Home
 > search for

Featured Documents related to »  application of data mining


Identifying the ROI of a Software Application for SCM Part 3: Performing the Data Analysis
By using software tools that help you forecast and work together with others inside your organization, and even with your customers, the forecasts may become

application of data mining  ROI of a Software Application for SCM Part 3: Performing the Data Analysis Identifying the ROI of a Software Application for SCM Executive Summary    The competitive environment for every industry grows increasingly intense. Fast, reasonably accurate information about the impact of a software investment decision grows more critical. Many decision-makers look for an exact forecast of return on investment (ROI) from the purchase of a supply chain management application. At least four very real challenges Read More...
Business Intelligence (BI)
Business intelligence (BI) and performance management applications enable real-time, interactive access, analysis, and manipulation of mission-critical corporate information. These applications pro...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » application of data mining


The Hidden Gems of the Enterprise Application Space Part Two: Sorting and Selecting SRM Software
No vendor provides all (if even a majority) of the required solutions for a full SRM initiative at this stage, so almost all solutions will involve best-of

application of data mining  Gems of the Enterprise Application Space Part Two: Sorting and Selecting SRM Software Sorting the SRM Software Suppliers Given the enthusiasm from early adopters, it is hardly surprising that a wide range of software suppliers is adopting the SRM acronym. There are several dozen vendors that are offering suites of SRM functionality and coming from different worlds, based on their origins. A great part of these logically hail from the SCM space such as i2 Technologies , Logility , and Manugistics , which Read More...
The Truth about Data Mining
It is now imperative that businesses be prudent. With rising volumes of data, traditional analytical techniques may not be able to discover valuable data

application of data mining  significantly broad reach and application. It can be applied in any situation where it is necessary to discover potential knowledge from vast amounts of data. Throughout this article, the word knowledge is used to refer to meaningful patterns derived through techniques in data mining that can stimulate an organization's goals (such as company revenue, Web site traffic, increase in crop yield, and improved health care). The field of data mining brings together techniques from statistics; machine learning Read More...
Microsoft says OLE for Data Mining: Is it Bull?
Microsoft released a new version of OLE DB (Object Linking and Embedding Database, based on Microsoft’s Component Object Model or COM) which supports a

application of data mining  our CRM solutions and application products. OLE DB for Data Mining has been under vendor review and modification since its introduction last May at Tech*Ed '99 and now incorporates the Predictive Model Markup Language (PMML) standards from the Data Mining Group, an industry consortium that facilitates the creation of useful standards for the data mining community. PMML is an XML-based language that provides a quick and easy way for organizations to define and share data mining models between compliant Read More...
Distilling Data: The Importance of Data Quality in Business Intelligence
As an enterprise’s data grows in volume and complexity, a comprehensive data quality strategy is imperative to providing a reliable business intelligence

application of data mining  Data cleansing involves the application of quality screens that monitor every source record. The outcome of the violation of business rules can include immediate correction using rules that are specified in the data cleansing application logic logging the error and proceeding to the next data value terminating the process The most appropriate action depends on the nature and severity of each data issue. If a record that contains an address is missing the state or province, but has the city and country, Read More...
Analysis of Active Voice's Acquisition of PhoneSoft, Inc.
Active Voice will integrate all of PhoneSoft's functionality into their existing

application of data mining  of Active Voice's Acquisition of PhoneSoft, Inc. Event Summary SEATTLE, /PRNewswire/ - Active Voice Corporation (Nasdaq: ACVC), a global provider of unified messaging and computer telephony software solutions announced it has signed a definitive agreement to acquire privately-held PhoneSoft Inc., a leading provider of true unified messaging solutions for Lotus Notes/Domino. Market Impact PhoneSoft, Inc. is a privately held company that focuses on unified messaging solutions (UM), including email, Read More...
Software-as-a-service ERP versus On-premise ERP through the Lens of Total Cost of Ownership
This IDC white paper looks at the growing applicability of software as a service (SaaS) for enterprise-level business applications, and analyzes the adoption

application of data mining  (SaaS) for enterprise-level business applications, and analyzes the adoption rate and total cost of ownership (TCO) of this technological approach. Download this white paper to find out how a hosted option can drive significant cost savings, reduce initial implementation times, and bring new functionality with relative ease and convenience. Read More...
Meet PCI DSS Compliance Requirements for Test Data with Data Masking
Whether you’re working toward your first or your next payment card industry (PCI) data security standard (DSS) audit, you know compliance is measured on a

application of data mining   Read More...
Data Enrichment and Classification to Drive Data Reliability in Strategic Sourcing and Spend Analytics
Spend analytics and performance management software can deliver valuable insights into savings opportunities and risk management. But to make confident

application of data mining  help ensure that your applications process reliable data so that your spend analyses and supplier risk assessments are accurate, trustworthy, and complete. Read More...
The Advantages of Row- and Rack-oriented Cooling Architectures for Data Centers
The traditional room-oriented approach to data center cooling has limitations in next-generation data centers. Next-generation data centers must adapt to

application of data mining  Rack-oriented cooling will find application in situations where extreme densities, high granularity of deployment, or unstructured layout are the key drivers. Room-oriented cooling will remain an effective approach for low density applications and applications where change is infrequent. For most users with newer high density server technologies, row-oriented cooling will provide the best balance of high predictability, high power density, and adaptability, at the best overall TCO. About the Authors: Read More...
Next-generation Data Auditing for Data Breach Protection and Risk Mitigation
Data breaches and leaks are on the rise—and the consequences, from theft of identity or intellectual property, can seriously compromise a company’s reputation

application of data mining  generation Data Auditing for Data Breach Protection and Risk Mitigation Data breaches and leaks are on the rise—and the consequences, from theft of identity or intellectual property, can seriously compromise a company’s reputation. Stolen laptops, hacking, exposed e-mail, insider theft, and other causes of data loss can plague your company. How can you detect (and respond!) to breaches and protect your data center? Learn about the functions and benefits of an automated data auditing system. Read More...
Managing Small Data Centers: A Short Guide to Running Secure and Resilient Data Centers for Mid-sized Businesses
To keep your growing business competitive, your data center must be secure, protected against disaster, and available 24 hours a day, 7 days a week. But if

application of data mining  sure your crucial business applications are always available when you need them. Read More...
Master Data Management and Accurate Data Matching
Have you ever received a call from your existing long-distance phone company asking you to switch to its service and wondered why they are calling? Chances are

application of data mining  Data Management and Accurate Data Matching Have you ever received a call from your existing long-distance phone company asking you to switch to its service and wondered why they are calling? Chances are the integrity of its data is so poor that the company has no idea who many of its customers are. The fact is, many businesses suffer from this same problem. The solution: implement a master data management (MDM) system that uses an accurate data matching process. Read More...
A Road Map to Data Migration Success
Many significant business initiatives and large IT projects depend upon a successful data migration. But when migrated data is transformed for new uses, project

application of data mining  team is supporting the application test requirements of the larger project and also testing the conversion code itself. Your migration team needs to first consider the basics of audit and reconciliation. This is missed more often than it should be. Are you looking at the right set of data? Can you trace back to your source system at a record level? Include basic record counts and validation of ETL processes. Many of these processes will be accomplished multiple times, as testing and re-loads occur. The Read More...
IDC and Webroot Present: Securing Enterprise Environments against Spyware-Benefits of Best-of-breed Security
The threat of spyware has risen to epidemic levels for many information technology professionals trying to protect their users and network. In response, many

application of data mining  and Webroot Present: Securing Enterprise Environments against Spyware-Benefits of Best-of-breed Security The threat of spyware has risen to epidemic levels for many information technology professionals trying to protect their users and network. In response, many security vendors are creating anti-spyware software to seek out spyware and eradicate it from the enterprise network. Webroot's Spy Sweeper Enterprise is just such a product. Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others