CN113177800A - Activity data management method and device - Google Patents

Activity data management method and device Download PDF

Info

Publication number
CN113177800A
CN113177800A CN202110589826.6A CN202110589826A CN113177800A CN 113177800 A CN113177800 A CN 113177800A CN 202110589826 A CN202110589826 A CN 202110589826A CN 113177800 A CN113177800 A CN 113177800A
Authority
CN
China
Prior art keywords
activity data
management
data
parameters
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110589826.6A
Other languages
Chinese (zh)
Inventor
陈世强
李驰
杨黎
赵瑞学
韩路
徐雅光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202110589826.6A priority Critical patent/CN113177800A/en
Publication of CN113177800A publication Critical patent/CN113177800A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates

Landscapes

  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an activity data management method and device, which relate to the field of big data, and the method comprises the following steps: acquiring activity data and processing parameters of the activity data; calculating management parameters according to the activity data and the processing parameters; and generating a management instruction of the activity data according to the management parameters so that the management module controls the activity data according to the management instruction. According to the activity data and the processing parameters of the activity data, the management of the activity data management can be automatically realized, and the efficiency of the activity data management is improved.

Description

Activity data management method and device
Technical Field
The invention relates to the technical field of big data, in particular to an activity data management method and device.
Background
Enterprises generally organize some marketing activities for some customers with specific targets in order to promote new functions of new products, increase sales strength of products, obtain new customers and the like, and target customers participating in the activities can participate in business activities of the enterprises in the process of activities and obtain some benefits such as full reduction, visual item delivery, coupon delivery and other prizes in order to achieve marketing effects. However, if the enterprise designs or organizes the marketing campaign, the customers can find the vulnerability of the campaign when participating in the marketing campaign due to various reasons, so that the prize of the marketing campaign of the enterprise can be repeatedly, illegally and not according with the purpose of the enterprise. The marketing prize of the illegal obtaining enterprise of the client belongs to malicious wool, so that the enterprise is lost to different degrees according to the malicious wool level, frequency, prize value and other factors of the client.
Disclosure of Invention
The invention provides a method and a device for managing activity data, which can automatically realize the management of the activity data without being realized by developers through coding, and improve the efficiency of the activity data management.
In a first aspect, an embodiment of the present invention provides an activity data management method, where the method includes: acquiring activity data and processing parameters of the activity data; calculating management parameters according to the activity data and the processing parameters; and generating a management instruction of the activity data according to the management parameters so that a management module controls the activity data according to the management instruction.
In a second aspect, an embodiment of the present invention further provides an activity data management apparatus, where the apparatus includes: a data module to: acquiring activity data and processing parameters of the activity data; an engine module to: calculating management parameters according to the activity data and the processing parameters; an instruction module to: and generating a management instruction of the activity data according to the management parameters so that a management module controls the activity data according to the management instruction.
In a third aspect, an embodiment of the present invention further provides a computer device, including a memory and a processor, where the memory stores a computer program operable on the processor, and the processor implements the activity data management method when executing the computer program.
In a fourth aspect, the present invention further provides a computer-readable medium having a non-volatile program code executable by a processor, where the program code causes the processor to execute the above-mentioned activity data management method.
The embodiment of the invention has the following beneficial effects: the embodiment of the invention provides an activity data management scheme, which comprises the following steps: acquiring activity data and processing parameters of the activity data; calculating management parameters according to the activity data and the processing parameters; and generating a management instruction of the activity data according to the management parameters so that the management module controls the activity data according to the management instruction. According to the embodiment of the invention, the management of the active data management can be automatically realized according to the active data and the processing parameters of the active data, and the efficiency of the active data management is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flowchart of an activity data management method according to an embodiment of the present invention;
