Tagged: Call Toggle Comment Threads | Keyboard Shortcuts

  • admin 9:51 am on January 28, 2017 Permalink
    Tags: , Call, , ,   

    Active Enterprise Intelligence for Call Centers 


    Teradata Demos

     
  • admin 9:48 am on November 23, 2016 Permalink
    Tags: , Call, ,   

    Verizon answers the call for innovation 


    Teradata Case Studies

     
  • admin 10:33 am on April 8, 2016 Permalink
    Tags: April, Call, , Deadline, Papers, ,   

    Call for Papers – Teradata PARTNERS Conference: Deadline: April 15! 

    Tell Your or Your Customer’s Story to the World’s Most Advanced Data and Analytics Experts. Presenting at PARTNERS gives business and technical practitioners instant industry credibility and increases their brand’s exposure to a global audience. We’re looking for Smart and Innovative Practitioners like You!
    Teradata Events

     
  • admin 9:47 am on November 28, 2015 Permalink
    Tags: , Call, Cuts, , , Problem, , , , ,   

    Turkcell cuts call problem resolution times in half with Teradata Data Warehouse Appliance 

    Teradata Press Mentions

     
  • admin 9:54 am on September 11, 2015 Permalink
    Tags: Call, , WakeUp   

    Wake-Up Call on Cybersecurity 

    by Dr. Larry Ponemon Q3-15_Perspective_laptop

    Cyberattacks are becoming increasingly frequent. In fact, 45% of senior executives say their companies experience one hourly or daily. These attacks typically use advanced and sophisticated techniques to infiltrate corporate networks and breach enterprise systems. Companies that have their data hacked typically incur a significant loss of intellectual property, productivity and revenue.

    Despite the high stakes, most organizations are not vigilant in detecting anomalous and potentially malicious traffic and preventing it from entering their networks. What’s missing are advanced alerts and intelligence about cyberattacks.

    Big data solutions help provide early warnings and other crucial information. Analytics, when applied to security, offers the ability to gather massive amounts of digital data to visualize and draw insights from that make it possible to predict and stop attacks. New data management and analytic solutions are also now available to help organizations become more proactive and better informed about detecting and thwarting threats. These solutions can, for example, spot the formation of a distributed denial of service (DDoS) attack minutes before it hits the enterprise’s layered network defenses.

    Stop Sophisticated Attacks

    With attacks becoming more complex, businesses need the ability to detect even small changes in network patterns, which could indicate a breach. However, most security solutions are designed to minimize a specific type of attack; they’re not built to recognize change. A lot of the anti-virus, anti-malware and the more recent anti-DDoS options currently available do not have the capability to draw from several information sources to match the sophistication of an assault.

    These traditional packet- or signature-based approaches cannot meet the scale of today’s dynamic, high-volume IP data networks or protect them from attacks. While these offerings fall short in detecting and stopping threats, they can be enhanced.

    In our highly interconnected, highly digital world, organizations must embrace big data analytics solutions to detect and stop cyberthreats. When analytic solutions are combined with security programs, an organization’s cyberdefenses become even stronger.

    Safeguard Network Data

    Mobility, lack of visibility and multiple globally interconnected network systems are the most common areas of cybersecurity risk. Big data analytics counters the risk by offering the singular ability to scour structured and unstructured data from multiple sources to find previously unseen patterns and develop actionable, near real-time responses to digital incursions. One of the benefits of applying analytics to cyberdefense is the capability to more easily recognize patterns that represent network threats for faster response to anomalous activity.

    New big data tools and data management techniques continue to emerge that can efficiently handle the volume and the complexity of IP network data. In addition, new database tools offer more power and precision to strengthen an enterprise cyberdefense strategy. These solutions empower organizations to meet the demands of protecting large-scale data environments.

    Big data analytics can also bridge the gap that exists in most companies between technology and the personnel charged with data security. The solutions leverage tools and procedures that capture, process and refine network activity data and apply algorithms for a review of every network node, making it easier for security staff to identify breaches.

    Implement a Strong Defense

    An ever-increasing number of cyberattacks should be a wake-up call to implement the solutions needed to counter threats and warn the business. With even 10 to 20 seconds of advance warning, companies can do a very good job of preventing or quickly containing an attack. As big data analytics continues to revolutionize more and more industries, it’s only natural for it to play a major role in protecting businesses from hackers by visualizing and drawing insights that predict and stop attacks.

    Dr. Larry Ponemon is the chairman and founder of the Ponemon Institute, a research think tank dedicated to advancing privacy and data protection practices. 

    Read this article and others focused on cybersecurity on TeradataMagazine.com.

    Visit Teradata.com for the on-demand webinar “Defending Data” with Dr. Larry Ponemon  and to download the 2015 Ponemon Institute research study “Big Data Analytics in Cyber Defense.”

     

     

    The post Wake-Up Call on Cybersecurity appeared first on Magazine Blog.

