behavior data

Results 51 - 75 of 106Sort Results By: Published Date | Title | Company Name
Published By: IBM Software     Published Date: Nov 04, 2010
Read this Harvard Business Review article to learn how smart organizations are improving decision-making by identifying and prioritizing decisions; examining factors involved in each decision; designing roles, processes, systems and behaviors to improve decisions; and institutionalizing the new approach through training, refined data analysis, and outcome assessment.
Tags : 
ibm cognos, harvard business review, data analysis, decision management
    
IBM Software
Published By: SAS     Published Date: Apr 25, 2017
Physicians and their patients, medical policy makers and licensing boards, pharmaceutical companies and pharmacies all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths. With so many players and data sources, today’s information is partial, fragmented, and often not actionable. We don’t have the data to understand what’s happening, to adjust policy, and to motivate physicians and patients to change their behaviors. Better data and analytics can help develop better treatment protocols, both for pain in the first place and for remediation when patients are becoming dependent on the drugs.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
    
SAS
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
If you're leading or working on a SaaS or PaaS project, interoperability and performance challenges through application migration processes are givens. Avoid common frantic missteps that will add time to your production cycles. This technical note offers specific proactive steps you can take to ensure to the successful migration of your enterprise apps.
Tags : 
app behavior, application migration, application migration process, cloud computing, emerging technologies
    
IBM Cloud Business
Published By: Unica     Published Date: Sep 23, 2010
If you knew more about your customers, wouldn't you tailor their experience to their unique profile and online behavioral history? Download Three Key Integrations for Interactive Marketing Success and learn how to integrate online data into your interactive marketing strategy.
Tags : 
unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, aberdeen, content management systems, web analytics, email marketing services/software
    
Unica
Published By: Eloqua     Published Date: Sep 28, 2011
Use this guide as a checklist to compare your current email marketing technology against four core areas where marketing automation extends the power of email - audience targeting, automating marketing tactics, enabling sales and measuring results.
Tags : 
email marketing, marketing white paper, marketing automation, behavioral targeting, marketing data, email marketing technology, marketing automation, marketing tactics automation, audience targeting, customer experience/engagement, business intelligence, market research, email marketing services/software, lead generation & automation
    
Eloqua
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection
    
Process Software
Published By: IBM     Published Date: Apr 29, 2014
For banks, mining data from social media can be a significant way to gain insights into customer mindsets and behavior, but effectively and accurately capturing and processing this unstructured data to gain useful customer insight requires sophisticated tools and advanced analytics.
Tags : 
ibm, banking, data mining, social media, consumer insights, business analytics, social business, business technology
    
IBM
Published By: Digital Bungalow     Published Date: Feb 09, 2015
Google Analytics is an excellent tool for gaining insights into user behavior and gathering data for site optimization.
Tags : 
google analytics, site optimization, customer acquisition, consumer behavior, advanced segments, emerging marketing, business intelligence, market research, data management/analytics
    
Digital Bungalow
Published By: AWS     Published Date: Jun 03, 2019
Background How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: SAS     Published Date: Mar 06, 2018
Machines learn by studying data to detect patterns or by applying known rules to: • Categorize or catalog like people or things • Predict likely outcomes or actions based on identified patterns • Identify hitherto unknown patterns and relationships • Detect anomalous or unexpected behaviors The processes machines use to learn are known as algorithms. Different algorithms learn in different ways. As new data regarding observed responses or changes to the environment are provided to the “machine” the algorithm’s performance improves. Thereby resulting in increasing “intelligence” over time.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS’ unique, hybrid approach to insider threat deterrence – which combines traditional detection methods and investigative methodologies with behavioral analysis – enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
The Internet of Things enables retailers to do three basics better and faster: 1) Sensing who customers are and what they’re doing, 2) Understanding customer behavior and preferences, and 3)Acting on that insight to create a more engaging customer experience. - There are high-potential IoT applications in supply chain, in “smart store” operations, and especially in providing an engaging experience to the “connected customer.” IoT data can anticipate where the customer is headed and how to meet her there. - Much of the IoT ground, in both data management and analytics, may be unfamiliar. Retailers and their IT organizations have to be realistic about the technological challenges, their own capabilities, and where they need assistance. - To differentiate through IoT, focus on the analytics. Devices and their data — and even their platforms — are commodities. Advantage goes to the retailer who does the most with the data to engage the connected customer.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 04, 2018
Location analytics is the process of integrating geographical data into business intelligence (BI) and analytics-led decision making. Location analytics creates meaningful insight from relationships found in geospatial data to solve a broad variety of business and social problems. Location data is found everywhere – with an item or a device, in a conversation or behavior, in machines or sensors, tied to a customer or competitor, attached to a database record or recorded from vehicles or other moving objects. Organizations want to take advantage of location data to improve decisions, create better customer engagement and experiences, reduce risks and automate business processes.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 14, 2014
Fan loyalty is everything in the sports business. So when Major League Soccer (MLS), the top flight pro soccer league in the US and Canada, wanted to deepen customer engagement, it turned to SAS® Marketing Automation to get a better understanding of its fans.
Tags : 
sas, customer engagement, data acquisition, monetization, measurement and tracking, mls, major league soccer, database, marketing automation, internal sources, fan funnel, personalization for fans, marketing campaigns, behavior-targeted, geotargeted offers, response data, engagement
    
SAS
Published By: Splunk     Published Date: Apr 16, 2012
Using Splunk, Cricket was able to identify system degradation and failures, even in the application area of Cricket's highly-automated and virtualized environment. Read about Cricket's impressive hard and soft ROI.
Tags : 
splunk, cricket communications, virtualization, automation, customer behavior, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance, log management operations, operations
    
Splunk
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence
    
Webroot Inc
Published By: MaritzCX     Published Date: Nov 29, 2016
Learn and recognize the five signs that your financial customer is becoming a customer prospect. This paper will teach you the characteristics of customer prospects, how to win back and identify at-risk customers, identify patterns and predictive behaviors, and how to use your CX data to help you retain your customers.
Tags : 
maritzcx, cx strategies, customer experience, financial services, customer prospect, customer experience/engagement
    
MaritzCX
Published By: IBM     Published Date: Oct 13, 2015
Read this Stratecast white paper from Frost & Sullivan to learn about the challenges over-the-top (OTT) competitors such as Google, Hulu, Netflix, and Facebook are causing communications service providers (CSPs).
Tags : 
ibm, behavior data, csp, frost and sullivan, communications service providers, emerging marketing, crm & customer care
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection, ibm solutions
    
IBM
Published By: IBM     Published Date: Oct 03, 2017
The demand for new data about customers, customer behaviour, product usage, asset performance, and operational processes is growing rapidly. Almost every industry wants new data. Some examples of this are: • Financial services organisations want more data to improve risk decisions, for ‘Know Your Customer (KYC) compliance and for a 360 degree view of financial crime. • Utilities companies want smart meter data to give them deeper understanding of customer and grid usage and to allow them to exploit pricing elasticity. They also want sensor data to monitor grid health, to optimise field service and manage assets. Download now to learn more!
Tags : 
scaling data, big data, customer behavior, product usage, data integration
    
IBM
Published By: IBM     Published Date: Oct 15, 2013
Good marketing is like a conversation. You have to listen to your customers. In our connected world, that means listening to the data they generate in their interactions with your brand.
Tags : 
enterprise marketing management, emm, capitalize market, data driven marketing, data collection struggle, data trails, customer behavior, mistargeted market, act on opportunities, multichannel connectedness, sales and support agent, customer interactions, customer browsing behavior, keeping up with data collection
    
IBM
Published By: Wyng     Published Date: Jul 13, 2015
The holiday season has become an increasingly competitive space for retailers over the past few years, with brands struggling to break through the noise to gain customer attention. Not only are brands expected to drive increased sales year over year, but they are also expected to create fun and relevant experiences for customers that ultimately drive engagement and support conversions. This fundamental shift in consumer behavior has complicated retailers’ marketing strategies, but also opens up the opportunity to more accurately target and cater to their different shoppers’ needs during the holidays. Download this ebook to learn how to increase Average Order Value, drive last minute purchases, increase sales, extend in-store shopping experiences, and make use of consumer data to inform future marketing decisions.
Tags : 
offerpop, retail marketing, customer engagement, consumer data, marketing solutions, emerging marketing, crm & customer care, marketing research
    
Wyng
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.