FIG. 2 is a block diagram of an activity data management apparatus according to an embodiment of the present invention;
FIG. 3 is a block diagram of an alternative embodiment of an activity data management device;
FIG. 4 is a block diagram of a configuration management module according to an embodiment of the present invention;
fig. 5 is a block diagram of a computer device according to an embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, when a client participates in a marketing activity of an enterprise organization, the client needs to have a certain marketing activity rule, and the client can obtain the prize of the marketing activity from the enterprise only by meeting the rule. In the existing activity data management scheme, only a specific crowd is allowed to participate in a marketing activity in a white list mode; the program to prevent malicious wool is implemented separately for each marketing campaign. The prior proposal for preventing the malicious wool pulling has the following problems:
1. the white list mode requires that a business person generates a list in advance, and how the list is generated has certain difficulty for the business person;
2. although the program for preventing malicious wool pulling alone can be somewhat effective to some extent, the method is too fixed and inflexible because of the specific logic written by developers, and cannot meet flexible marketing requirements when business requirements change according to external factors such as market.
The method and the device for managing the activity data provided by the embodiment of the invention have the advantages that the enterprise can avoid the occurrence of the condition of malicious wool by adopting necessary means when designing or organizing a marketing campaign in an innovative way, and the loss is avoided.
For the convenience of understanding the embodiment, a detailed description will be given to an activity data management method disclosed in the embodiment of the present invention.
First, the terms involved are introduced.
Marketing activities: enterprises aim to achieve a business activity which is developed for client organizations in order to attract customers to use the services provided by the customers and purchase products, and meanwhile, in order to increase the attraction, the enterprises generally give the customers benefits in the forms of gifts, cash, full returns and the like so as to attract the customers to actively participate in marketing activities.
Thinning wool: the method is an image metaphor, and means that after discovering the marketing activities of the enterprise, the client participates in the activities and obtains corresponding benefits in order to obtain the corresponding benefits.
Malicious wool: that is, the unconventional, unreasonable (even illegal) method for the client to discover the vulnerability of the enterprise marketing activity enables the client to obtain the corresponding benefits of the marketing activity for a plurality of times or repeatedly, and the benefits of the client are maximized. In general, the enterprise will not allow the malicious wool to exist, which will not achieve the purpose of marketing and will further damage the interests of the enterprise.
Prize: is an item of economic value that is made available to a customer, such as a gift, coupon, etc. that the business sets to facilitate the customer participating in marketing campaigns.
Calculating after reaching standards: when a client participates in the marketing activity of the enterprise, the enterprise performs calculation processing on the participation process of the enterprise to determine whether the client can obtain the corresponding prize.
Awarding: namely, the client meets the activity requirement when participating in the marketing activity, and the enterprise is the client.
An embodiment of the present invention provides an activity data management method, which is shown in a flowchart of an activity data management method shown in fig. 1, and the method includes the following steps:
s102, acquiring activity data and processing parameters of the activity data.
In embodiments of the present invention, the campaign data may be relevant data related to the marketing campaign, and the processing parameters are used to determine how to calculate the campaign data to find problem data present in the campaign data.
It should be noted that, by configuring the processing parameters, a specific rule for preventing malicious wool can be implemented. Campaign data, which may be supporting data for a particular marketing campaign.
And S104, calculating management parameters according to the activity data and the processing parameters.
In the embodiment of the present invention, a specific calculation rule may be determined according to the processing parameter. And calculating the activity data according to the calculation rule. For example, the activity data may be calculated according to the processing parameters to obtain a calculation result, and then it is determined whether there is data of malicious wool in the activity data according to the calculation result. And taking a calculation result obtained by calculation according to the activity data and the processing parameters as the management parameters. Whether problem data exists in the activity data can be judged according to the management parameters.
And S106, generating a management instruction of the activity data according to the management parameters so that the management module controls the activity data according to the management instruction.
