Remove en blogs other
article thumbnail

Enhancing customer experience: Streamlining orders with custom email notifications in IBM Cloud

IBM Big Data Hub

This case study may inspire other businesses to explore similar solutions for improving customer engagement and satisfaction. Learn more about IBM Cloud Event Notifications The post Enhancing customer experience: Streamlining orders with custom email notifications in IBM Cloud appeared first on IBM Blog.

article thumbnail

Anemones and Simplicity

Darkhorse

Blaise Pascal I was listening to a podcast the other day. Em, En, Ee. When you think you’re done, take a hard look at all the elements of your design or your model or your slide deck or your blog post and begin to chop away. I have made this longer than usual because I have not had time to make it shorter.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leveraging user-generated social media content with text-mining examples

IBM Big Data Hub

As it pertains to social media data, text mining algorithms (and by extension, text analysis) allow businesses to extract, analyze and interpret linguistic data from comments, posts, customer reviews and other text on social media platforms and leverage those data sources to improve products, services and processes.

article thumbnail

Hitting the Gym With Neural Networks: Implementing a CNN to Classify Gym Equipment

Insight

Real gyms have noisy backgrounds with mirrors, windows, people, and other equipment. If you’d like to read more about all of the different optimizers out there, check out this excellent Medium article and this wonderfully detailed blog post. This could lead to a classifier that performs poorly in a real gym. What the heck!

Metrics 58
article thumbnail

Spear phishing vs. phishing: what’s the difference?

IBM Big Data Hub

a global brand), sent en masse to millions of people in hope that some small percentage of recipients will take the bait. Unsurprisingly, whaling attacks typically require much more detailed research than other spear phishing attacks. appeared first on IBM Blog. Spear phishing is targeted phishing.

B2B 109
article thumbnail

Data, The Unsung Hero of the Covid-19 Solution

Cloudera

The challenge is particularly intense because the vaccine will not be distributed en masse to all individuals, but by segments that include occupation, age, preexisting risk, and geography. . With a greater view both upstream and downstream, every member of the supply chain acts in concert with each other, rather than in a silo.

article thumbnail

Cryptography use cases: From secure communication to data security 

IBM Big Data Hub

Asymmetric encryption Asymmetric en cryption , also known as public-key encryption, uses a pair of keys—a public key and a private key. Explore IBM cryptography solutions The post Cryptography use cases: From secure communication to data security appeared first on IBM Blog.