Remove Document Remove Examples Remove Mining Remove Strategy
article thumbnail

Leveraging user-generated social media content with text-mining examples

IBM Big Data Hub

With nearly 5 billion users worldwide—more than 60% of the global population —social media platforms have become a vast source of data that businesses can leverage for improved customer satisfaction, better marketing strategies and faster overall business growth. What is text mining? How does text mining work?

Mining 56
article thumbnail

Application modernization overview

IBM Big Data Hub

Application modernization starts with assessment of current legacy applications, data and infrastructure and applying the right modernization strategy (rehost, re-platform, refactor or rebuild) to achieve the desired result. We will explore key areas of acceleration with an example in this article.

Cloud 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. For example, a supermarket that makes home grocery deliveries has empty vehicles returning from those deliveries. Take a modern film, for example. Wed, 01/10/2018 - 15:25. Using data to create new value chains.

Mining 78
article thumbnail

Information Governance and the Records Lifecycle

The Texas Record

ARMA defines “information governance” as “the overarching and coordinating strategy for all organizational information. For example, a completed W4 form is a record , and it provides information about an employee’s tax withholding preferences. In a nutshell, this is information governance. Extra Phases.

article thumbnail

Attacks against machine learning — an overview

Elie

Adversarial inputs include malicious documents designed to evade antivirus, and emails attempting to evade spam filters. This can be used, for example, to steal stock market prediction models and spam filtering models, in order to use them or be able to optimize more efficiently against such models. Data poisoning attacks.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

Adversarial inputs include malicious documents designed to evade antivirus, and emails attempting to evade spam filters. This can be used, for example, to steal stock market prediction models and spam filtering models, in order to use them or be able to optimize more efficiently against such models. Data poisoning attacks.

Mining 91
article thumbnail

ABBYY Partners with Alteryx Extending the Alteryx Analytic Process Automation Platform with Deeper Process Intelligence

Info Source

According to the Constellation Research ShortList for Robotic Process Automation , “the RPA market is converging with business process management, process mining and workflow tools,” and “buyer’s should expect these tools to leverage artificial intelligence (AI) to blur the lines between human and machine processes.”