197,717 research outputs found

    Intelligent customer relationship management (ICRM) by EFLOW portal

    Get PDF
    Customer relationship management (CRM) has become a strategic initiative aimed at getting, growing, and retaining the right customers. A great amount of numeric data and even more soft information are available about customers. The strategy of building and maintaining customer relations can be described with 'if… then' rules acquired from experts. Doctus Knowledge-Based System provides a new and simplified approach in the field of knowledge management. It is able to cope with tacit and implicit rules at the same time, so decision makers can clearly see the satisfactory solution (then and there). It reasons both deductive and inductive, so it enables the user to check on the model graph why is the chosen solution in the given situation most appropriate. It is upgradeable with in telligent portal, which presents the personalized (body-tailored) information for decision makers. When we need some hard data from a database or a data warehouse, we have automatic connection between case input interface and the database. Doctus recognizes the relations between the data, it selects them and provides only the needed rules to the decision maker. Intelligent portal puts our experience on the web, so our knowledge base is constantly improving with new 'if… then' rules. We support decision mak ing with two interfaces. On the Developer Interface the attributes, the values and the 'if… then' rules can be modified. The intelligent portal is used as a managerial decision support tool. This interface can be used without seeing the knowledge base, we only see the personalized soft information. ICRM (intelligent Customer Relationship Management) helps customer to get the requested information quickly. It is also capable of customizing the questionnaires, so the customer doesn't have to answer irrelevant questions and the decision maker doesn't have to read endless reports

    Seismology and seismic hazard

    Get PDF

    Kashmir Pakistand Earthquake of October 8 2005. A Field Report by EEFIT

    Get PDF

    Landslides and Geotechnical Aspects

    Get PDF

    How Can Multinational Corporations Retain Their Employees in China?

    Get PDF
    To address the headache encountered by many multinational companies in China retention of their Chinese employees, this study first examined the current Chinese labor market, identifying the unique characteristics of the market mainly comprised of university graduates and experienced white-collar employees; then tried to explain the reasons behind employees departures from a perspective of deep-rooted Chinese cultures; in the end, proposed effective and efficient solutions for retention purposes. All the proposed solutions aim to address key human resources management concerns, including compensation management, talent acquisition, performance management and communication. This study examined the best practices in employee retention adopted by a large number of successful multinational players in the Chinese market. Some of the names from the list are IBM, Motorola, Intel, HSBC, Shell and British Petroleum (BP)

    Attracting and Retaining Women in the Transportation Industry

    Get PDF
    This study synthesized previously conducted research and identified additional research needed to attract, promote, and retain women in the transportation industry. This study will detail major findings and subsequent recommendations, based on the annotated bibliography, of the current atmosphere and the most successful ways to attract and retain young women in the transportation industry in the future. Oftentimes, it is perception that drives women away from the transportation industry, as communal goals are not emphasized in transportation. Men are attracted to agentic goals, whereas women tend to be more attracted to communal goals (Diekman et al., 2011). While this misalignment of goals has been found to be one reason that women tend to avoid the transportation industry, there are ways to highlight the goal congruity processes that contribute to transportation engineering, planning, operations, maintenance, and decisions—thus attracting the most talented individuals, regardless of gender. Other literature has pointed to the lack of female role models and mentors as one reason that it is difficult to attract women to transportation (Dennehy & Dasgupta, 2017). It is encouraging to know that attention is being placed on the attraction and retention of women in all fields, as it will increase the probability that the best individual is attracted to the career that best fits their abilities, regardless of gender

    LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks

    Full text link
    Software Defined Networking (SDN) is a new networking architecture which aims to provide better decoupling between network control (control plane) and data forwarding functionalities (data plane). This separation introduces several benefits, such as a directly programmable and (virtually) centralized network control. However, researchers showed that the required communication channel between the control and data plane of SDN creates a potential bottleneck in the system, introducing new vulnerabilities. Indeed, this behavior could be exploited to mount powerful attacks, such as the control plane saturation attack, that can severely hinder the performance of the whole network. In this paper we present LineSwitch, an efficient and effective solution against control plane saturation attack. LineSwitch combines SYN proxy techniques and probabilistic blacklisting of network traffic. We implemented LineSwitch as an extension of OpenFlow, the current reference implementation of SDN, and evaluate our solution considering different traffic scenarios (with and without attack). The results of our preliminary experiments confirm that, compared to the state-of-the-art, LineSwitch reduces the time overhead up to 30%, while ensuring the same level of protection.Comment: In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015). To appea
    • …
    corecore