techniques

Results 26 - 50 of 423Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Dell EMC     Published Date: Oct 08, 2015
Big data can be observed, in a real sense, by computers processing it and often by humans reviewing visualizations created from it. In the past, humans had to reduce the data, often using techniques of statistical sampling, to be able to make sense of it. Now, new big data processing techniques will help us make sense of it without traditional reduction.
Tags : 
    
Dell EMC
Published By: TIBCO Software     Published Date: Aug 26, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
    
TIBCO Software
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Gradient Boosting Machine (GBM) modeling is a powerful machine learning technique for advanced root cause analysis in manufacturing. It will uncover problems that would be missed by regression-based statistical modelling techniques and single tree methods, but can easily be used by analysts with no expertise in statistics and modelling to solve complex problems. It is an excellent choice for advanced equipment commonality analysis and will detect interactions between process factors (for example, machines, recipes, process dates) that are responsible for bad product. It can also be used to identify complex nonlinear relationships and interactions between product quality measurements (for example, yield, defects, field returns) and upstream measurements from the product, process, equipment, component, material, or environment.
Tags : 
    
TIBCO Software GmbH
Published By: TriNet     Published Date: Nov 26, 2012
Download this white paper for insights on specific techniques startups and growing businesses can use to leverage the benefits and avoid the pitfalls of social media.
Tags : 
social media, employee engagement, social media policy, social networking
    
TriNet
Published By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
World-class ideas deserve world-class workstations.
Tags : 
dell, bim, building information modeling, dell precision workstations, 3d modeling techniques
    
Dell Brought to you by Intel
Published By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : 
frontend performance, security, technology, content delivery, web linking
    
Akamai Technologies
Published By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : 
data visualization, sas, big data, visual analytics, data exploration, analysis
    
SAS
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: Shell U.K. Limited     Published Date: Oct 08, 2019
Le succès de votre activité repose sur votre capacité à veiller au bon fonctionnement et à la fiabilité de vos équipements. Pourtant, près de la moitié (43 %) des entreprises du secteur de la construction déclarent subir des pannes régulières en raison d'une mauvaise lubrification, et 72 % affirment que leurs équipes de maintenance ont besoin d’être davantage formées. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des conseils d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité, de productivité et de compétitivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économie de plus de 68 millions de dollars reportée par les clients professionnels de Shell. Lisez notre nouveau rapport dédié au secteur de la construction, Une efficacité accrue pour de meilleurs rendements : construction européenne, lub
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Oct 08, 2019
La réussite de votre activité repose sur votre capacité à veiller au bon fonctionnement et à la fiabilité de votre équipement, en particulier lors du semis et de la récolte. Pourtant, deux exploitants sur cinq (41 %) déclarent subir des pannes régulières en raison d'une mauvaise lubrification, et 62 % affirment que leurs équipes de maintenance ont besoin d’être davantage formées. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des conseils d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité et de productivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économie de plus de 68 millions de dollars reportée par les clients professionnels de Shell. Consultez les conclusions de nos dernières études mondiales sur le coût total de possession (TCO) et la maintenance du matériel agricole. Découvrez commen
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Oct 08, 2019
Le succès de votre parc d'autobus repose sur votre capacité à allier fonctionnement optimal et approche novatrice. Gardez vos véhicules sur la route et gagnez en rentabilité. Pourtant, 70 % des exploitants de parcs de véhicules craignent que le coût d’investissement dans les nouvelles technologies soit plus important que les avantages, ce qui explique que les deux tiers (69 %) d'entre eux ne souhaitent pas moderniser leur parc actuel tant que celui-ci est opérationnel. 77 % des responsables de parcs déclarent vouloir dispenser une formation supplémentaire à leur équipe de maintenance. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des services d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité, de productivité et de compétitivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économie de plus
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Oct 08, 2019
Le succès de votre parc de véhicules lourds repose sur votre capacité à allier fonctionnement optimal et approche novatrice. Gardez vos véhicules sur la route et gagnez en rentabilité. Pourtant, 70 % des exploitants de parcs de véhicules craignent que le coût d’investissement dans les nouvelles technologies soit plus important que les avantages, ce qui explique que les deux tiers (69 %) d'entre eux ne souhaitent pas moderniser leur parc actuel tant que celui-ci est opérationnel. 77 % des responsables de parcs déclarent vouloir dispenser une formation supplémentaire à leur équipe de maintenance. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des services d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité, de productivité et de compétitivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économi
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Oct 16, 2019
La réussite de votre activité repose sur votre capacité à veiller au bon fonctionnement et à la fiabilité de votre équipement, en particulier lors du semis et de la récolte. Pourtant, deux exploitants sur cinq (41 %) déclarent subir des pannes régulières en raison d'une mauvaise lubrification, et 62 % affirment que leurs équipes de maintenance ont besoin d’être davantage formées. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des conseils d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité et de productivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économie de plus de 68 millions de dollars reportée par les clients professionnels de Shell. En savoir plus: Recherche et expertise.
Tags : 
    
Shell U.K. Limited
Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco
Published By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : 
dreamworks, animation, production, red hat, technology, gartner, virtualization, cloud
    
Red Hat
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: Adobe     Published Date: Aug 19, 2015
Read on to understand the top techniques to consider as you evolve your mobile and responsive experiences and work to maximize your mobile conversion this year.
Tags : 
guide to mobile marketing, mobile marketing and merchandising, evolving the mobile experience, maximise mobile conversion
    
Adobe
Published By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : 
prophix, best practices, performance management, business analytics, productivity
    
Prophix
Published By: Socialbakers     Published Date: Aug 05, 2015
The benefits of running a truly social business are many - driving shorter sales cycles, improving customer care, innovating your talent recruitment strategies, and improving how you coordinate your organization from top to bottom in pursuing unified goals.
Tags : 
social media, social business, customer care, recruitment, recruitment strategies, marketing tools, social techniques, social media strategy
    
Socialbakers
Published By: Red Hat     Published Date: Feb 22, 2019
Dans ce rapport d’analyse, IDC se penche sur le défi auquel font face les entreprises actuellement pour équilibrer leurs investissements dans les infrastructures en place dans le but d’améliorer l’efficacité et de moderniser leur datacenter, tout en répondant simultanément au besoin d’adopter de nouvelles techniques de développement et de déploiement des technologies apportant la promesse d’améliorations significatives en termes de productivité des développeurs, d’agilité opérationnelle et de gestion des cycles de vie à moindre coût. IDC fournit des informations approfondies sur les options à la portée des entreprises pour atteindre ces objectifs à l’aide d’une infrastructure capable de prendre en charge les applications actuelles et celles de prochaine génération, ainsi que sur le rôle joué par la standardisation et la modernisation dans l’atteinte des objectifs d’optimisation opérationnelle.
Tags : 
    
Red Hat
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial Internet of Things (IIoT) technologies and concepts can transform and enhance process safety practices if appropriately applied. Download the white paper for guidance on leveraging IIoT tools and techniques to deliver industrial safety in a profitable manner.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.