ods

Results 351 - 375 of 570Sort Results By: Published Date | Title | Company Name
Published By: SPSS Inc.     Published Date: Mar 31, 2009
In an intensely competitive marketplace, knowledge is power. The more an airline can learn about what its customers like and don't like about its offerings, the more effective it can be at building customer loyalty and maximizing its revenues.
Tags : 
spss, american airlines, customer loyalty, maximize revenues, roi, specialized market intelligence, production of information, increased productivity, best practices, statistical analysis, analytical methods, statistics, crm, consumer research, data trends, program macros, research, data management, decision-making
    
SPSS Inc.
Published By: SAS     Published Date: Apr 13, 2011
This paper will outline the value and methods involved in data mining across both quantitative and qualitative data. In addition, it will describe the data transformations necessary before doing such work, and the tools that are particularly valuable for mining mixed data types.
Tags : 
business intelligence, michael lock, predictive analytics, business insight, business visibility, small to medium sized business
    
SAS
Published By: iCims     Published Date: Jan 05, 2015
The iCIMS Hire Expectations Institute™ has identified bottlenecks in the hiring process as a major pain point for organizations representing virtually every industry and size.
Tags : 
recruiting, recruitment advertising, social recruiting, social media recruiting, social recruiting software
    
iCims
Published By: TeamQuest     Published Date: Dec 19, 2014
Businesses are constantly putting pressure on price, performance and reliability of IT services and infrastructure. Recent adoption of technologies such as virtualization, dynamic computing and various forms of cloud computing coupled with changing management paradigms has raised the stakes even more. This ruthless drive for efficiency calls for the use of more sophisticated optimization methods. It is safe to say that if you don’t, chances are you will be “done” by others who do.
Tags : 
infrastructure, virtualization, optimization, guide, descriptive, diagnostic, predictive, prescriptive, analysis, efficiency, risk, white, paper
    
TeamQuest
Published By: Esker     Published Date: Dec 08, 2014
In today’s increasingly high-tech and efficiency driven business landscape, internal processes such as accounts payable (AP) are being looked to as prime candidates for modernization. Traditional, paper-based methods of vendor invoice processing are associated with higher costs, lower visibility and longer processing times — all barriers that ultimately impede business progress and the ability to gain a competitive advantage. The purpose of this white paper is to explore the specific challenges faced by companies using manual processing methods while shedding light on the key features and proven benefits of automation. Is it time to modernize your AP process? Read this white paper to get started!
Tags : 
automation, operations, accounts payable, manual inefficiencies, ap workflow, cost, erp system, data recognition, applications, invoice processing, integration
    
Esker
Published By: Inkling     Published Date: Aug 14, 2014
Learn the latest best practices for ensuring digital content quality at scale and across outputs.
Tags : 
inkling, content creation, content quality, digital content quality, digital content formats. editing, publishing, content production methods, content quality at scale
    
Inkling
Published By: Cisco     Published Date: Sep 07, 2016
This white paper goes through the best methods of malware protection.
Tags : 
    
Cisco
Published By: Exablox     Published Date: Jan 27, 2015
As your organization grows, you need the ability to quickly and non-disruptively scale storage capacity to meet the increasing amounts of high-density graphic images, streaming media and other unstructured data. However, when using traditional storage methods, it can be complicated and expensive for you to scale capacity to meet your needs. In this second of a series of informative e-books from Exablox, we take a look at the di?iculties of traditional storage approaches, and o?er simple, practical ways to make your data storage easier to scale.
Tags : 
enterprise storage, unstructured data, data mangement, data recovery, data availability, storage performance, exablox, oneblox
    
Exablox
Published By: Domino     Published Date: Jan 24, 2018
For manufacturers of baked goods and snacks, the need for flexible, high-quality coding and marking solutions has never been greater. The wide array of packaging types and materials already in use today — combined with the SKU proliferation driven by consumer demands — means manufacturers have to print expiration codes and lot numbers on multiple substrates in multiple areas/orientations on their packaging lines. These codes need to be clear, precise and readable by both humans and machines to ensure customer safety and satisfaction. They must also provide traceability in the event of a recall. This white paper from Domino looks at the types of printing technology available today and discusses their various advantages and disadvantages in bakery line applications.
Tags : 
    
Domino
Published By: Citrix Online     Published Date: Jul 02, 2010
This new eBook reveals the strategies used by Apple CEO Steve Jobs to deliver powerful presentations that inform, educate and entertain. Learn Jobs's 10 secret tactics that will have you presenting like a pro in no time.
Tags : 
citrix online, presentation methods, steve jobs, public communication, gotomeeting
    
Citrix Online
Published By: IBM     Published Date: Nov 14, 2014
Data mining uncovers patterns in data through a variety of predictive techniques. By engaging in data mining, organizations like yours gain greater insight into external conditions, internal processes, your markets – and your customers.
Tags : 
ibm, data mining, data management, business results, predictive intelligence, business insights
    
IBM
Published By: IBM     Published Date: May 20, 2015
Today’s customers are well-informed and empowered by information. They use other people and online experts as information sources. They interact with companies by multiple methods and expect a relevant dialogue with each brand. This paper introduces the IBM Predictive Customer Intelligence solution, which is designed to help your company create personalized, relevant experiences for individual customers with a focus on driving new revenue. Along with explaining the architecture of the solution, this paper covers how the solution works.
Tags : 
ibm, software, business analytics, database
    
IBM
Published By: IBM     Published Date: Jan 12, 2016
The core principles of retailing may remain the same but the methods by which retailers must reach out to customers are constantly evolving. As the need for real-time analytics and customer information grows more important, retailers need robust systems to manage the ever-expanding volumes of data.
Tags : 
customer experience, transaction processing, omnichannel banking, consumer demands, customer interaction, shopper experience, retail
    
IBM
Published By: SyberWorks     Published Date: Oct 21, 2008
In most cases, the biggest quandary an organization must solve is to put together a rational, i.e., a cost justified, business case why they should spend capital to invest in a learning management system. The focus of this white paper will outline the benefits of web-based training along with a practical framework for developing ROI when looking at the cost of traditional training methods verses e-Learning.
Tags : 
syberworks, e-learning, roi, global workforce, just-in-time learning, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management
    
SyberWorks
Published By: SyberWorks     Published Date: Oct 21, 2008
This blind case study focuses on the operations division of a Fortune 500 company had significant challenges training its franchisees. They struggled with an 8 to 12 month backlog in providing training for their new franchisees coming on board. Anecdotally, when they did get around to training new people, the requirements and curriculum were outdated and in the process of being revised. Their franchisees and employees were never current on updated company policies and procedures. These franchises were spread all over the country, so it was costly to train their franchisees using traditional onsite training methods.
Tags : 
syberworks, learning management system, roi, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation, fda 21 cfr part 11
    
SyberWorks
Published By: IBM     Published Date: Dec 01, 2014
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
fraud detection, cybercrime, cyber threat, malware
    
IBM
Published By: IBM     Published Date: Feb 19, 2015
Data mining uncovers hidden patterns and relationships in data, driving more informed decisions in organizations of all sizes, and in virtually every industry.
Tags : 
roi, data mining, big data, business analytics
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
Read this ebook from Aberdeen to learn why leading organizations are moving away from the chaos of multiple methods to a single managed file transfer platform, and get best practices for developing a secure, best-in-class file transfer process of your own.
Tags : 
file transfer platform, file transfer process, ibm, unstructured data, file delivery, personal finance, finance
    
IBM
Published By: IBM     Published Date: May 09, 2016
The clear benefits of agile development—better collaboration, incremental delivery, early error detection and the elimination of unnecessary work—have made it the default approach for many teams. Agile methods are also being adopted by systems engineering teams to deliver the same benefits. Some developers have questioned whether requirements fall into the category of unnecessary work, and can be cut down or even completely eliminated. Meanwhile, teams developing complex products, systems and regulated IT continue to have requirements-driven legacy processes. So how does requirements management fit in an agile world? This paper argues that requirements management can bring significant value to agile development in regulated IT and complex product development projects, and sets out the characteristics of an effective requirements management approach in an agile environment.
Tags : 
ibm, watson, iot, internet of things, continuous engineering, agile, agile development
    
IBM
Published By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean management’s approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Let’s explore how agile can be applied in light of these differences.
Tags : 
ibm, continuous engineering, watson, iot, internet of things, agile, product development
    
IBM
Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
A white paper details how to apply authentication methods that strengthen security while delivering an excellent user experience.
Tags : 
trusted authentication, authentication methods, security, ibm
    
Group M_IBM Q1'18
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
In this white paper we do not make specific recommendations for manufacturers to follow; rather, we present suggestions for competing effectively in a fast-paced industry. From adopting lean manufacturing practices to strengthening bidding and quoting processes, opportunities exist for companies to grow and thrive despite relentless cost pressures.
Tags : 
manufacturing, manufacturer, scm, supply chain, supply chain management, lean methods, lean manufacturing, lean, industrial, competitive, competitive analysis, productivity, microsoft, microsoft dynamics
    
Microsoft Dynamics
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.