real time intelligence

Results 76 - 100 of 119Sort Results By: Published Date | Title | Company Name
Published By: Interactive Intelligence     Published Date: Apr 23, 2014
In a contact center environment, real-time analytics provide the live information needed to respond to difficult situations before a customer, a sale, or an opportunity is lost. Scott Bakken and David Patchen from MainTrax and Brandon Rowe from Interactive Intelligence discuss how real-time analytics help your business operate at optimal levels and experience increased growth and reduced costs.
Tags : 
interactive intelligence, real time speech analytics, contact centers, data centers, real time analytics, productivity, revenue, retention rates, speech analytics, real time applications
    
Interactive Intelligence
Published By: Zebra     Published Date: Jul 10, 2014
In this paper, Zebra shows how to accelerate the path to IoT through the Visible Value Chain (VVC). It enables organizations to gain real-time visibility into their operations allowing them to be more nimble, agile, and make better-informed business decisions. Once organizations have seamlessly enabled device connection to the data center, they can see events occurring throughout their value chain in real time—and act upon them. Doing so creates new value and intelligence from both legacy and new devices, while mining the vast riches of Big Data.
Tags : 
zebra, internet, visible value chain, vvc, big data, data center, device connection, iot
    
Zebra
Published By: IBM     Published Date: Aug 07, 2012
View this demo to find out how IBM SPSS® solutions for predictive customer analytics can deliver deep customer insights that help you tune your marketing efforts-effectively and efficiently attracting new customers, nurturing customer relationships and retaining ideal customers. Watch how IBM SPSS software uses existing customer information to help you do the following: Identify your best customers for targeted marketing programs with customer segmentation, cluster and profiling techniques; confidently predict which customers will respond to your offers with powerful predictive models; get more out of every customer interaction by delivering real-time, predictive intelligence to front-line decision makers; and enrich and deepen your customer insight with social media analytics.
Tags : 
predictive customer analytics, ibm, decision management, consumer insight, customer, crm, customer relationship management, retain customer, grow relationships, rfm analysis, business intelligence, customer wants, crm & customer care
    
IBM
Published By: SAP     Published Date: May 11, 2012
SMEs need confidence to act boldly on business intelligence and take advantage of business opportunities. The key is to better understand all facets of all the business and to enable data-driven decision making as events unfold.
Tags : 
sme, small and medium enterprises, business intelligence, real time business intelligence, sap
    
SAP
Published By: Adobe     Published Date: Aug 02, 2017
With Adobe Analytics and Adobe Audience Manager—both part of Adobe Marketing Cloud—media companies can overcome today’s audience intelligence challenges. Adobe Analytics is an industry-leading solution for applying real time analytics and detailed segmentation across all of your marketing channels. A unified platform and customer ID unlock powerful customer intelligence and help you discover and retain high-value audiences. Make forward-looking decisions with its predictive intelligence capabilities, and find out which of your marketing efforts are paying off with its attribution functionality.
Tags : 
goals and kpis, data warehouse, resource management, insight loop, content and campaigns, audience optimisation
    
Adobe
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense"
    
McAfee
Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management
    
Polycom
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Make sure you’re getting the most out of your data and the artificial intelligence (AI) technologies available. Read the e-book, Six cloud data challenges solved for app developers and get actionable answers. Learn the best approach when faced with six familiar data scenarios: Keeping track of essentials such as scalability and availability. Making sure your app delivers consistent service to multiple customers. Delivering data in real time, across the globe, without the complexities of multiple datacenters. Creating actionable insights from big data. Incorporating artificial intelligence into your apps. Locking down security while building in the cloud.
Tags : 
    
Microsoft Azure
Published By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS
Published By: AWS     Published Date: Jul 24, 2019
Common daily media broadcaster tasks such as ad verification are slow and costly. Done manually, they may also introduce inefficiencies that can interfere with transparency and payment accountability—and impact your bottom line. Meanwhile, recent and archived media lies idle when you could repurpose it to increase brand exposure and generate revenue. Learn how Veritone, Inc. used its aiWARE Operating System, building on Amazon Web Services (AWS), to help Westwood One, Inc., a large audio broadcasting network in the United States, develop Artificial Intelligence (AI) and Machine Learning (ML) solutions designed for ad verification and monetizing archived media. Download our webinar to learn how you can Automate ad verification and reporting tasks. Enhance archive content to make media searchable and reusable. Use AI and ML in the cloud for near real-time media intelligence. Start applying machine learning tools.
Tags : 
    
AWS
Published By: SAP     Published Date: Nov 22, 2011
Today's competitive and fast-paced business environment requires that more people have access to real-time performance and status information, so they can make quick and intelligent decisions. The need for timely and succinct business intelligence continues to grow as executives demand critical information to seize opportunities faster than competitors and to address potential problems in the making. C-level executives and upper management aren't the only staff needing access to business intelligence. Business unit managers and rank-and-file personnel increasingly must also have updated information to do their jobs. This white paper discusses the features and benefits of next generation dashboards.
Tags : 
ziff davis enterprise, dashboards, business intelligence, technology, business trends, bi solutions
    
SAP
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
For years, executives have been automating for efficiency, freeing workers from repetitive tasks, streamlining the back office and looking for cost savings. Now, they are exploring intelligent automation to establish thinking processes—processes that communicate realtime insights to employees, customers and partners across an expanding ecosystem. The ability to add intelligence to automation opens a new universe of possibilities that will have a profound impact on the way organizations operate and the way work gets done. More than anything else, intelligent automation will be a defining factor for the future workforce.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q3'19     Published Date: Jul 30, 2019
Some technologies cause ripples, others cause waves of transformation. Artifical Intelligence (AI) is prehaps the most transformative of ur era. Read this paper to learn how AI can help you transform your business and B2B network so that you can build a business network for the future. Discover three ways you can apply AI--today--to build a modern, faster, more efficient B2B network: Access detailed, real-time transactional intelligence across your business Gain in-depth, real-time visability into supplier and partner performance Empower supply chain and LOB users with self-service
Tags : 
    
Group M_IBM Q3'19
Published By: VMS     Published Date: Jul 31, 2009
If management has not already cut your budget, be prepared to “prove it or lose it” soon. This report will help you think through your measurement strategies, and either fine-tune an existing program, or get one started post haste.
Tags : 
vms, economy, measurement strategies, budget, pr objective, objective, smart media, share, radio monitoring, proof of performance, realtime monitoring, artificial intelligence, human analysis, opportunities to see, ots, metrics, benchmark, proof of performance, business intelligence
    
VMS
Published By: VMS     Published Date: Jul 31, 2009
One of the big challenges with massive PR initiatives is the difficulty in measuring the outcomes as it pertains to your brand and business objectives set. Read this guide for a five step process that will help you determine the impact of your PR initiatives and compare it to the organizational goals they were aimed to accomplish.
Tags : 
awareness, preferences, share, share of discussion, brand equity, cgm/wom, goals, economy, measurement strategies, budget, pr objective, objective, smart media, share, radio monitoring, proof of performance, realtime monitoring, artificial intelligence, human analysis, opportunities to see
    
VMS
Published By: VMS     Published Date: Jul 31, 2009
In the times of increased awareness and integrated communication across channels, it is crucial to understand correlation between the advertising spend and the PR that surrounds your brand. This report sheds new light on the impact of earned and paid media on the effectiveness of paid advertising.
Tags : 
vms, economy, measurement strategies, budget, pr objective, objective, smart media, share, radio monitoring, proof of performance, realtime monitoring, artificial intelligence, human analysis, opportunities to see, ots, metrics, benchmark, proof of performance, communications, vantage
    
VMS
Published By: cPacket Networks     Published Date: Oct 02, 2014
The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Learn what pitfalls a business should avoid when implementing a network monitoring solution.
Tags : 
cpacket, cpacket networks, data center, network intelligence, network performance, application delivery, cloud computing, cloud network
    
cPacket Networks
Published By: Panduit     Published Date: Oct 08, 2014
Proactive capacity management ensures optimal availability of four critical data center resources: rack space, power, cooling and network connectivity. All four of these must be in balance for the data center to function most efficiently in terms of operations, resources and associated costs.
Tags : 
panduit, data center, capacity management, dcim, rack space, power and cooling, servers, storage
    
Panduit
Published By: SPSS     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the technology sector.
Tags : 
spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence, data analysis, analytical methods, strategic planning, customer intimacy, crm, best practices, business intelligence, statistics, statistical analysis, data management, decision-making
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the marketing sector.
Tags : 
spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence, data analysis, analytical methods, strategic planning, customer intimacy, crm, best practices, business intelligence, statistics, statistical analysis, data management, decision-making, web analytics
    
SPSS, Inc.
Published By: SAS     Published Date: Apr 25, 2017
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis. The heart and soul of SAS Visual Analytics is the SAS® LASR™ Analytic Server, which ca
Tags : 
    
SAS
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: eDataSource     Published Date: Apr 07, 2015
Watch this short webinar today and see for yourself how you can gain access to email competitive data, real-time inbox placement and improve your email campaign performance.
Tags : 
inbox placement, email marketing, email marketing roi, real time email marketing, emerging marketing, marketing research, e-commerce
    
eDataSource
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.