Remove Events Remove Privacy Remove Retail Remove Video
article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Promote cross- and up-selling Recommendation engines use consumer behavior data and AI algorithms to help discover data trends to be used in the development of more effective up-selling and cross-selling strategies, resulting in more useful add-on recommendations for customers during checkout for online retailers.

article thumbnail

Data is essential: Building an effective generative AI marketing strategy

IBM Big Data Hub

For example, a retail clothing company might use generative AI to customize email or online experiences tailored for different customer personas. The advanced capabilities of generative AI for text, visuals and video have the potential to create a more personalized and engaging experience.

Marketing 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Third Modern Data Management Summit: Making Data Work!

Reltio

The event consisted of over 40 sessions and panels featured more than 60 speakers across industries. Speakers represented life sciences, healthcare, manufacturing, retail, consumer goods, financial services, consulting services, and hi-tech. Reltio was the Diamond sponsor and host of the event.

article thumbnail

What is a Customer API?

Reltio

Watch this video with Manish Sood, Reltio founder and CEO, to learn more about Customer APIs or read this transcript from the video below. Can't watch a video right now? Simplifies compliance with privacy laws, consent and communication preferences Customers have to be enabled to manage their own privacy and consent information.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Imagine a world where the retail value of your car actually grows over time – that’s now becoming a reality. Recent events highlight the need to secure the software supply chain, from code quality checks and secure code-signing processes to securely protecting the private keys used to sign code. Connected Car Threats.

IoT 77
article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. While there are many unpredictable underlying reasons why new attacks emerge, in our experience the following two types of events are likely to trigger their emergence: New product or feature launch : By nature adding functionalities opens up new attack surfaces that attackers are very quick to probe.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. While there are many unpredictable underlying reasons why new attacks emerge, in our experience the following two types of events are likely to trigger their emergence: New product or feature launch : By nature adding functionalities opens up new attack surfaces that attackers are very quick to probe.

Mining 91