identification

Results 51 - 75 of 92Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 27, 2016
IBM's i2 Analyst’s Notebook offers a wide range of analysis and visualization capabilities that can aid in the identification of key actionable intelligence. Download this IBM White Paper to discover and deliver actionable intelligence to help identify, predict and prevent criminal, terrorist, and fraudulent activities with IBM i2 Analyst's Notebook.
Tags : 
ibm, cyber threat analysis, ibm i2 analyst notebook, analyst, cyber security, business intelligence
    
IBM
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Everyone expects wireless mobility that provides a high quality experience – but delivering that from arrival to departure in your transportation system is highly complex. Customers want the mobile services that make their life easier such as personalized promotions and navigation guides. Operators want to be able to handle more people, making the customer journey as secure and comfortable as possible, while reducing cost and risk. And all of this depends on the network.
Tags : 
wayfinding, retail promotion, customer identification, analytics, data, automation, business streams
    
Alcatel Lucent Enterprise
Published By: Microsoft     Published Date: Mar 23, 2018
Die Zukunft für den Serviceaußendienst Kevin Ashton, Technologieexperte aus Großbritannien, begründete am Massachusetts Institute of Technology (MIT) das Auto-ID Lab, in dem Pionierarbeit auf dem Gebiet der RadioFrequency Identification (RFID) und anderen Sensoren geleistet wurde. Im Zuge seiner Tätigkeit prägte Ashton im Jahr 1999 erstmals den Begriff des „Internet of Things”, kurz IoT, um die Vernetzung alltäglicher Gegenstände und Geräte sowie deren Übermittlung von Daten und Informationen zu beschreiben. Kevin Ashton gilt deshalb heute als „Vater” des IoT-Konzepts. Ende des Jahres 2015 war Kevin Ashton als Referent auf einem europäischen Kongress zum Thema Kundenservice geladen. Seine These: Das Servicemanagement im Außendienst sei die erste Branche, die mit dem Internet of Things eine grundlegende Transformation durchlaufe.
Tags : 
    
Microsoft
Published By: Limelight Networks     Published Date: Jul 31, 2012
In this report you will learn how today's WCM platforms are fusing the best marketing automation practices with content management, allowing marketers to leverage content in new and innovative ways. Discover 10 of the top capabilities you should be considering for your website.
Tags : 
web content management, wcm, it management, it support, cms, marketing automation, visitor profiles, market segmentation, demographic, visitor identification, campaign tracking, lead scoring, progressive profiling, lead qualification, social engagement, multiedvice, multilingual, multisite support
    
Limelight Networks
Published By: Network Automation     Published Date: Dec 10, 2008
The Auxiliary IT Operation center at the Indiana University has a lot of responsibility on its plate. It is in charge of the majority of for-profit activities the university is engaged in, namely the halls of residence, parking, dining facilities, campus transportation and much more. Additionally, this unit supports many critical IT processes including the secure distribution of student photos for identification cards.
Tags : 
network automation, data security, data transfer, disaster recovery
    
Network Automation
Published By: IBM     Published Date: May 04, 2009
Live migration is essential for a dynamic data center environment. But until now, it's been impossible between different generations of processors. Intel IT and End User Platform Integration have done so successfully with Intel® Virtualization Technology FlexMigration. This white paper explains how.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, flexmigration, processors, proof-of-concept, poc, virtual machines, vms, virtual machines, vmware esx 3.5u2
    
IBM
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation
    
Iovation
Published By: Genesys     Published Date: Feb 12, 2019
Sur un marché des centres de contacts cloud aussi vaste que changeant, il est souvent difficile de trouver la solution adaptée à votre entreprise. C’est pourquoi Ovum a conçu un outil intitulé « Matrice décisionnelle Ovum : comment sélectionner une solution de centre de contacts multicanal dans le cloud (édition 2017-18) ». Ce document a pour but de dresser un comparatif des grands acteurs de ce marché sur la base de leurs fonctions de routage des appels voix et de service client multicanal. Vous y découvrirez comment Genesys s’est imposé parmi les leaders grâce à des solutions pour les entreprises de toutes tailles et de tous secteurs à travers le monde. Au sommaire de la Matrice décisionnelle Ovum : Comparatif des plateformes technologiques des différentes solutions de centre de contacts dans le cloud Évaluation des capacités des fournisseurs dans les domaines de la gestion des interactions clients multicanaux et de l’analytique des données clients et d’entreprise Identification
Tags : 
    
Genesys
Published By: Epicor     Published Date: Feb 22, 2010
Download this white paper now and learn high level definitions, opportunity identification, and future potentials for: Service Oriented Architecture (SOA), Enterprise Resource Planning (ERP) Anytime, Anywhere Availability, Mobile Devices, Web 2.0, and Report Cards or Balanced Scorecards as a Business Intelligence (BI) capability.
Tags : 
epicor, distribution environment, service oriented architecture, soa, enterprise resource planning, erp, business intelligence, mobile devices, web 2.0
    
Epicor
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: SAP     Published Date: Jun 23, 2009
The Economist Intelligence Unit examines the lessons learned from the current financial crisis, and proposes ten practical lessons that could help to address perceived weaknesses in risk identification, assessment and management.
Tags : 
recession, sap, economist, risk management, risk, recovery, risk identification, crisis, towers perrin, kpmg, incentive, senior executives, risk officer, cro, human judgment, value-at-risk, var, stress test
    
SAP
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS, Inc.
Published By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS Inc.
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Les organisations engagées dans un processus de transformation numérique sont davantage préoccupées par des questions liées au risque et à la sécurité, ce qui n’a rien de surprenant. Les initiatives de transformation numérique entraînent inévitablement une augmentation du nombre de points d’accès à l’infrastructure de l’entreprise qui se situent en dehors des contrôles existants et sont accessibles par des identités plus nombreuses et plus variées qui prolifèrent à l’intérieur d’une infrastructure distribuée et dynamique.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access, privileged access management, security, privileged credentials, secure it
    
CA Technologies EMEA
Published By: Zebra Technologies     Published Date: Dec 20, 2017
Delivering the best possible care to every patient is a complex, interconnected process that involves every department in a healthcare facility. From the moment a patient enters a facility, a wide range of activities must be performed by many different employees from different functional areas — in a timely and efficient way—to ensure the best possible outcome, including performing tests, collecting specimens, administering medications and delivering treatments. Each one of these activities must be coordinated and documented as part of an overall care plan. But the first step is making sure clinicians are treating the right patient—in the right way—every time. Zebra’s white paper explores the critical impact positive patient identification (PPID) has on patient safety throughout the administrative, diagnostic and treatment phases of a patient’s stay. The paper also explores how PPID can improve staff efficiency and help healthcare organizations meet the needs of changing patient dem
Tags : 
    
Zebra Technologies
Published By: Arcot     Published Date: Jun 04, 2008
Man-in-the-Middle attacks can defeat most kinds of multi-factor authentication, including OTP tokens. Financial institutions, brokerages, and other likely targets of MITM attacks should consider the ability of their countermeasures to defeat MITM attacks, as these types of attacks will continue.
Tags : 
authentication, identification, identity, identity theft, arcot, man in the middle, man-in-the-middle, mitm
    
Arcot
Published By: HERE Technologies     Published Date: Sep 26, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: • Find out why de-identification does not always mean anonymity • Understand how privacy by design can be used for standards and product or service creation • Discover how gathering just data you need will minimize the privacy impact of collection • Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 30, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: Find out why de-identification does not always mean anonymity Understand how privacy by design can be used for standards and product or service creation Discover how gathering just data you need will minimize the privacy impact of collection Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Neustar     Published Date: Aug 20, 2012
TARGUSinfo introduces you to the buying behaviors and patterns of today's insurance consumer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : 
web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization, site customization, web messaging, landing page customization, consumer identification, consumer verification, consumer qualification, score leads, score consumers, verify leads, verify consumers, marketing
    
Neustar
Published By: Zebra Technologies     Published Date: May 02, 2018
Up to 14% of medical records include inaccurate, potentially dangerous patient data as a direct result of failures in patient identification. Often, errors can be attributed to outdated manual processes, such as oral verification or written wristbands, which can impact the standard of care delivered. In this white paper Zebra Technologies outlines the benefits of an automated barcode wristband solution, including insight into: Reducing common Patient ID errors The advantages of automated Patient ID processes over manual The best automated barcoding options
Tags : 
patient, identification, streamline, hospital, processes, optimization, zebra
    
Zebra Technologies
Published By: Linx Technologies     Published Date: Jun 23, 2008
While actual RF design is quite difficult, understanding basic RF concepts is amazingly straightforward. For those of you delving into the world of RF for the first time, when you finish this article, you will have a clearer understanding of how signals are transmitted and received in an RF environment.
Tags : 
rfid, radio frequency, plm, product lifecycle, identification, linx, linx technologies
    
Linx Technologies
Published By: Oracle Corporation     Published Date: May 11, 2012
With more accurate sales forecasts and enhanced identification of potential problems and opportunities, Oracle Sales Analytics helps close business faster and increase overall sales revenue. Find out more today!
Tags : 
sales analytics, sales forecasts, kpis, key performance indicators
    
Oracle Corporation
Start   Previous    1 2 3 4    Next    End
Search Resource Library