    Teradata Blogs Feed

     
  • admin 9:55 am on February 3, 2015 Permalink
    Tags: , Call, Gonna, , idea,   

    You Have a Great Tech or Business Idea! Now – Who You Gonna Call?! 

    “Great minds think alike.” That’s what they say, but we know it isn’t true. Great minds think differently; great minds seek different thinking, and great minds come up with the innovations that truly amaze.

    If you’re in the field of B2B, the chances are very high that your next innovation will come from a customer – and not just any customer. For decades, Eric Von Hipple at MIT has published research documenting what he calls lead users, or those customers that innovate, developing applications or tools or ideas that become new products when a vendor captures the idea and converts it. Some industries, such as fiberglass manufacturing, are nearly entirely due to lead users, not to some garage-based tinkerer. Lead users don’t tend to be once and done – they are likely to generate innovation after innovation after innovation.

    But perhaps you’re in the field of B2C – so, where’s your lead user?

    They’re out there – it’s just a matter of finding them and capturing their insight. Some clever companies, like Legos, create opportunities for customers (lead users) to manipulate products in new ways such that the company can capture and commercialize the end result. Some methods are versions of crowd-sourcing or hackathons, others look like traditional marketing research. For example, some clothing companies find fashion-forward customers and engage in deeper relationships in order to capture and capitalize on fashion trends. They may do that through focus groups, observational studies, and other more traditional marketing research activities but it’s the relationship that makes it happen.

    But even those studies aren’t designed to generate ideas. Rather, they validate ideas. Idea generation really requires close collaboration.

    That’s why we need to put the R back between C and M. There’s a lot of emphasis being placed on CEM, whether you want to call it customer engagement management or customer experience management. But it’s as if we’ve given up on CRM. It’s as if we’re saying, “Let’s just worry about today — and tomorrow will take care of itself.”

    Ok, fine. There’s no denying the importance of trying to engage customers more deeply in each experience.

    000 cust phone young guy 200018223-004But Customer Lifetime Value (CLV) is more than just the sum of future sales discounted into today’s dollars. CLV is boosted when we have an advocate and when we have a lead user. IT companies, by the way, are the best at identifying and managing relationships with influencers, in my humble opinion. But I don’t know how well we develop and manage relationships with lead users. For one thing, there’s no field labeled “lead user” in any CRM solution. There’s no CLV formula that enables the valuation of a lead user. We just don’t have good mechanisms for identifying and tracking lead users.

    Some of those lead users might be internal. Bill Hewlett and Dave Packard were really lead users. Most of their early products were improvements to things they used or knew people like them would want – test equipment for engineers. Unlike most lead users, these two actually commercialized their innovations themselves. Still, internal idea generation can occur when you are close to the customer.

    There’s another place where great minds gather – a source of innovation that we can’t forget either – and that’s our colleges and universities. When you get a publication from your alma mater describing the latest in research, you’re seeing innovation in the process of becoming reality. Some, like the current studies on new therapies to reach our returning vets with PTSD or the work my colleagues are doing that is resulting in new sources of energy for developing countries, are obvious new products. Others, though, may not be so obvious.

    For example, my colleague, Kirk Wakefield, validated a method for determining ROI from sports sponsorship deals. That innovation has been licensed to agencies that sell those sponsorships, and used at athletic venues such as the University of Texas’ football stadium. Teams use his method to put a price on sponsorships; sponsors use it to evaluate one plan against another.

    Similarly, another colleague has developed cyber security protocols that are now being licensed, while another has developed financial valuation models that hedge funds and other investment types are using. In fact, the concept for the mutual fund came from Tom Potts, a Baylor finance professor.

    Business schools also offer services that can vet ideas, do feasibility studies, and more. If you’re looking for a good way to stretch an R&D budget or maybe you’re a lead user and want to increase your resources for studying ideas that make your business operate more effectively, these services can prove invaluable.

    So if you want great thinking, you have to go find great thinkers. Great minds don’t think alike – which is what makes them so valuable. There are great minds everywhere — and in top business schools, for instance, that would love to take your call. Maybe it’s time to reach out for a conversation?

    00 new jeff tanner crop bio -Tanner12-2Dr. Jeff Tanner is Professor of Marketing and the Executive Director of Baylor University’s Innovative Business Collaboratory. He regularly speaks at conferences such as CRM Evolution, NRF’s Big Show, Teradata PARTNERS, Retail Technology, INFORMS, and others. Author or co-author of 15 books, including his newest, Analytics and Dynamic Customer Strategy, he is an active consultant to organizations such as Cabela’s, Gallery Furniture, Lockhart Industries, and others. Note: In May, Jeff will move to Old Dominion University to assume the role of dean. Under Jeff’s leadership the business school will focus on entrepreneurship and innovative industry collaborations. Jeff can be reached via email at Jeff_Tanner@baylor.edu.

     

     

    The post You Have a Great Tech or Business Idea! Now – Who You Gonna Call?! appeared first on Data Points.

    Teradata Blogs Feed

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel