Remove tag consumer-protection
article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Promote cross- and up-selling Recommendation engines use consumer behavior data and AI algorithms to help discover data trends to be used in the development of more effective up-selling and cross-selling strategies, resulting in more useful add-on recommendations for customers during checkout for online retailers.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

In the context of DT, this article defines content as information or data that has context and is consumable by humans and automated systems that allow them to make decisions, support operations, take actions, and monetize value by delivering products and services. Part 3 will discuss how to manage the various DT risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

With complete visibility, real-time detection and guided investigation, Reveal(x) helps security teams unify threat detection and response across on-prem and cloud workloads so you can protect and scale your business. BGR says the price tag for Pegasus is in the range of millions of dollars. Equifax receives its judgment.

Cloud 52
article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

With complete visibility, real-time detection and guided investigation, Reveal(x) helps security teams unify threat detection and response across on-prem and cloud workloads so you can protect and scale your business. BGR says the price tag for Pegasus is in the range of millions of dollars. Equifax receives its judgment.

Cloud 40
article thumbnail

THE CYBERWIRE DAILY PODCAST EP. 389 WITH GUEST SPEAKER DAVID BRUMLEY

ForAllSecure

With complete visibility, real-time detection and guided investigation, Reveal(x) helps security teams unify threat detection and response across on-prem and cloud workloads so you can protect and scale your business. BGR says the price tag for Pegasus is in the range of millions of dollars. Equifax receives its judgment.

Cloud 40
article thumbnail

Autonomy CEO: Web 2.0 'under all the hype, there is something there.' | ZDNet

Collaboration 2.0

in the enterprise, making some very cogent points: …the issue of varying values of information that Andrew Keen brings up in his 2007 book The Cult of the Amateur may be worrying in a consumer context but potentially fatal in an enterprise that makes aircraft or medical equipment, for example. Mike explores the lure of Web 2.0

Paper 40
article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

World: How to Understand Where You Are Really at Risk and the Most Effective Ways to Protect Your Enterprise 2.0 Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. I chose to instead attend John Pironti’s ‘Threat and Vulnerability Management in the Enterprise 2.0