If you want to learn about communicating and influencing, as well as barriers you might face, check out Talk and Communicate with Executives.
Filter Results
Clear All
Publication Date
Viewing 51-60 of 72 results for
Voice termination fraud, also referred to as SIMbox fraud, often occurs when international calls are hijacked by an intermediate network party and the call traffic is routed via Voice over
HiFive Ice Creams is a premium ice cream retailer, with a strong urban presence and dozens of ice cream parlours in several major cities. HiFive implemented a new offering called “mix-ins” which
Exploring data involves performing an initial exploratory analysis to ensure the data being collected is what was expected from the data sources. It provides a form of quality check to ensure the
The following is a selection of some commonly used analysis and analytics techniques applicable to the Analyze Data domain. The following list of techniques does not represent a comprehensive set
Determining data sets involves performing a review of the data expected from the data sources and determining specifics such as data types, data dimensions, sample size, and relationships between
Data analysis involves the extensive deep analysis performed once the data quality issues are resolved through exploratory analysis. Performing data analysis involves the application of
Preparing data involves obtaining access to the planned data sources and establishing the relationships and linkages between sources in order to create a coherent dataset. Data scientists
The following is a selection of some commonly used analysis and analytics techniques applicable to the Source Data domain. The list of techniques presented does not represent a comprehensive set
Determining the communication needs of stakeholders enables customization of communications to individual stakeholders or stakeholder groups so the message is clearly understood.