algorithms

Results 1 - 25 of 48Sort Results By: Published Date | Title | Company Name
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Clustrix     Published Date: Sep 04, 2013
Find out how AdScience has been able to increase their revenue potential by five times using Clustrix to optimize bidding for their online ad broker agency. AdScience runs complicated algorithms to process bids for ad space based on click history. It's critical for AdScience to have instant access to smart data.
Tags : 
adscience, revenue, technology, clustrix, algorithms, case study, best practices, networking, it management, knowledge management, enterprise applications, business technology
    
Clustrix
Published By: IBM     Published Date: May 30, 2008
WinterCorp analyzes IBM's DB2 Warehouse and how it addresses twin challenges facing enterprises today: improving the value derived from the torrents of information processed every day, while lowering costs at the same time. Discover why WinterCorp believes the advances in data clustering strategies and intelligent software compression algorithms in IBM's Data Warehouse improves performance of business intelligence queries by radically reducing the I/O's needed to resolve them.
Tags : 
data warehousing, data management, database management, database administration, dba, business intelligence, ibm, leveraging information, li campaign, ibm li
    
IBM
Published By: ESV Digital     Published Date: Feb 10, 2015
The multiplication of marketing channels and devices concerning consumers has greatly increased the complexity faced by brands in their marketing efforts. This white paper aims to explain the issues, the principal attribution models used and the related challenges.
Tags : 
esv digital, algorithms, interactions, point of contact, nurturing, marketing data, marketing analytics, business technology
    
ESV Digital
Published By: TIBCO Software     Published Date: Feb 26, 2019
MoneyLIVE’s annual survey of over 600 banking professionals found that traditional banks face a significant challenge when it comes to building AI-powered customer journeys. 75% believe that as the use of AI intensifies, banks will struggle to recruit the necessary expertise. 84% fear regulatory and liability issues surrounding AI. Just 7% think their organization’s use of AI is highly sophisticated. But for banks to keep pace with challengers and FinTechs, it’s crucial that they harness this continually evolving technology. Download this chapter of MoneyLIVE's The Future of Retail Banking Report 2018/19 now and understand how TIBCO’s Connected Intelligence Platform, with the use of AI and machine learning algorithms, can help with banks’ digital transformation needs.
Tags : 
artificial intelligence, machine learning, financial services, retail banking
    
TIBCO Software
Published By: Oracle     Published Date: Dec 21, 2018
The transition to autonomous is all around. Its capability for problem-solving has never been seen before. Its potential for creating business value from algorithms and data makes it the next big frontier for business leaders. Two industry experts have discussed Oracle Autonomous Data Warehouse Cloudand what it can help organisations achieve. Talking about innovation, security and efficiency, they put the casefor an autonomous future.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2019
The transition to autonomous is all around. Its capability for problem-solving has never been seen before. Its potential for creating business value from algorithms and data makes it the next big frontier for business leaders. Two industry experts have discussed Oracle Autonomous Data Warehouse Cloud and what it can help organisations achieve. Talking about innovation,security and efficiency, they put the case for an autonomous future. Watch the webinar.
Tags : 
    
Oracle
Published By: TIBCO Software     Published Date: Feb 27, 2019
Blockchain in Financial Services is receiving a lot of attention, especially for synchronizing financial agreements between institutions. But how can blockchain be used outside of this context? Can it apply to use cases such as identity, fraud, and AML? Watch this short webinar to hear how blockchain can be used to solve other key issues facing the industry, about research into consensus algorithms beyond proof of work, and about myths and truths that must be considered for a successful enterprise blockchain implementation. Speaker: Nelson Petracek, CTO, TIBCO Software
Tags : 
blockchain, financial services, fraud, aml
    
TIBCO Software
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA
Published By: Adobe     Published Date: Oct 24, 2018
Adobe automates the process of turning insights into action by connecting Adobe Analytics to other solutions in Adobe Experience Cloud, including Adobe Target and Adobe Audience Manager. Four features make this possible: • Anomaly detection. The technology automatically analyzes trends and determines if they are statistically significant — in milliseconds. • Analyze play button. With analytics, you can take insights and connect them to your email, DMP, and personalization platform in seconds. • Intelligent alert. A built-in alerting system sends an SMS text or email when it detects an anomaly. There are also predictive algorithms that help you forecast how often the alert is likely to trigger. You can set these to only notify you of the most important changes. • Intelligent recommendations. It’s simply impossible to manually create every alert you might need, so Adobe is building machine learning directly into analytics to analyze users’ behaviors. Like a virtual data assistant, it co
Tags : 
    
Adobe
Published By: Intel     Published Date: Apr 09, 2019
This self-paced workshop teaches an end-to-end computer vision workflow using the latest Intel® technologies and the Intel® Distribution of OpenVINO™ toolkit. Learn how to: Use deep learning algorithms that help accelerate smart video applications Optimize and improve performance with and without external accelerators Use tools to help you identify the best hardware configuration for your needs Apply frameworks and topologies supported by the Intel® accelerator tool
Tags : 
    
Intel
Published By: FICO     Published Date: Nov 10, 2015
"ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions. Learn more on how FICO Blaze Advisor helped ACG Michigan automate its underwriting About FICO FICO (NYSE: FICO), formerly known as Fair Isaac, is a leading analytics software company, helping businesses in 90+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. The company's groundbreaking use of Big Data and mathematical algorithms to predict consumer behavior has transformed entire industries. FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, build more profitable customer relationships, optimiz
Tags : 
decision analytics, optimization, profitability
    
FICO
Published By: Dell EMC     Published Date: Feb 14, 2019
Isilon scale-out NAS delivers the analytics performance and extreme concurrency at scale to feed the most data hungry analytic algorithms. Access this overview from Dell and Intel® to learn more. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: TIBCO Software     Published Date: May 16, 2019
Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
data, applications, analytics, algorithms, innovation, cloud, technology, customer, banking
    
TIBCO Software
Published By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : 
mobile, threat, defense, strategy, mobileiron, innovation
    
MobileIron
Published By: IBM     Published Date: May 17, 2016
Wikibon conducted in-depth interviews with organizations that had achieved Big Data success and high rates of returns. These interviews determined an important generality: that Big Data winners focused on operationalizing and automating their Big Data projects. They used Inline Analytics to drive algorithms that directly connected to and facilitated automatic change in the operational systems-of-record. These algorithms were usually developed and supported by data tables derived using Deep Data Analytics from Big Data Hadoop systems and/or data warehouses. Instead of focusing on enlightening the few with pretty historical graphs, successful players focused on changing the operational systems for everybody and managed the feedback and improvement process from the company as a whole.
Tags : 
ibm, big data, inline analytics, business analytics, roi
    
IBM
Published By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Compression algorithms reduce the number of bits needed to represent a set of data—the higher the compression ratio, the more space this particular data reduction technique saves. During our OLTP test, the Unity array achieved a compression ratio of 3.2-to-1 on the database volumes, whereas the 3PAR array averaged a 1.3-to-1 ratio. In our data mart loading test, the 3PAR achieved a ratio of 1.4-to-1 on the database volumes, whereas the Unity array got 1.3 to 1.
Tags : 
    
Dell PC Lifecycle
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte."  This article outlines some risks, debunks some myths, and attempts to provide some protective "hard hats" for data miners in the marketing sector.
Tags : 
spss, data mining, data miner, data management, business process, best practices, business intelligence, statistics, statistical modeling, algorithms, predictive analysis, data analysis, scalability, optimization, business knowledge, decision-making
    
SPSS, Inc.
Published By: SPSS     Published Date: Jun 30, 2009
The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte."  This article outlines some risks, debunks some myths, and attempts to provide some protective "hard hats" for data miners in the technology sector.
Tags : 
spss, data mining, data miner, data management, business process, best practices, business intelligence, statistics, statistical modeling, algorithms, predictive analysis, data analysis, scalability, optimization, business knowledge, decision-making
    
SPSS
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: IBM     Published Date: Apr 03, 2017
Predictive analytics is powerful. It can help drive significant improvement to an organization’s bottom line. Look for ways to use it to grow revenue, shrink costs and improve margins. Provide a platform that enables your data scientists to work efficiently using tools and algorithms they prefer. Enhance your analyses with internal and external data, structured and unstructured data. Then make the analytics accessible in order to reap the full benefits of these valuable analyses. Stay ahead of the curve in your market with predictive analytics, and give your organization a competitive advantage and an improved bottom line.
Tags : 
predictive analytics, analytics, data analytics, financial marketing, market analytics, data resources
    
IBM
Published By: IBM APAC     Published Date: May 14, 2019
Machine Learning For Dummies, IBM Limited Edition, gives you insights into what machine learning is all about and how it can impact the way you can weaponize data to gain unimaginable insights. Your data is only as good as what you do with it and how you manage it. In this book, you discover types of machine learning techniques, models, and algorithms that can help achieve results for your company. This information helps both business and technical leaders learn how to apply machine learning to anticipate and predict the future. You will find topics like: - What is machine learning? - Explaining the business imperative - The key machine learning algorithms - Skills for your data science team - How businesses are using machine learning - The future of machine learning
Tags : 
    
IBM APAC
Published By: Amazon Web Services     Published Date: Feb 01, 2018
At Amazon, we’ve been investing deeply in AI for more than 20 years. Machine learning (ML) algorithms drive many of our internal systems, and have formed the core of our customers' experience —from the path optimization in our fulfillment centers, and Amazon.com’s recommendations engine, to Echo powered by Alexa, and our new retail experience, Amazon Go. Our mission is to share our learnings and ML capabilities as fully managed services, and put them into the hands of every executive, developer, and data scientist.
Tags : 
machine learning, algorithms, interal systems, amazon
    
Amazon Web Services
Published By: SAS     Published Date: Oct 03, 2018
Unlike rules-based systems, which are fairly easy for fraudsters to test and circumvent, machine learning adapts to changing behaviors in a population through automated model building. With every iteration, the algorithms get smarter and more accurately find activities that represent risk to the firm.
Tags : 
    
SAS
Published By: FusionOps     Published Date: Jun 15, 2016
The supply chain generates huge volumes of data captured in ERP, CRM, demand planning and other systems. Download this whitepaper to learn how FusionOps Machine Learning can provide companies with a more accurate, granular understanding of their business by harmonizing these disparate data sources in the cloud, and applying machine learning algorithms.
Tags : 
    
FusionOps
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee