• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

extract

Results 126 - 146 of 146Sort Results By: Published Date | Title | Company Name
By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS, Inc.
By: SAS     Published Date: Sep 30, 2014
When Information Revolution1 was published in 2006, no Chinese based companies were among the top 10 largest companies by market capitalization. Apple didn’t sell phones. Facebook was something college kids used to connect with their friends. Back then, we talked a lot about the amount of data coming in and faster processing speed. What we believed then remains true today: Data, and the decision-making process, can be moved throughout the organization to equip every decision maker (automated, line worker, analyst, executive) to make the best choices. By operationalizing analytics, organizations can identify and quantify both opportunity and risk. Information Revolution highlighted SAS’ Information Evolution Model, which helps organizations understand how they interact with their information and how to extract more value from it through analytics.
Tags : 
sas, organizational insights, operationalizing analytics, sas’ information evolution model
    
SAS
By: Kaspersky     Published Date: Feb 06, 2017
As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.
Tags : 
ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones, wireless security, data protection, database security
    
Kaspersky
By: Dell     Published Date: Aug 24, 2015
To extract value from an ever-growing onslaught of data, your organization needs next-generation data management, integration, storage and processing systems that allow you to collect, manage, store and analyze data quickly, efficiently and cost-effectively. That’s the case with Dell | Cloudera® Apache™ Hadoop® solutions for big data.
Tags : 
dell, data management, data integration, big data, hadoop, small business networks, storage management, server virtualization, cloud computing, data center design and management
    
Dell
By: LogMyCalls     Published Date: Oct 20, 2014
Every customer phone conversation has data that can be used to improve marketing and sales. Here are 45 data points we can extract by automcatically analyzing phone conversations.
Tags : 
call tracking, conversation analytics, marketing analytics, marketing automation, call intelligence, marketing conversion rate, prove roi
    
LogMyCalls
By: LogMyCalls     Published Date: Oct 20, 2014
We analyzed millions of calls in Q1, and there's gold to be mined out of every customer conversation, data that will improve marketing.
Tags : 
call tracking, conversation analytics, marketing analytics, business intelligence, big data, call intelligence, marketing conversion rate, prove roi
    
LogMyCalls
By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere, information management
    
Avalere
By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe, citrix, xactis, application integration, application performance management, business analytics, business integration, business process automation, business process management, .net, c++, java, middleware
    
Xactis
By: Xactis     Published Date: Feb 05, 2007
Learn the ‘bottom-up’ approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, software development, c++, quality assurance, legacy system, xactis, active directory, application integration, business analytics, business integration, business process automation, business process management, .net, java, middleware, software testing, visual basic
    
Xactis
By: Network Automation     Published Date: Dec 10, 2008
IST uses Fourth Shift software by SoftBrands to manage its operations in Big Flats, New York (headquarters) and Buffalo, New York, as well as the United Kingdom, Canada and France. For Fourth Shift to function correctly for IST, a series of process must be run each night on several servers. These processes include batch runs, data extracts, and system backup.
Tags : 
network automation, process automation, automate, automatic interaction, networking, it management, data management, network management, network performance management
    
Network Automation
By: SAS     Published Date: Aug 03, 2016
New analytics tools and services are helping organizations extract exceptional business value from the massive volumes of available data provided by various internal and external sources. Many companies are harnessing these insights to improve operational and business processes, troubleshoot problems, identify business opportunities, and generally compete and innovate better. Now the benefits of analytics in those areas are prompting companies to look to analytics to improve information security. Enterprise security organizations are under tremendous pressure to change. Traditional perimeter-focused security controls and strategies have proved inadequate against modern, highly targeted attack campaigns.
Tags : 
best practices, technology, security, enterprise, analytics, business analytics, business intelligence, business management
    
SAS
By: TIBCO     Published Date: Oct 28, 2013
The right integration platform lets you extract more value from your ERP system - including improved business performance, increased organizational awareness, and better coordination of processes.
Tags : 
tibco, erp, integration, value, data management
    
TIBCO
By: IBM     Published Date: Aug 06, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : 
ibm, insurance, data, big data, analytics, solutions
    
IBM
By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property
Tags : 
    
Cisco
By: IBM     Published Date: Jul 12, 2016
As most companies now realize, analytics is increasingly more of an integral part of their day-to-day business operations. In a recent survey by a global research firm, 80% of CIOs stated that transition from backward-looking, passive analysis must shift to forward-looking predictive analytics. The challenge is that many analytic solutions are aligned to a specific platform, tied to inflexible programming models and requiring vast data movement. In this webcast, Forrester and experts from IBM will highlight how technology like Apache Spark on z/OS allows businesses to extract deep customer insight without the cost, latency and security risks of data movement throughout the enterprise.
Tags : 
ibm, forrester, apache spark, spark technology, z systems, security, knowledge management, enterprise applications
    
IBM
By: IBM     Published Date: Oct 13, 2016
In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. Download this white paper to learn how.
Tags : 
database, big data, analytics, infrastructure, data management
    
IBM
By: IBM     Published Date: Mar 30, 2017
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as extract, transfer and load (ETL), data replication or data virtualization.
Tags : 
data integration, data security, data optimization, data virtualization, database security
    
IBM
By: OnBase by Hyland     Published Date: Jun 26, 2017
An integral part of your information management technology strategy is how you actually get the needed information into your business systems. Do you have staff devoting time to manually entering data in those systems? Data capture solutions automatically extract data from incoming documents and make data validation simple. Download this AIIM article to explore the history of data capture, its evolution into truly intelligent solutions and how you can benefit from these capabilities today.
Tags : 
information, management, technology, intelligent, data, capture, strategy, capabilities, solution, content, systems, onbase, hyland, validation
    
OnBase by Hyland
By: Group M_IBM Q1'18     Published Date: Jan 08, 2018
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. This e-book presents six reasons why you should consider a database change, including opinions from industry analysts and real-world customer experiences. Read on to learn more.
Tags : 
database, streamlining, it infrastructure, database systems
    
Group M_IBM Q1'18
By: IBM     Published Date: Jul 09, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter