intelligence

Results 2376 - 2400 of 2427Sort Results By: Published Date | Title | Company Name
Published By: Rocket Fuel     Published Date: Mar 04, 2015
Remember back in the day when digital advertising was simple to understand? Like popping open the hood of a 1972 Ford, all the parts were simple and visible, and how they fit together was intuitive. It made sense. Now? Piecing together the modern digital advertising ecosystem is like trying to assemble a spaceship in your living room. But as Rocket Fuel Director of Artificial Intelligence Michael Benisch explains in our latest whitepaper, using advanced systems to buy media programmatically doesn't have to be overwhelming. Michael will take you "under the hood" of programmatic buying and walk you through the process of how and why a consumer sees the ads they see. Download the whitepaper and pop open the hood before choosing a programmatic partner.
Tags : 
programmatic, programmatic partner, digital advertising, programmatic advertising, online advertising, ad platform, digital marketing, ad network, media buying, real-time bidding, digital media buys, big data, artificial intelligence, programmatic media buying, always-on marketing, dsp, big data marketing, optimize advertising performance, fixed-price bid models, marketing roi
    
Rocket Fuel
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The concept of artificial intelligence (AI) has been with us since the term was coined for the Dartmouth Summer Research Project on Artificial Intelligence in 1956. Today, while general AI strives for full cognitive abilities, there is a narrower scope—this better-defined AI is the domain of machine learning (ML) and other algorithm-driven solutions where cybersecurity has embraced AI. SANS recently conducted a survey of professionals working or active in cybersecurity, and involved with or interested in the use of AI for improving the security posture of their organization. Read their report to learn their survey findings, conclusions, and recommended considerations.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over time remains unclear for respondents to a new SANS Institute research study sponsored by BlackBerry Cylance. Opinions varied about the maturity of AI, its benefits and risks, and the baseline requirements for an AI-enabled security solution. Download the report today for the complete survey results and learn: 1) How perceptions of AI vary across industry sectors and organizational roles and responsibilities; 2) How AI technologies compare and contrast with human intelligence; 3) How machine learning is driving advances in the field; 4) What respondents believe to be the greatest risks and benefits of AI; and, 5) The most significant barriers to broader AI adoption.
Tags : 
    
BlackBerry Cylance
Published By: Looker     Published Date: Dec 03, 2015
Everywhere you look, companies are using external-facing analytics to maximize the value derived from their data assets, by moving customers up the value chain, increasing stickiness, and offering a more competitive product on the marketplace. Listen to learn about embedding BI software, including; • Top uses cases for embedding business intelligence software • Case studies from different companies currently embedding BI • Build vs buy considerations • Evaluating ROI
Tags : 
    
Looker
Published By: NeighborhoodAmerica     Published Date: Oct 01, 2008
Virtually all organizations are realizing the importance of customer engagement. But in order to benefit, we must subscribe to the idea that consumers really can add value to our organization. And sometimes, that means removing the notion that we are the experts in exchange for the belief that we can learn a thing or two from our customers. The collective intelligence of the communities we serve is largely an untapped asset - a stream of valuable input that can help improve the decisions we make and shape the products we sell. This book explores the value of many - and the role that customer engagement will play in shaping the future of our businesses, our government, and our economy.
Tags : 
neighborhood america, social network, web 2.0, data integration
    
NeighborhoodAmerica
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Nov 20, 2014
A survey commissioned by Intel Security and conducted by Evalueserve, in conjunction with the report, suggests that a majority of companies lack confidence in their ability to detect targeted attacks in a timely manner. Even companies best prepared to handle targeted attacks are taking the time to investigate high volumes of events. Key findings include 78% of those able to detect attacks in minutes had a proactive, real-time SIEM solution.
Tags : 
siem, incident response, ir capabilities, threat intelligence, indicators of attack, indicators of compromise, foundstone, ioas, iocs, evalueserve, real-time siem, security
    
McAfee
Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models, cat, centroid, collective catastrophe, multilingual data, risk exposure
    
Trillium Software
Published By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : 
splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance
    
Splunk
Published By: Conversica     Published Date: Nov 10, 2015
In this whitepaper you will learn how artificial intelligence can automatically interpret and respond to emails from leads.
Tags : 
conversica, sales leads, leads, lead nurturing, intelligence
    
Conversica
Published By: Radius Intelligence     Published Date: Jun 15, 2015
Market expansions are a viable strategy when a company’s growth in an existing market has stalled. However, marketers often rely on intuition and qualitative data to inform decisions around market fit and size. In this whitepaper, marketing technology expert, David Raab, explores how the shift in data and predictive solutions streamlines the market expansion process. The paper will reveal 4 keys to a successful market expansion, common mistakes to avoid, and show marketers how to win customers in new market segments.
Tags : 
predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition, segmentation, targeting, real-time analytics, total addressable market, multi-channel optimization, pipeline prioritization, predictive scoring, lead prediction, account targeting, predictive intelligence, marketing intelligence
    
