Skip to main content
 

mining

Results 1 - 25 of 193Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Aug 17, 2015
As healthcare organizations become more adept at collaboration, data mining, and understanding the unique populations they serve, they are designing innovative care programs that involve higher risks and rewards.
Tags : 
    
HealthLeaders Media
Published By: Parallon     Published Date: Oct 12, 2015
To succeed in today’s healthcare environment, hospitals and health systems must evaluate the best operating model for key functions to enhance efficiency and optimize performance. This often involves determining whether partnering with another organization to perform a business function makes sense for you.
Tags : 
    
Parallon
Published By: McKesson     Published Date: Apr 30, 2015
Building a data-driven organization takes more than technology. And, healthcare leaders can all agree that issues facing today’s industry are daunting; determining how to react in a way that matches your organization’s strengths and vulnerabilities may be even more challenging. With the right resources in place, you can take pragmatic steps to reduce data silos and deliver efficient, coordinated care across all your settings.
Tags : 
    
McKesson
Published By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
    
Q2 eBanking
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
    
Juniper APAC DWA Cloud Leads July 2017
Published By: ASG Software Solutions     Published Date: Apr 07, 2009
Application Portfolio Optimization (APO) provides executives with tools and information to assess the quality and condition of application assets as well as a means for understanding the impact of proposed application changes.
Tags : 
asg, cmdb, bsm, itil, bsm, portfolio optimization, apo, mining tools
    
ASG Software Solutions
Published By: SAS     Published Date: Apr 25, 2017
Digital currency is here. Consumers have demanded more choice in ways to pay merchants, move money to friends and access their accounts. Payment providers have done well to meet these expectations for immediacy and convenience in managing money. The convenience is great for account holders, but it requires financial institutions and merchants to apply fraud safeguards at the same speed, sometimes in less than a second. Each new accelerated service brings new risks.
Tags : 
    
SAS
Published By: Asure HR     Published Date: Nov 18, 2013
This paper will offer you clear insight into ways of determining how much money your organization is losing through inefficient payroll processes. More importantly, it will provide you with clear, simple directions for correcting the problem immediately with little risk to the organization’s cash flow.
Tags : 
    
Asure HR
Published By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : 
astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content
    
Astaro
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: Pega     Published Date: May 25, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding each vendors’ CRM Customer Engagement Center solutions.
Tags : 
best practices, customer support, business intelligence, business optimization, customer engaement
    
Pega
Published By: Dell     Published Date: Jul 08, 2016
Organizations looking to implement desktop and app virtualization traditionally play a guessing game where storage is concerned. When considering local and physical storage, determining what would be necessary for the virtualized world is difficult and can be overwhelming. This is especially true when determining how virtualizing desktops will impact the storage architecture. Organizations risk over sizing their environment thereby wasting CapEx, or under-sizing and potentially ruining the user experience. Software-defined storage solutions, such as VMware Virtual SAN, provide simplified solutions with high performance data stores that offer fine-grained scalability with linearly-predictable performance as demand grows. Dell’s validated and certified desktop virtualization solutions incorporate vSphere and Virtual SAN, and provide a complete end-to-end solution that allows companies to grow and expand without large capital investments in SAN hardware.
Tags : 
technology, best practices, data, virtualization, storage, data
    
Dell
Published By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : 
detecting unknown threats, websense, next-generation firewall
    
Websense
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : 
collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue
    
Collaborative Consulting
Published By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
    
Venafi
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs
    
Box
Published By: Secureworks     Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Tags : 
managed security services, data breach, security, hackers, security, threat and vulnerability management, cost
    
Secureworks
Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship
    
Adobe
Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship
    
Adobe
Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship
    
Adobe
Published By: Socialbakers     Published Date: Jul 22, 2015
In this report, we delve into the way Dairy brands reach Fans and prospects on social media, examining what kinds of posts they make and seeing what Fans respond to most, to help your brand optimize your content for maximum engagement.
Tags : 
social media, social media engagement, engagement, brands, content strategies, deliver content
    
Socialbakers
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper will explore the impacts of fatigue that extend beyond personal safety and outline effective remedies for this widespread concern.
Tags : 
workforce software, fatigue, personal safety
    
Workforce Software
Published By: Workforce Software     Published Date: Dec 02, 2015
Fatigue management delivers business benefits in terms of your overall workforce management strategy, whether it is an expected function of the business or not. Mitigating fatigue risk can have a dramatic impact on your workforce and your bottom line. Proactively managing employee fatigue is a hallmark of leading businesses, as it demonstrates concern for your employees, customers and the larger community.
Tags : 
employee fatigue, productivity, workforce management, productivity, fatigue management
    
Workforce Software
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.