identification

Results 26 - 50 of 92Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Oct 03, 2019
In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs. Understanding the location of all data, whether at-rest, in-use, or in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify their riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data. This webinar explores how companies should rethink data security. Protecting critical data and intellectual property requires a risk-adaptive, dynamic approach, including these three main components. Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of c
Tags : 
    
Forcepoint
Published By: Genesys     Published Date: Feb 12, 2019
Sur un marché des centres de contacts cloud aussi vaste que changeant, il est souvent difficile de trouver la solution adaptée à votre entreprise. C’est pourquoi Ovum a conçu un outil intitulé « Matrice décisionnelle Ovum : comment sélectionner une solution de centre de contacts multicanal dans le cloud (édition 2017-18) ». Ce document a pour but de dresser un comparatif des grands acteurs de ce marché sur la base de leurs fonctions de routage des appels voix et de service client multicanal. Vous y découvrirez comment Genesys s’est imposé parmi les leaders grâce à des solutions pour les entreprises de toutes tailles et de tous secteurs à travers le monde. Au sommaire de la Matrice décisionnelle Ovum : Comparatif des plateformes technologiques des différentes solutions de centre de contacts dans le cloud Évaluation des capacités des fournisseurs dans les domaines de la gestion des interactions clients multicanaux et de l’analytique des données clients et d’entreprise Identification
Tags : 
    
Genesys
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
    
Group M_IBM Q418
Published By: HERE Technologies     Published Date: Sep 26, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: • Find out why de-identification does not always mean anonymity • Understand how privacy by design can be used for standards and product or service creation • Discover how gathering just data you need will minimize the privacy impact of collection • Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 30, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: Find out why de-identification does not always mean anonymity Understand how privacy by design can be used for standards and product or service creation Discover how gathering just data you need will minimize the privacy impact of collection Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: IBM     Published Date: May 04, 2009
Live migration is essential for a dynamic data center environment. But until now, it's been impossible between different generations of processors. Intel IT and End User Platform Integration have done so successfully with Intel® Virtualization Technology FlexMigration. This white paper explains how.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, flexmigration, processors, proof-of-concept, poc, virtual machines, vms, virtual machines, vmware esx 3.5u2
    
IBM
Published By: IBM     Published Date: Nov 03, 2014
Business critical applications must always be available and performing. Furthermore, the reality is in today's customer centric world, slow is the new broke. Compounding this challenge, IT complexity is rapidly increasing.
Tags : 
infrastructure visibility, it complexity, search analytics, problem identification
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Why strong, effective security can and should both enhance the customer experience and lower operational costs.
Tags : 
customer experience, holistic fraud prevention, operational costs, increased transactions, fraud identification
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
    
IBM
Published By: IBM     Published Date: Jul 27, 2016
IBM's i2 Analyst’s Notebook offers a wide range of analysis and visualization capabilities that can aid in the identification of key actionable intelligence. Download this IBM White Paper to discover and deliver actionable intelligence to help identify, predict and prevent criminal, terrorist, and fraudulent activities with IBM i2 Analyst's Notebook.
Tags : 
ibm, cyber threat analysis, ibm i2 analyst notebook, analyst, cyber security, business intelligence
    
IBM
Published By: IBM Watson Health     Published Date: Nov 10, 2017
To address the volume, velocity, and variety of data necessary for population health management, healthcare organizations need a big data solution that can integrate with other technologies to optimize care management, care coordination, risk identification and stratification and patient engagement. Read this whitepaper and discover how to build a data infrastructure using the right combination of data sources, a “data lake” framework with massively parallel computing that expedites the answering of queries and the generation of reports to support care teams, analytic tools that identify care gaps and rising risk, predictive modeling, and effective screening mechanisms that quickly find relevant data. In addition to learning about these crucial tools for making your organization’s data infrastructure robust, scalable, and flexible, get valuable information about big data developments such as natural language processing and geographical information systems. Such tools can provide insig
Tags : 
population health management, big data, data, data analytics, big data solution, data infrastructure, analytic tools, predictive modeling
    
IBM Watson Health
Published By: Infosys     Published Date: May 21, 2018
In a country often referred to as the business hub of the Middle East, bringing a new person into the world gave parents plenty to keep them busy. For each birth, parents were required to visit a number of different government agencies to collect the necessary legal documents such as a birth certificate and a national ID card. But a new emphasis on 'Smart Government' aimed to transform the experience for the benefit of all citizens.
Tags : 
government, identification, birth certificate, legal, document
    
Infosys
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation
    
Iovation
Published By: Limelight Networks     Published Date: Jul 31, 2012
In this report you will learn how today's WCM platforms are fusing the best marketing automation practices with content management, allowing marketers to leverage content in new and innovative ways. Discover 10 of the top capabilities you should be considering for your website.
Tags : 
web content management, wcm, it management, it support, cms, marketing automation, visitor profiles, market segmentation, demographic, visitor identification, campaign tracking, lead scoring, progressive profiling, lead qualification, social engagement, multiedvice, multilingual, multisite support
    
Limelight Networks
Published By: Linx Technologies     Published Date: Jun 23, 2008
While actual RF design is quite difficult, understanding basic RF concepts is amazingly straightforward. For those of you delving into the world of RF for the first time, when you finish this article, you will have a clearer understanding of how signals are transmitted and received in an RF environment.
Tags : 
rfid, radio frequency, plm, product lifecycle, identification, linx, linx technologies
    
Linx Technologies
Published By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : 
mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence
    
McAfee
Published By: Mentor Graphics     Published Date: Apr 03, 2009
Moving to C++ presents opportunities for higher programmer productivity. The requirements of embedded systems, however, demand that the adoption of C++ be carefully measured for the performance impact of run-time costs present in C++, but not in C. This talk suggests strategies for developers who are starting their acquaintance with C++.
Tags : 
c++, coding, developer, programming, programmer, mentor graphics, run-time costs, embedded systems, ansi/iso c[, risc, first principle, cost evaluation, declaration, evaluation principle, initialized static consts, arbitrary placement of declarations, overloading, function in-lining, multiple inheritance, run-time type identification
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Sep 01, 2010
This white paper discusses the conditions that have created the need for pattern matching techniques, the identification and creation of patterns, the Calibre Pattern Matching process, and the benefits derived from its use.
Tags : 
mentor graphics, calibre pattern matching, svrf, verification rules, ic design
    
Mentor Graphics
Published By: Microsoft     Published Date: Mar 23, 2018
Die Zukunft für den Serviceaußendienst Kevin Ashton, Technologieexperte aus Großbritannien, begründete am Massachusetts Institute of Technology (MIT) das Auto-ID Lab, in dem Pionierarbeit auf dem Gebiet der RadioFrequency Identification (RFID) und anderen Sensoren geleistet wurde. Im Zuge seiner Tätigkeit prägte Ashton im Jahr 1999 erstmals den Begriff des „Internet of Things”, kurz IoT, um die Vernetzung alltäglicher Gegenstände und Geräte sowie deren Übermittlung von Daten und Informationen zu beschreiben. Kevin Ashton gilt deshalb heute als „Vater” des IoT-Konzepts. Ende des Jahres 2015 war Kevin Ashton als Referent auf einem europäischen Kongress zum Thema Kundenservice geladen. Seine These: Das Servicemanagement im Außendienst sei die erste Branche, die mit dem Internet of Things eine grundlegende Transformation durchlaufe.
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
Kevin Ashton founded the Auto-ID Center at the Massachusetts Institute of Technology, and has done pioneering work in radio-frequency identification and sensor technology. Ashton is known for coining the term “the Internet of Things” to describe a system where the Internet is connected to the physical world via ubiquitous sensors. In 2015, he spoke at a European customer service conference and noted that field service management is the first industry being transformed by IoT. Some people in the industry have noted that the entire IoT concept came from trying to solve field service problems in 1999. IoT’s origin story lies in field service management. Clearly, field service management and IoT are deeply intertwined. But how are the changes being implemented? And how can you benefit from them?
Tags : 
    
Microsoft
Published By: MicroStrategy     Published Date: Jan 23, 2019
The MicroStrategy 2018 Global State of Enterprise Analytics Report, which surveyed 500 decision-makers from around the globe, reveals that leading organizations create a competitive edge through their use of data, with 63% experiencing improved efficiency and productivity, 57% realizing faster, more effective decision making, and 51% achieving better financial performance. Other top benefits include improved customer experiences, improved customer acquisition and retention, and the identification and creation of new revenue streams—all keys to digital transformation. What else did the 2018 report reveal? Read all the insights with both global and geo-specific views here. This infographic shares a few highlights from the new 44-page report which serves as a benchmarking resource for all data-driven organizations.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Apr 11, 2019
The MicroStrategy 2018 Global State of Enterprise Analytics Report, which surveyed 500 decision-makers from around the globe, reveals that leading organizations create a competitive edge through their use of data, with 63% experiencing improved efficiency and productivity, 57% realizing faster, more effective decision making, and 51% achieving better financial performance. Other top benefits include improved customer experiences, improved customer acquisition and retention, and the identification and creation of new revenue streams—all keys to digital transformation. What else did the 2018 report reveal? Read all the insights with both global and geo-specific views here. This infographic shares a few highlights from the new 44-page report which serves as a benchmarking resource for all data-driven organizations.
Tags : 
    
MicroStrategy
Published By: Network Automation     Published Date: Dec 10, 2008
The Auxiliary IT Operation center at the Indiana University has a lot of responsibility on its plate. It is in charge of the majority of for-profit activities the university is engaged in, namely the halls of residence, parking, dining facilities, campus transportation and much more. Additionally, this unit supports many critical IT processes including the secure distribution of student photos for identification cards.
Tags : 
network automation, data security, data transfer, disaster recovery
    
Network Automation
Published By: Neustar     Published Date: Aug 20, 2012
TARGUSinfo introduces you to the buying behaviors and patterns of today's insurance consumer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : 
web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization, site customization, web messaging, landing page customization, consumer identification, consumer verification, consumer qualification, score leads, score consumers, verify leads, verify consumers, marketing
    
Neustar
Published By: Neustar     Published Date: Feb 27, 2013
Neustar® Information Services introduces you to the buying behaviors and patterns of today’s insurance customer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : 
web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization, site customization, web messaging, landing page customization, consumer identification, consumer verification, consumer qualification, score leads, score consumers, verify leads, verify consumers, b2c, business to consumer
    
Neustar
Start   Previous    1 2 3 4    Next    End
Search Resource Library