X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 data mining blog


Data Mining and Predictive Modeling for Condition-based Maintenance
Today’s military logistics agencies must sustain diverse fleets of costly, complex, and indispensible weapon systems and platforms. Modern predictive

data mining blog  to collect and transmit data from various platforms to a centralized condition-based maintenance (CBM) database. Learn more about how these solutions enable better-informed decisions regarding specific maintenance actions.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » data mining blog

The Intelligence of Social Media (Part 2)


In the first part of this blog, I mentioned that sentiment analysis measures the polarity of opinion—positive, negative, or neutral—regarding a subject, a product, a service, etc. Two main approaches can be used to perform sentiment analysis or text mining: a knowledge-based approach, which uses linguistic models to classify sentiments; and a learning-based approach, which uses

data mining blog   Read More

The Intelligence of Social Media (Part 1)


According to Wikipedia, “social media is online content created for people using highly accessible and scalable publishing technologies.” These days, networking is very different than it was in the past. A lot of social media services like Twitter, Facebook, LinkedIn, personal blogs, wikis, podcasts, and other types of media content generate big volumes of data. But more importantly, people

data mining blog   Read More

BI and BPM: It’s Not as Blurry as You Think


There seems to be a blurry line between business intelligence (BI) and business performance management (BPM) applications. Some software vendors offer solutions that actually incorporate BPM and BI within the same application, which makes it harder to distinguish between these two software solutions. The following are some—certainly not all—key differentiators between BI and/or BPM functionality

data mining blog   Read More

TEC Industry Watch: Enterprise Software News for the Week of April 30th, 2012


SOFTWARE SELECTIONS @ DEPLOYMENTSEuropean manufacturer of construction chemicals selects IFS Applications Industry tags: Process manufacturing, mining "Polish corporation Atlas Group, which operates 18 business entities and 5 mines in Poland and internationally, has selected IFS Applications as its corporate-level ERP system. The first areas slated for implementation will be financials

data mining blog   Read More

Data Center Projects: Advantages of Using a Reference Design


It is no longer practical or cost-effective to completely engineer all aspects of a unique data center. Re-use of proven, documented subsystems or complete designs is a best practice for both new data centers and for upgrades to existing data centers. Adopting a well-conceived reference design can have a positive impact on both the project itself, as well as on the operation of the data center over its lifetime. Reference designs simplify and shorten the planning and implementation process and reduce downtime risks once up and running. In this paper reference designs are defined and their benefits are explained.

data mining blog   Read More

ESG - Riverbed Whitewater: Optimizing Data Protection to the Cloud


Riverbed Whitewater leverages WAN optimization technology to provide a complete data protection service to the cloud. The appliance-based solution is designed to integrate seamlessly with existing backup technologies and cloud storage provider APIs. Read this ESG Lab report on hands-on testing of the Riverbed Whitewater appliance for ease of use, cost-effective recoverability, data assurance, and performance and scalability.

data mining blog   Read More

New Data Protection Strategies


One of the greatest challenges facing organizations is the protection of corporate data. The issues complicating data protection are compounded by increased demand for data capacity and higher service levels. Often these demands are coupled with regulatory requirements and a shifting business environment. Learn about data protection strategies that can help organizations meet these demands while maintaining flat budgets.

data mining blog   Read More

Data Storage in the Cloud--Can You Afford Not To?


In Data Storage in the Cloud Can You Afford Not To?

data mining blog   Read More

Unified Data Management: A Collaboration of Data Disciplines and Business Strategies


In most organizations today, data are managed in isolated silos by independent teams using various data management tools for data quality, integration, governance, and so on. In response to this situation, some organizations are adopting unified data management (UDM), a practice that holistically coordinates teams and integrates tools. This report can help your organization plan and execute effective UDM efforts.

data mining blog   Read More

Agile Data Masking: Toward a More Secure and Agile Enterprise


Data masking has long been a key component of enterprise data security strategies. However, legacy masking tools could not deliver secure data, undermining their impact. This white paper explores how data as a service can deliver on the promise of masking, while increasing organizational flexibility and agility.

data mining blog   Read More