understanding text

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
Published By: Here Technologies     Published Date: Dec 06, 2018
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. U.S. marketers are poised to double their spend on location-targeted mobile ads between 2017 and 2021 to $32 billion, according to research firm BIA/Kelsey. Understanding location is key to gaining insights and making change. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them. This gives them well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Here Technologies     Published Date: Dec 06, 2018
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer – including bridging the journeys between digital and physical worlds – you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Here Technologies     Published Date: Dec 06, 2018
How can brands make the most of the growing opportunities offered by location data? Understanding location and its connection to customer behavior is key to gaining full and reliable insights and making efficient change. HERE is building and sharing real-time location intelligence which reveals why customers make transactions in specific places. HERE’s Open Location Platform contextualizes consumer motivations in the world around them. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE also shares its own insights into the future of reaching customers on their mobile devices as they travel, including in-car advertising.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Sitecore     Published Date: Feb 26, 2016
Mobile isn’t about devices, it’s about people. Understanding this helps mobile leaders deliver contextual content that creates personalized mobile customer experiences. With a mobile leadership mindset, you can build a platform for increasing engagement and loyalty – and driving better commerce results.
Tags : 
wireless management, wireless, communications, business practices, commerce
    
Sitecore
Published By: Lucidworks     Published Date: Aug 24, 2016
Download this eBook to learn how to optimize enterprise search and increase search relevancy using content, context, and the crowd to build better search applications.
Tags : 
search engine optimization, seo, search relevancy, search applications, search intention, ecommerce search
    
Lucidworks
Published By: Here Technologies     Published Date: Sep 26, 2018
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. U.S. marketers are poised to double their spend on location-targeted mobile ads between 2017 and 2021 to $32 billion, according to research firm BIA/Kelsey. Understanding location is key to gaining insights and making change. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them. This gives them well-timed and relevant advertising.
Tags : 
    
Here Technologies
Published By: Here Technologies     Published Date: Sep 26, 2018
How can brands make the most of the growing opportunities offered by location data? Understanding location and its connection to customer behaviour is key to gaining full and reliable insights and making efficient change. HERE is building and sharing real-time location intelligence which reveals why customers make transactions in specific places. HERE’s Open Location Platform contextualises consumer motivations in the world around them. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE also shares its own insights into the future of reaching customers on their mobile devices as they travel, including in-car advertising.
Tags : 
    
Here Technologies
Published By: Here Technologies     Published Date: Jul 19, 2018
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer – including bridging the journeys between digital and physical worlds – you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
    
Here Technologies
Published By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : 
mdm, big data, automation, organization
    
IBM
Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 14, 2018
Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attack objectives.
Tags : 
    
Carbon Black
Published By: IBM     Published Date: Apr 11, 2016
This paper explores why your business needs the latest operational decision management (ODM) solutions to help turn data insights into action. Discover how IBM Operational Decision Manager software and the IBM Business Process Manager platform work together to: *Recognize patterns that suggest opportunity or risk *Create and shape business events by automating decisions *Bring more dimension and precision to decision making by applying analytics to big data *Help you implement the right business processes by understanding data in context.
Tags : 
ibm, smarter process, operational decision management, odm
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamlessly integrate with diverse technologies, from data marts to Apache Hadoop systems. And it must automatically discover, protect and monitor sensitive information as part of big data applications.
Tags : 
    
IBM
Published By: Oracle OMC     Published Date: Nov 30, 2017
Executing a data-driven digital advertising campaign, with a clear understanding of your target, provides you with marketing that is accountable based on revenue. And this data-driven approach is better for your prospects and customers due to relevance. Relationships thrive when you’re communicating in context on a oneto- one basis. Marketing has the opportunity to reinvent itself as a core part of a company’s revenue engine.
Tags : 
    
Oracle OMC
Published By: Workday     Published Date: Jan 16, 2018
The shift from a product- to a service-driven economy—mixed with an uncertain economic climate—has given finance teams the opportunity to become strategic business partners capable of shaping and guiding organisational decision-making. This partnership is only possible by creating a deeper understanding of the contextual factors that influence revenue and profit and loss, and making this analytical data available to the right stakeholders when they need it. That requires a fundamental change in the way finance teams think about technology.
Tags : 
financial, profit, loss, reporting, business, revenue, optimization, workday
    
Workday
Published By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS Inc.
Published By: Taleo     Published Date: Jan 25, 2012
Each area of payback overlaps as talent mobility is not a stand-alone practice. Internal talent redeployment connects with many aspects of overall talent management, especially talent acquisition and succession management. Understanding and quantifying the returns from talent mobility should be framed in that overall context.
Tags : 
taleo, human resources, talent management, employee management, talent development
    
Taleo
Published By: Taleo     Published Date: Feb 01, 2012
The economic impact on an organization from any talent management initiative can be significant. Understanding and quantifying the returns from talent mobility should be framed in that overall context.
Tags : 
recruitment, recruitment software, talent management, talent management software, taleo
    
Taleo
Published By: IBM     Published Date: May 28, 2014
Different types of data have different data retention requirements. In establishing information governance and database archiving policies, take a holistic approach by understanding where the data exists, classifying the data, and archiving the data. IBM InfoSphere Optim™ Archive solution can help enterprises manage and support data retention policies by archiving historical data and storing that data in its original business context, all while controlling growing data volumes and improving application performance. This approach helps support long-term data retention by archiving data in a way that allows it to be accessed independently of the original application.
Tags : 
ibm, data retention, information governance, archiving, historical data, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence
    
IBM
Published By: IBM     Published Date: Jan 20, 2015
Discover five tips for success with customer analytics, and how a better understanding of your customers in context increases revenue and deepens loyalty.
Tags : 
customer analytics, sales cycle, best practices, customer experience analytics, emerging marketing, crm & customer care, marketing research
    
IBM
Published By: IBM     Published Date: May 04, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
IBM
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS, Inc.
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Sitecore     Published Date: Mar 03, 2016
Mobile isn’t about devices, it’s about people. Understanding this helps mobile leaders deliver contextual content that creates personalized mobile customer experiences. With a mobile leadership mindset, you can build a platform for increasing engagement and loyalty – and driving better commerce results.
Tags : 
    
Sitecore
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: