techniques

Results 251 - 275 of 424Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Mar 06, 2018
These emerging technologies and solutions certainly are not unique to financial services. But Stewart, a business director of security intelligence solutions within the SAS Security Intelligence Practice, sees particular interest and application in AML circles. "There remain a good number of manual processes within financial crimes departments in financial institutions, and AI can help automate some of those rote tasks such as document review or alert triage," he says. "Due to investments in technology, there is a lower barrier of entry for midsized institutions. "And finally, there's this anxiety over the unknown - those risks they are not able to detect, that may be hidden using traditional techniques - so they're hoping that more advanced, unsupervised learning techniques can be used to identify those edge cases or behaviors that are out of norm." In an interview about analytics and the AML paradigm shift, Stewart discusses: • The new industry intrigue with artificial intelligence a
Tags : 
    
SAS
Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management
    
Nemx Software Corporation
Published By: Sunbelt Software     Published Date: Mar 27, 2008
Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses.
Tags : 
messaging, security, web threats, email threats, email security, spam, trojan, sunbelt
    
Sunbelt Software
Published By: BlueCat     Published Date: Sep 14, 2007
This paper introduces and describes the principal concepts and techniques involved with DNS best practices.
Tags : 
dns, dns server, dns servers, server, servers, ip network, ip networks, ip address
    
BlueCat
Published By: BlueCat     Published Date: Jul 09, 2008
A number of factors are fueling the demand for a new, intelligent approach to IP Address Management (IPAM). This document describes these factors while highlighting deficiencies in the legacy IPAM solutions and manual management techniques commonly used today. It also introduces the 'Five Pillars of IPAM Intelligence', BlueCat's framework for articulating its revolutionary, holistic approach to IPAM, and the foundation for the design of Proteus, BlueCat's next generation, intelligent IPAM platform.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
    
BlueCat
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This white paper will help you learn about criminals' motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect when and how attackers have compromised their web server.
Tags : 
verisign, malware security report, bottom line, business protection, cybercriminals, malware attacks, online security
    
VeriSign, Inc.
Published By: Neolane, Inc.     Published Date: Apr 01, 2010
This whitepaper is a call-to-action for all marketers to re-assess antiquated outbound marketing techniques. Marketers need to develop dialogues with customers and prospects to deliver relevant, timely, personalized information throughout the customer lifecycle and reinforce consistent messages across inbound and outbound channels.
Tags : 
neolane, customer experiences, inbound, outbound, call centers, point-of-service, customer service, crm
    
Neolane, Inc.
Published By: Mentor Graphics     Published Date: Sep 01, 2010
This white paper discusses the conditions that have created the need for pattern matching techniques, the identification and creation of patterns, the Calibre Pattern Matching process, and the benefits derived from its use.
Tags : 
mentor graphics, calibre pattern matching, svrf, verification rules, ic design
    
Mentor Graphics
Published By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS Inc.
Published By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : 
iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies
    
Iovation
Published By: Iovation     Published Date: Sep 25, 2009
This white paper will help you understand what new and innovative techniques can be used to protect the reputation of your business and keep your members in a safe and trusted environment, while keeping the fraudsters out.
Tags : 
online dating, online community fraud and abuse, low false positives, pattern matching, web device print, download device print, pattern matching and risk assessment, forensic analysis
    
Iovation
Published By: Iovation     Published Date: Sep 25, 2009
Online casinos generated $22.6 billion in global revenues in 2008, up from $17.6 in 2006. While the online gambling industry grows, so does organized fraud. Cyber criminals are working hard to uncover and sell people's personal information and share techniques on how to defraud online gambling sites. The online gambling industry stands to lose hundreds of millions of dollars annually to fraud exposure if effective anti-fraud strategies aren't put in place.
Tags : 
cyber criminals, online gambling industry, legitimate players, fraudulent deposits, chargebacks, cheating, collusion and money laundering, buy
    
Iovation
Published By: Electric Cloud     Published Date: Aug 07, 2009
Drive quality earlier in the development process with continuous testing. Large development organizations have increasingly been adopting select agile practices to enable faster development, create more reliable software, and reduce costs. Chief among these practices is providing developers early and frequent feedback from users, from other developers, and especially from the programming, build, and test tools. In the latter category, continuous integration and continuous testing are emerging as valuable techniques for identifying errors early so they can be corrected immediately by the developer who made the code changes.
Tags : 
software development, electriccommander, electric cloud, continuous testing, development, coding, testing, production
    
Electric Cloud
Published By: Electric Cloud     Published Date: Oct 13, 2009
In this whitepaper I argue that the person most affected by the introduction of agile or extreme programming techniques is not the software or quality assurance engineer, but the build manager. And the build manager can no longer make do with home grown tools; software production automation tools are required to make agile development a build reality.
Tags : 
electric cloud, agile development, coding, testing, code, software development, build, automation
    
Electric Cloud
Published By: SAS     Published Date: Mar 19, 2013
From Basics to Big Data with SAS® Visual Analytics
Tags : 
big data, visualization, interactive, data, data visualization
    
SAS
Published By: SAS     Published Date: Mar 14, 2014
Master data management is not just something you install and fill with data. By transitioning from a consolidation approach to a data utilization approach, you will see how the disciplines and capabilities of master data management contribute to a long term information strategy that uses best practices to enable comprehensive information visibility.
Tags : 
sas, data management, consolidation approach, data utilization, information strategy, comprehensive information visibility
    
SAS
Published By: iCims     Published Date: Oct 02, 2015
Recruiting departments are increasingly adopting marketing techniques to attract the best talent to their organizations. Software solutions, such as the iCIMS Talent Platform, can help companies keep their brand consistent across all recruiting mediums through branded email communication, social media micro sites and more. Recruiting with an effective employment brand can increase candidate engagement and interest in joining your company.
Tags : 
recruiting, talent management, talent recruitment, recruiting solutions
    
iCims
Published By: CollabNet     Published Date: Mar 30, 2012
Strategies on how to build and maintain a good product backlog. She describes the overall concepts and techniques for backlog management and how each of the project contributors can contribute to its overall effectiveness.
Tags : 
agile, scrum, teams, software dev, swdev, product backlog, backlog, success
    
CollabNet
Published By: Bit9     Published Date: Apr 01, 2013
Every enterprise has high-value information vital to its success. As cyber-attack techniques become more sophisticated, this “digital gold” is increasingly vulnerable.
Tags : 
bit9, advanced attacks, security, cyber threat, protect your business.
    
Bit9
Published By: Conductor     Published Date: Oct 21, 2013
Conductor's research of more than 380 enterprise search marketers and interviews with numerous SEO professionals finally reveals what separates the 'best-in-class' from the 'laggards.' Best-in-class cite early SEO involvement in content, greater maturity in reporting with the use of advanced techniques such as keyword segmentations, data mash-ups and the use of advanced technology in their reporting workflow, and a stronger commitment to organizational evangelism than their laggard colleagues.
Tags : 
seo, search engine optimization, natural search, successful seo, seo initiatives, seo strategies, search engine optimization (seo)
    
Conductor
Published By: Dell Software     Published Date: May 28, 2013
Tools and techniques used to protect physical data are no longer sufficient for virtual data assets. How do you know which technology is right for your organization? Let an expert do the work for you: The Buyers’ Guide to Virtual + Physical Data Protection.
Tags : 
dell quest, appassure, data protection, virtual data, physical data protection
    
Dell Software
Published By: IBM     Published Date: Oct 24, 2013
Read this whitepaper for expert insights by David Parmenter on why we must learn and apply today’s better practices in planning and forecasting models. Insights from this paper will help you migrate into the 21st century with better annual planning tools, or down the path for a robust quarterly rolling forecasting tool.
Tags : 
ibm, performance management, cognos tm1, better annual plan, rolling process, planning tool, implementation process, better business practices
    
IBM
Published By: Campaigner     Published Date: Apr 30, 2015
We created this handbook to help you become the world’s greatest email marketer. On these pages, we will introduce some of the same advanced email marketing techniques and tactics used by marketing departments at the largest and most sophisticated companies.
Tags : 
content marketing, email marketing, smart content, data analytics, crm, customer engagement, email campaigns, content management systems
    
Campaigner
Published By: IBM     Published Date: Nov 14, 2014
Data mining uncovers patterns in data through a variety of predictive techniques. By engaging in data mining, organizations like yours gain greater insight into external conditions, internal processes, your markets – and your customers.
Tags : 
ibm, data mining, data management, business results, predictive intelligence, business insights
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
"Increasingly, brands are looking to differentiate based on an exceptional customer experience. The key to improving the customer experience is being able to effectively measure what’s working and what you need to improve. IBM host a webinar presenting tips on how to measure the customer experience for your brand and how to use that data to build better journeys. Please join IBM and guest speaker Andrew Hogan from Forrester Research as we share tips on how to best measure the digital experiences customers have with your brand and how to use that information to build better journeys. The webinar will provide attendees with: • Best practices to measure the quality of digital customer experiences • Guidance on the kinds of tools to use to capture the right CX metrics • Tips for integrating metrics, including the role of customer journeys • Techniques to drive action and improve digital experiences"
Tags : 
ibm, commerce, customer analytics, marketing, customer experience, customer insight, forrester, digital experience
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.