automated

Results 351 - 375 of 600Sort Results By: Published Date | Title | Company Name
Published By: rPath     Published Date: Dec 10, 2010
Manufacturing evolved from manual to automated, ad hoc to repeatable. From art to science. Manufacturing has been forced to "industrialize." Aiding in the effort are product lifecycle and supply chain management tools for streamlining manufacturing process and linking together previously isolated stages in the value chain.
Tags : 
rpath, software supply chain, manufacturing process, automation, product lifecycle, supply chain management tool, business process automation, product lifecycle management, supply chain management, system management software, manufacturing execution systems
    
rPath
Published By: ClearSlide, Inc     Published Date: Jan 28, 2015
To build a successful sales engine, B2B sales leaders must continually find ways to increase levels of productivity. Today, automated tools and analytics are becoming the key differentiator of highly productive sales teams. Are you ready to make your sales team more effective, efficient, and enabled?
Tags : 
b2b sales, buyers journey, sales strategies, sales-engagement, engagement strategies, prospecting solutions, customer experience/engagement, marketing research, sales
    
ClearSlide, Inc
Published By: E-SignLive by Silanis     Published Date: Oct 23, 2013
What is the best or ideal type of electronic signature? There is no one-size-fits-all answer. It all depends on the process being automated. In this 7-page article, we start out by defining the steps in a typical e-signature process and identify what options there are for each step. Download your complimentary copy now.
Tags : 
enterprise applications
    
E-SignLive by Silanis
Published By: Symantec     Published Date: Nov 12, 2015
By reading this whitepaper, you will gain insight into the following topics: The next steps in automated monitoring How automation can speed detection of attack attempts The role of automation as a key feature of the "20 security controls" or CSCs Practical guidelines for moving from manual to automated analysis
Tags : 
security automation, security breaches, automated monitoring, detect attack attempts, automated analysis, security
    
Symantec
Published By: nettime solutions     Published Date: Mar 04, 2014
This whitepaper covers the best practices, methods and standards for time off accruals that are affecting PTO policies and will explain how a customizable, automated time and attendance platform can provide workforce analytics and labor management solutions.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform, stratustime, workforce analytics, labor management, management solutions, pto banks, flexibility, privacy, traditional pto, bank-type pto, monitoring, business process automation, quality assurance
    
nettime solutions
Published By: nettime solutions     Published Date: Mar 04, 2014
This webinar covers the best practices, methods and standards for time off accruals that are enhancing PTO policies nationwide, while showing you how a customizable automated time and attendance platform can provide workforce analytics and labor management solutions — all from your web-browser.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform, stratustime, workforce analytics, labor management, management solutions, pto banks, flexibility, privacy, traditional pto, bank-type pto, business intelligence, business process automation, productivity
    
nettime solutions
Published By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : 
lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite, automated patch solution, lemss, agent communication, test groups, best practices, business intelligence, managing patches, vulnerability monitoring, remediation techniques, backup and recovery, business management, change management
    
Lumension
Published By: Alert Logic     Published Date: Jun 12, 2014
Log management is an organizational requirement that extends beyond simple data collection. Today’s compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Tags : 
log management, log collection, log solutions, log storage, security logs, it management, enterprise applications
    
Alert Logic
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, rackspace, log management, automated log management, pci, hipaa, glba, log data, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, sungard, log management, automated log management, pci, hipaa, glba, log data, security, it management
    
Alert Logic and Sungard Availability Services
Published By: Schneider Electric     Published Date: Aug 15, 2017
Schneider Electric is integrating datacenter infrastructure management (DCIM) software, big-data analytics and cloud services into the management of customers’ datacenters. Its recently launched StruxureOn cloud offering signals a new wave in datacenter operations, using a combination of machine learning, anomaly detection and event-stream playback to give operators real-time insights and alarming via their smartphones. More capabilities and features are planned, including predictive analysis and, eventually, automated action. Schneider’s long-term strategy is to build a partner ecosystem around StruxureOn, and provide digital services that span its traditional datacenter business.
Tags : 
incident tracking, historical trending, troubleshooting, operational analysis, prediction model, schneider equipment, maintenance, firmware updates
    
Schneider Electric
Published By: SAP     Published Date: Dec 14, 2009
Consider how you can gain control of cost structures by taking systematic steps to improve operational efficiency. By using efficient, automated processes, you can reduce waste, unnecessary overtime, and other cost factors. Integrated business software systems put this efficiency overhaul within reach, quickly, and affordably.
Tags : 
sap, efficiency, infrastructure, capital, structure, integration, automation, erp, enterprise resource planning, it spending, spend management
    
SAP
Published By: IBM     Published Date: Jul 22, 2015
Learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.
Tags : 
productivity, customer service, automation, automated financial transactions, compliance, customer retention, customer satisfaction, best practices, business integration, business intelligence, business management, finance
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
best practices, business intelligence, ibm, finance, automated protection, business management, business technology
    
IBM
Published By: ATG, Inc.     Published Date: May 07, 2009
Create an e-commerce presence that's easy for merchandisers to manage, and improve the success of online recommendations. When Tommy Hilfiger looked to enhance its relatively limited online store in 2007, ease of use for merchandisers was the key priority.
Tags : 
atg, tommy hilfiger, commerce ondemand, automated merchandising, e-commerce, recommendations, application integration, business activity monitoring, business analytics, business integration, business process automation, business process management
    
ATG, Inc.
Published By: Vindicia     Published Date: Jun 17, 2014
Many digital offerings are sold on a subscription and recurring basis. Bring Digital Goods and Subscribers Together - this eBook gives you nine essentials for acquiring subscription and recurring revenue customers.
Tags : 
subscription revenue billing, subscription payments, subscription model best practices, subscription billing solutions, subscription billing software, subscription billing platform, subscription billing company, subscription billing business models, subscription billing analytics, subscription billing, saas digital storefront, saas billing solutions, recurring billing software, recurring billing, microtransaction business model, micro transactional model, enterprise subscription billing, digital storefront optimization, digital storefront, digital economy automation
    
Vindicia
Published By: Vindicia     Published Date: Jun 17, 2014
The eBook ‘Digital Age / Digital Goods’ provides information on the various components you’ll want to address while you test an acquisition mix best suited for your organization, and your target audience.
Tags : 
subscription revenue billing, subscription payments, subscription model best practices, subscription billing solutions, subscription billing software, subscription billing platform, subscription billing company, subscription billing business models, subscription billing analytics, subscription billing, saas digital storefront, saas billing solutions, recurring billing software, recurring billing, microtransaction business model, micro transactional model, enterprise subscription billing, digital storefront optimization, digital storefront, digital economy automation
    
Vindicia
Published By: IBM     Published Date: Jul 01, 2015
This white paper discusses how organizations can benefit from implementing collaboration and analytics processes in the three core areas
Tags : 
healthcare analytics, analytics technology, quality assurance, wellness monitoring, performance analysis, patient self-management, information technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat, global threat intelligence, protection, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud, security, knowledge management, enterprise applications, network security
    
IBM
Published By: SAS     Published Date: Mar 06, 2018
Imagine getting into your car and saying, “Take me to work,” and then enjoying an automated drive as you read the morning news. We are getting very close to that kind of scenario, and companies like Ford expect to have production vehicles in the latter part of 2020. Driverless cars are just one popular example of machine learning. It’s also used in countless applications such as predicting fraud, identifying terrorists, recommending the right products to customers at the right time, and correctly identifying medical symptoms to prescribe appropriate treatments. The concept of machine learning has been around for decades. What’s new is that it can now be applied to huge quantities of data. Cheaper data storage, distributed processing, more powerful computers and new analytical opportunities have dramatically increased interest in machine learning systems. Other reasons for the increased momentum include: maturing capabilities with methods and algorithms refactored to run in memory; the
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Tax fraud is already prevalent, and fraudsters are more sophisticated and automated than ever. To get ahead of the game in detecting fraud and protecting revenue, tax agencies need to leverage more advanced and predictive analytics. Legacy processes, systems, and attitudes need not stand in the way. To explore the challenges, opportunities, and value of tax fraud analytics, IIA spoke with Deborah Pianko, a Government Fraud Solutions Architect within the SAS Security Intelligence practice.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 11, 2017
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.