Radius Intelligence
Published By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : 
ibm, cognos, mobile, inelligence, business intelligence
    
IBM
Published By: TIBCO Software     Published Date: Feb 14, 2019
With the new TIBCO Spotfire® A(X) Experience, we are revolutionizing analytics and business intelligence. This new platform accelerates the personal and enterprise analytics experience so you can get from data to insights in the fastest possible way. With the fusion of technology enablers like machine learning, artificial intelligence, and natural language search, the Spotfire® X platform redefines what’s possible for analytics and business intelligence, simplifying for everyone how data and insights are generated, consumed, and acted on. Download this whitepaper to learn more, then check out the new Spotfire analytics. It’s unlike anything you have ever seen. Simple, yet powerful, it changes everything.
Tags : 
    
TIBCO Software
Published By: GFI     Published Date: Jun 12, 2007
This white paper describes how Bayesian mathematics can be applied to the spam problem, resulting in an adaptive, 'statistical intelligence' technique that achieves very high spam detection rates.
Tags : 
anti spam, anti-spam, filter, block, blocking, email security, phishing, baysian, bayesian, spam detection, gfi
    
GFI
Published By: SAP     Published Date: Jun 22, 2009
Find out how to meet the challenges facing your midsize company and benefit from the road map that takes you through the process of deploying a BI solution, enabling you to start small and then build incrementally on your initial success to make fact-based and BI-driven decision making pervasive in your company.
Tags : 
sap, midsize, business intelligence, economy, soa, infrastructure, tco, total cost of ownership, kpi, key performance indicators, tco, total cost of ownership, sap application, sap netweaver bw, online analytical processing, olap, enterprise applications, data management
    
SAP
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: SAP     Published Date: Aug 22, 2018
Learn why intelligent ERP is the fundamental baseline for becoming an agile, continuous learning, and always progressing innovative organization.
Tags : 
sap, erp, digital transformation, procurement, intelligence erp
    
SAP
Published By: HERE Technologies     Published Date: May 28, 2019
Loss of life in traffic death accidents in the U.S. is on the same scale as 25 full Boeing 747s crashing and leaving no survivors, in six months. It is a stark statistic which explains why the US Department of Transportation and the National Safety Council want to eliminate traffic deaths in the US within 30 years with their Road to Zero campaign. HERE location intelligence already supports more than half of the new elements included in the Federal Highway Administration (FHWA) guidance on crash reporting In the U.S. alone HERE currently works with more than 20 departments of transport and several large cities on improving traffic safety. As the world’s leading location platform, HERE also supports the global drive to Vision Zero.
Tags : 
impact, traffic, data, security, transportation, congestion, highway, crashes, vision, intelligence
    
HERE Technologies
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn how midsize companies are putting in place a business intelligence information infrastructure - making them more likely to adhere to their budgets and deadlines, concentrate on improving the overall business rather than just one department, and reward employees accordingly.
Tags : 
sap, midsize, business intelligence, economy, soa, infrastructure, tco, total cost of ownership, kpi, key performance indicators, tco, total cost of ownership, sap application, sap netweaver bw, online analytical processing, olap, enterprise applications, data management
    
SAP Inc.
Published By: Five9     Published Date: Jun 14, 2019
Cloud contact center has been a hot topic in the industry for some time, but moving your contact center to the cloud is no small decision. We understand that migrating your contact center is not something to jump into without considerable due diligence. We also know from our experience working with leading brands, however, that moving the contact center to the cloud pays off and is fast becoming the only way for an organization to embrace the advancements in self-service, intelligent routing and agent assistance that artificial intelligence (AI) will soon deliver. This paper is designed to help evaluate your current contact center as you consider a move to the cloud. Our goal, as always, is to enable you to deliver exceptional customer experiences, and we are here to assist you at every step as you transition to the cloud.
Tags : 
    
Five9
Published By: Five9     Published Date: Oct 29, 2019
Cloud contact center has been a hot topic in the industry for some time, but moving your contact center to the cloud is no small decision. We understand that migrating your contact center is not something to jump into without considerable due diligence. We also know from our experience working with leading brands, however, that moving the contact center to the cloud pays off and is fast becoming the only way for an organization to embrace the advancements in self-service, intelligent routing and agent assistance that artificial intelligence (AI) will soon deliver. This paper is designed to help evaluate your current contact center as you consider a move to the cloud. Our goal, as always, is to enable you to deliver exceptional customer experiences, and we are here to assist you at every step as you transition to the cloud.
Tags : 
    
Five9
Published By: IBM Software     Published Date: Feb 07, 2011
Learn how midsize companies can use performance management solutions to gain competitive advantage without breaking the bank.
Tags : 
ibm cognos, performance management, midsize, business intelligence, cos of ownership, tco
    
IBM Software
Published By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : 
cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx, vsrx
    
Juniper Networks
Start   Previous    84 85 86 87 88 89 90 91 92 93 94 95 96 97 98    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.