Voice termination fraud, also referred to as SIMbox fraud, often occurs when international calls are hijacked by an intermediate network party and the call traffic is routed via Voice over
Filter Results
Clear All
Publication Date
Viewing 171-180 of 236 results for
HiFive Ice Creams is a premium ice cream retailer, with a strong urban presence and dozens of ice cream parlours in several major cities. HiFive implemented a new offering called “mix-ins” which
Exploring data involves performing an initial exploratory analysis to ensure the data being collected is what was expected from the data sources. It provides a form of quality check to ensure the
The following is a selection of some commonly used analysis and analytics techniques applicable to the Analyze Data domain. The following list of techniques does not represent a comprehensive set
Determining data sets involves performing a review of the data expected from the data sources and determining specifics such as data types, data dimensions, sample size, and relationships between
Data analysis involves the extensive deep analysis performed once the data quality issues are resolved through exploratory analysis. Performing data analysis involves the application of
Preparing data involves obtaining access to the planned data sources and establishing the relationships and linkages between sources in order to create a coherent dataset. Data scientists
The following is a selection of some commonly used analysis and analytics techniques applicable to the Source Data domain. The list of techniques presented does not represent a comprehensive set
Determining the communication needs of stakeholders enables customization of communications to individual stakeholders or stakeholder groups so the message is clearly understood.
Early in a business data analytics engagement, stakeholders are identified and analyzed to understand how to effectively engage and collaborate with the variety of stakeholders involved. As the