In an embodiment of the invention, the management instructions are for controlling the activity data. For example, if the activity data includes prize dispensing data, the dispensing or stopping of the dispensing of the prize may be controlled by the management instruction.
The embodiment of the invention provides an activity data management scheme, which comprises the following steps: acquiring activity data and processing parameters of the activity data; calculating management parameters according to the activity data and the processing parameters; and generating a management instruction of the activity data according to the management parameters so that the management module controls the activity data according to the management instruction. According to the embodiment of the invention, the management of the active data management can be automatically realized according to the active data and the processing parameters of the active data, and the efficiency of the active data management is improved.
In one embodiment, the activity data includes one or more of the following: product data, rebate data, and sales data.
In embodiments of the present invention, the product data may determine product information to which the marketing data relates. The rebate data may be used to determine customer engagement information, customer base information, and prize information relating to the marketing campaign. Sales data may be used to determine sales of products, including, for example, sales channels, price information, and the like.
Although it is considered that the single implementation of a program for preventing malicious wool pulling may be somewhat effective to some extent, the method is too fixed and inflexible because of a specific logic written by a developer, and cannot meet flexible marketing requirements when business requirements change according to external factors such as the market. In one embodiment, the method may further perform the steps of: and updating the processing parameters.
In the embodiment of the invention, the calculation rule of the activity data can be correspondingly updated when the activity data changes according to external factors such as market and the like by updating the processing parameters. And the flexibility of data processing is improved.
It should be noted that updating the processing parameters can facilitate business personnel to perform rule management, and if the skills are met, the processing parameters can be updated by manually writing the rules.
In one embodiment, updating the processing parameters may be performed as follows: deleting the first target processing parameter, adding the second target processing parameter, or modifying the third target processing parameter.
The processing parameters can be updated by deleting, adding or modifying the data in the processing parameters, so as to meet the processing requirements of more diverse activity data.
The implementation of the method is described below in a specific embodiment.
The work to be done:
(1) developing a rule engine for preventing the wool from being attacked by the malicious wool;
(2) the corresponding support data for preventing malicious wool needed for developing the rule engine is needed;
(3) and a management end system which can be flexibly configured by a service (or a maintenance person) needs to be developed.
The module range and the function obtained according to the method are as follows:
module 1: a rule engine module:
the module is an engine and has universal capability, and like a calculator, the module can obtain a final result by inputting operation requirements such as numbers, addition, subtraction, multiplication, division and the like. The engine can finally calculate whether the operation of the customer belongs to malicious wool.
And (3) module 2: a support data module:
the function of this module is to provide input data to the rule engine, and the rule engine can perform logic calculation of pulling wool maliciously by applying the rules configured by the service personnel for preventing the malicious wool to these supporting data. The module is the processing raw material of the module 1, and the data rule engine cannot run without the module.
And a module 3: a rule configuration management end:
the module is used for providing specific rule configuration for the rule engine, and the rules are all the rule configuration for realizing the malicious wool pulling by a service person on a management end interface through mouse clicking or simple keyboard editing. These rules are souls, and without these specific live rules, the rules engine does not know how the details are running, and the rules engine cannot perform actual calculations on the support data.
Relation between two modules
The rule engine of module 1 is a unified model, and performs dynamic calculation according to different input commands and data to determine whether the customer is in malicious wool. The engine of module 1, without the support data of module 2 and the specific rules of module 3, is meaningless; module 2 provides the data needed for the calculation, without which the calculation is not mentioned at all; module 3 is the logic that performs the calculations on the support data in module 2, and without this logic it is not known how to calculate. Therefore, the three components supplement each other.
The scheme is that a rule engine for preventing wool from being ripped out maliciously is designed and developed, a business user can be allowed to configure a specific rule for preventing wool from being ripped out maliciously in the rule engine (for example, a customer can win a prize by opening a mobile phone bank, and the rule for preventing wool from being ripped out maliciously can be defined as that the same customer can not give a prize to the customer even if the customer opens the mobile phone bank again if the customer has opened the mobile phone bank historically), and the malicious wool can be avoided by calculating the activity standard of the engine.
The embodiment of the invention provides a method and a device for managing active data, wherein the method realizes a rule engine for preventing malicious wool, and by means of the engine and corresponding supported data, business personnel can set rules for preventing malicious wool for any marketing campaign. When the client participates in the marketing campaign, the engine can judge whether the client is a malicious behavior or not, and if the client is the malicious behavior, the client is not awarded a prize. The method is automatic and efficient, and only business personnel need to configure rules for preventing malicious wool, and the rules are not required to be realized by developers through coding; data items for supporting preventing malicious wool can be dynamically added according to needs without changing system functions.
An embodiment of the present invention further provides an activity data management fusion device, referring to a structural block diagram of an activity data management device shown in fig. 2, where the device includes:
a data module 31 for: acquiring activity data and processing parameters of the activity data; an engine module 32 for: calculating management parameters according to the activity data and the processing parameters; an instruction module 33 for: and generating a management instruction of the activity data according to the management parameters so that the management module controls the activity data according to the management instruction.
In one embodiment, the activity data includes one or more of the following: product data, rebate data, and sales data.
In one embodiment, referring to a block diagram of an activity data management apparatus shown in fig. 3, the apparatus further includes a configuration management module 34 for: and updating the processing parameters.
In one embodiment, referring to the block diagram of the configuration management module shown in fig. 4, the configuration management module includes an updating unit 341 configured to: deleting the first target processing parameter, adding the second target processing parameter, or modifying the third target processing parameter.
The embodiment of the present invention further provides a computer device, referring to the schematic block diagram of the structure of the computer device shown in fig. 5, the computer device includes a memory 51 and a processor 52, the memory stores a computer program that can be executed on the processor, and the processor implements the steps of any one of the methods when executing the computer program.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the computer device described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Embodiments of the present invention also provide a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform any of the steps of the above-described method.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An activity data management method, comprising:
acquiring activity data and processing parameters of the activity data;
calculating management parameters according to the activity data and the processing parameters;
and generating a management instruction of the activity data according to the management parameters so that a management module controls the activity data according to the management instruction.
2. The method of claim 1, wherein the activity data comprises one or more of the following: product data, rebate data, and sales data.
3. The method of claim 1, further comprising: and updating the processing parameters.
4. The method of claim 3, wherein updating the processing parameter comprises:
deleting the first target processing parameter, adding the second target processing parameter, or modifying the third target processing parameter.
5. An activity data management apparatus, comprising:
a data module to: acquiring activity data and processing parameters of the activity data;
an engine module to: calculating management parameters according to the activity data and the processing parameters;
an instruction module to: and generating a management instruction of the activity data according to the management parameters so that a management module controls the activity data according to the management instruction.
6. The apparatus of claim 5, wherein the activity data comprises one or more of the following: product data, rebate data, and sales data.
7. The apparatus of claim 5, further comprising a configuration management module to: and updating the processing parameters.
8. The apparatus of claim 7, wherein the configuration management module comprises an updating unit configured to:
deleting the first target processing parameter, adding the second target processing parameter, or modifying the third target processing parameter.
9. A computer device comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the activity data management method of any one of claims 1 to 4 when executing the computer program.
10. A computer-readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the activity data management method of any of claims 1 to 4.
CN202110589826.6A 2021-05-28 2021-05-28 Activity data management method and device Pending CN113177800A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110589826.6A CN113177800A (en) 2021-05-28 2021-05-28 Activity data management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110589826.6A CN113177800A (en) 2021-05-28 2021-05-28 Activity data management method and device

