architecture can overcome these challenges.
Tags : 
analytics software, analytics server, analytics server software, data warehousing, data mining, data warehouse, data mining software, business intelligence data mining
    
Sybase
By: Teradata     Published Date: Feb 26, 2013
Data is now available, often in endless amounts, from many rich sources. This article discusses the answers to how organizations can thrive in this era of rich and boundless information using a Unified Data Architecture platform.
Tags : 
gaining value from emerging data, nothing more than just the next step, data mining, unified data architecture platform, social media, mobile devices
    
Teradata
By: Jebbit     Published Date: Jun 12, 2018
As marketers, we use data at every level, from determining Facebook targeting to timing a major product launch. But how often do we take a look under the hood at the quality and usefulness of our data? In this playbook, we’ll cover the strengths and weaknesses of third-party, second-party, and first-party data and where declared data fits into the current data landscape. You’ll learn plays for activating declared data for: Qualified lead generation 1-to-1 email personalization Custom audiences and personalized retargeting Audience building and profiling In this section, we’ll cover the definitions, sources, and strengths and weaknesses of third-, second-, and first-party data.
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Start   Previous   1 2 3 4    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.