automated

Results 351 - 375 of 577Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 22, 2015
Learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.
Tags : 
productivity, customer service, automation, automated financial transactions, compliance, customer retention, customer satisfaction, best practices, business integration, business intelligence, business management, finance
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
best practices, business intelligence, ibm, finance, automated protection, business management, business technology
    
IBM
Published By: ATG, Inc.     Published Date: May 07, 2009
Create an e-commerce presence that's easy for merchandisers to manage, and improve the success of online recommendations. When Tommy Hilfiger looked to enhance its relatively limited online store in 2007, ease of use for merchandisers was the key priority.
Tags : 
atg, tommy hilfiger, commerce ondemand, automated merchandising, e-commerce, recommendations, application integration, business activity monitoring, business analytics, business integration, business process automation, business process management
    
ATG, Inc.
Published By: Vindicia     Published Date: Jun 17, 2014
Many digital offerings are sold on a subscription and recurring basis. Bring Digital Goods and Subscribers Together - this eBook gives you nine essentials for acquiring subscription and recurring revenue customers.
Tags : 
subscription revenue billing, subscription payments, subscription model best practices, subscription billing solutions, subscription billing software, subscription billing platform, subscription billing company, subscription billing business models, subscription billing analytics, subscription billing, saas digital storefront, saas billing solutions, recurring billing software, recurring billing, microtransaction business model, micro transactional model, enterprise subscription billing, digital storefront optimization, digital storefront, digital economy automation
    
Vindicia
Published By: Vindicia     Published Date: Jun 17, 2014
The eBook ‘Digital Age / Digital Goods’ provides information on the various components you’ll want to address while you test an acquisition mix best suited for your organization, and your target audience.
Tags : 
subscription revenue billing, subscription payments, subscription model best practices, subscription billing solutions, subscription billing software, subscription billing platform, subscription billing company, subscription billing business models, subscription billing analytics, subscription billing, saas digital storefront, saas billing solutions, recurring billing software, recurring billing, microtransaction business model, micro transactional model, enterprise subscription billing, digital storefront optimization, digital storefront, digital economy automation
    
Vindicia
Published By: IBM     Published Date: Jul 01, 2015
This white paper discusses how organizations can benefit from implementing collaboration and analytics processes in the three core areas
Tags : 
healthcare analytics, analytics technology, quality assurance, wellness monitoring, performance analysis, patient self-management, information technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat, global threat intelligence, protection, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud, security, knowledge management, enterprise applications, network security
    
IBM
Published By: SAS     Published Date: Mar 06, 2018
Imagine getting into your car and saying, “Take me to work,” and then enjoying an automated drive as you read the morning news. We are getting very close to that kind of scenario, and companies like Ford expect to have production vehicles in the latter part of 2020. Driverless cars are just one popular example of machine learning. It’s also used in countless applications such as predicting fraud, identifying terrorists, recommending the right products to customers at the right time, and correctly identifying medical symptoms to prescribe appropriate treatments. The concept of machine learning has been around for decades. What’s new is that it can now be applied to huge quantities of data. Cheaper data storage, distributed processing, more powerful computers and new analytical opportunities have dramatically increased interest in machine learning systems. Other reasons for the increased momentum include: maturing capabilities with methods and algorithms refactored to run in memory; the
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Tax fraud is already prevalent, and fraudsters are more sophisticated and automated than ever. To get ahead of the game in detecting fraud and protecting revenue, tax agencies need to leverage more advanced and predictive analytics. Legacy processes, systems, and attitudes need not stand in the way. To explore the challenges, opportunities, and value of tax fraud analytics, IIA spoke with Deborah Pianko, a Government Fraud Solutions Architect within the SAS Security Intelligence practice.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 11, 2017
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys
Published By: Dell Software     Published Date: Oct 01, 2012
Finding what you need in Active Directory’s native audit log can be an awful manual-intensive nightmare. There is a better, automated way to help you take control of AD auditing. Read this paper to learn seven essential audit needs, and how Active Administrator meets them.
Tags : 
active directory, auditing, dell software, audit log, ad auditing
    
Dell Software
Published By: Dell Software     Published Date: May 10, 2013
The fact is that managing Window service accounts is time-intensive and tedious, so managing them well is nearly impossible—without the right third-party tools. Read this white paper to discover how easy it can be to manage services in Windows.
Tags : 
dell software, service account, automated tools, secure passwords
    
Dell Software
Published By: WebEx Communications     Published Date: Dec 14, 2007
The Internet is revolutionizing technical support. But, this efficiency often comes with a price in customer satisfaction. Customers expect to be able to solve their own problems or immediately communicate with a person who can make things right. But too often, these expectations aren't met. What's needed is a new class of software: web-based Automated Contact Distribution.
Tags : 
remote support, contact management, customer, customer service, customer support, online support, online help desk, help desk, crm, webex, customer interaction service, customer relationship management
    
WebEx Communications
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : 
file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape, business process automation, data protection, information management
    
GlobalSCAPE
Published By: ARX (Algorithmic Research)     Published Date: Jun 10, 2010
This white paper outlines the costs associated with a paper-based approval process and can help you establish the Return on Investment (ROI) that your organization can expect by deploying a digital signature solution.
Tags : 
arx, algorithmic research, roi calculation, digital signature, tco, automated approval process, authentication, business intelligence, business process automation, return on investment, total cost of ownership
    
ARX (Algorithmic Research)
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The Hager Group is a $1.5-billion electronics manufacturer. With a distributed global workforce of more than 10,000 employees, Hager has 40 sales subsidiaries and 25 industrial sites worldwide.  Today, with a centralized marketing database and software, Hager can ensure data quality and deliver personalized, targeted communications according to customer and prospect profiles and behavior.  This program allows Hager to capture 1,000 new prospects each month, and achieve a 10 percent conversion rate - resulting in an incremental revenue increase of $42 million per year.
Tags : 
neolane, the hager group, e-marketing program, centralized marketing database, central repository customer data, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media, lead generation & automation
    
Neolane, Inc.
Published By: Neolane, Inc.     Published Date: Jan 08, 2010
This white paper outlines how B2B marketers can build the foundation for their own lead nurturing programs to increase campaign effectiveness, maintain the interest of prospects through the entire sales cycle, and deliver automated time- and event-triggered inbound and outbound programs.
Tags : 
neolane, b2b marketer, lead nurturing program, lead generation, campaign, marketing automation, lead management optimization, enterprise marketing software, lead generation & automation
    
Neolane, Inc.
Published By: Neolane, Inc.     Published Date: Jan 08, 2010
This white paper provides advice on how to avoid the #1 mistake many of your peers made when going through the technology selection process: settling for a lead management solution that's "good enough" instead of putting in the hard work required to identify one that meets their needs now and in the future.
Tags : 
neolane, b2b lead management, automated, marketing automation, lead generation, enterprise marketing software, lead generation & automation
    
Neolane, Inc.
Published By: Mentor Graphics     Published Date: Sep 01, 2010
This paper will examine current methods used to eliminate waived errors at the chip level and describe a new automatable method for identifying and removing waived errors from DRC results.
Tags : 
mentor graphics, automated drc, violation waiver management, ip block integration, design rule checking, tcp/ip protocol, application integration, business process automation, electronic design automation, system on a chip, electronic test and measurement, integrated circuits and semiconductors, data center design and management
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Sep 01, 2010
What Is CFA and Why Do I Need It? This five-part paper series examines the conditions that led to the development of recommended rules, and describes the process by which automated design analysis and rule verification can help designers optimize designs to the fullest and most efficient use of area, while still ensuring manufacturability.
Tags : 
mentor graphics, critical feature analysis, cfa, design for manufacturing, dfm, automated design analysis, rule verification, electronic design automation, system on a chip, electronic test and measurement, embedded design, embedded systems and networking, electromechanical & mechanical, integrated circuits and semiconductors
    
Mentor Graphics
Published By: Numara Software     Published Date: Jul 09, 2009
In this informative webinar, you will learn about the challenges of implementing configuration management along with suggestions on how to get started, and best practices to ensure success. You will also learn how Numara® FootPrints® Configuration Management, with its fast implementation, practical approach to implementing configuration management and automated integration to auto-discovery tools, takes the pain and time out of creating and maintaining a functional CMDB. Learn more today!
Tags : 
configuration management, cmdb, numara, footprints, auto-discovery tools, hardware, itil, service management, call volume, it budget, service channel management, customer experience, sla, service management solution, projects, surveys, workflow, service desk, tracking, billing
    
Numara Software
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.