Publications (1)

Publication Number Publication Date
CN113177800A true CN113177800A (en) 2021-07-27

Family

ID=76927762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110589826.6A Pending CN113177800A (en) 2021-05-28 2021-05-28 Activity data management method and device

Country Status (1)

Country Link
CN (1) CN113177800A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109242522A (en) * 2017-07-11 2019-01-18 深圳乐信软件技术有限公司 The foundation of target user's identification model, target user's recognition methods and device
CN109409918A (en) * 2018-08-24 2019-03-01 深圳壹账通智能科技有限公司 The recognition methods of wool party, device, equipment and storage medium based on user behavior
CN109447400A (en) * 2018-09-18 2019-03-08 平安科技(深圳)有限公司 Task data management method, device, computer equipment and storage medium
CN109472455A (en) * 2018-10-12 2019-03-15 中国平安人寿保险股份有限公司 Active evaluation method, apparatus, electronic equipment and storage medium
CN110363540A (en) * 2019-06-27 2019-10-22 上海淇馥信息技术有限公司 A kind of recognition methods of wool party, device and electronic equipment based on user behavior detection
CN111091408A (en) * 2019-10-30 2020-05-01 北京天元创新科技有限公司 User identification model creating method and device and identification method and device
CN112686702A (en) * 2020-12-31 2021-04-20 平安消费金融有限公司 Wool party identification method and device, computer equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109242522A (en) * 2017-07-11 2019-01-18 深圳乐信软件技术有限公司 The foundation of target user's identification model, target user's recognition methods and device
CN109409918A (en) * 2018-08-24 2019-03-01 深圳壹账通智能科技有限公司 The recognition methods of wool party, device, equipment and storage medium based on user behavior
CN109447400A (en) * 2018-09-18 2019-03-08 平安科技(深圳)有限公司 Task data management method, device, computer equipment and storage medium
CN109472455A (en) * 2018-10-12 2019-03-15 中国平安人寿保险股份有限公司 Active evaluation method, apparatus, electronic equipment and storage medium
CN110363540A (en) * 2019-06-27 2019-10-22 上海淇馥信息技术有限公司 A kind of recognition methods of wool party, device and electronic equipment based on user behavior detection
CN111091408A (en) * 2019-10-30 2020-05-01 北京天元创新科技有限公司 User identification model creating method and device and identification method and device
CN112686702A (en) * 2020-12-31 2021-04-20 平安消费金融有限公司 Wool party identification method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
Ruutu et al. Development and competition of digital service platforms: A system dynamics approach
Opresnik et al. The value of big data in servitization
Gawer Bridging differing perspectives on technological platforms: Toward an integrative framework
Windrum et al. The outsourcing productivity paradox: total outsourcing, organisational innovation, and long run productivity growth
AU2022202023B2 (en) Method and system for segmentation as a service
US20210117055A1 (en) Performing an action based on user interaction data
JP2017174124A (en) Target achievement portfolio generation device, program and method
EP2764489A1 (en) Incentive optimization for social media marketing campaigns
Ruiz et al. Analyzing ad library updates in android apps
Şener et al. Cloud-based enterprise information systems: determinants of adoption in the context of organizations
US20200302486A1 (en) Method and system for determining optimized customer touchpoints
EP4172755A1 (en) Deployment operations based on deployment profiles in a deployment system
Kuada A social network approach to provisioning and management of cloud computing services for enterprises
Chauhan et al. Exploring factors affecting service quality of ERP on cloud: a revelatory case study
Kirkpatrick et al. Visual interactive modeling in industry: results from a survey of visual interactive model builders
CN113177800A (en) Activity data management method and device
Van den Ende et al. Should system firms develop complementary products? A dynamic model and an empirical test
Pant et al. Towards reasoning about pivoting in startups and large enterprises with i
Singh et al. Correctness properties for multiagent systems
Shahin et al. Proposing and analysing a model for the influence of outsourcing on organisational agility with a case study in a manufacturing company
Basha et al. Survey on e-business Models
Bisandu Cloud Devops Future of E-Business
Myers Analytics in the Cloud
Zhang et al. Quantum storytelling network analysis of supply chain management: A case study
Naylor et al. What Insurance Companies Need to Do

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination