Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

automated applications

Results 1 - 25 of 27Sort Results By: Published Date | Title | Company Name
Published By: Pitney Bowes     Published Date: Apr 20, 2009
This Executive White Paper, sponsored by Pitney Bowes Marketing Solutions, a provider of web-based marketing automation solutions, examines the competitive advantages offered by marketing automation portals and the potential impact of these types of portals on marketing campaigns deployed in complex, rapidly evolving markets.
Tags : 
pitney bowes, automated portals, marketing solutions, web-based marketing, competitive advantage, portal, channel marketing, sustainable, enterprise marketing, crm systems, crm, roi, partner, secure online marketing, marketing funds management, dashboard, list management applications, urls, seo, turnkey
    
Pitney Bowes
Published By: Red Hat     Published Date: Aug 22, 2018
Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic.
Tags : 
    
Red Hat
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management, apt, automated applications
    
Venafi
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
This paper introduces five architectural principles guiding the development of the next generation data center (NGDC). It describes key market influences leading a fundamental enterprise IT transformation and the technological trends that support it. The five principles are: scale-out, guaranteed performance, automated management, data assurance, and global efficiencies. Cloud infrastructure delivery models such as IaaS, private clouds, and software-defined data centers (SDDC) are foundations for the NGDC. In an era where IT is expected to ensure productiongrade support with a plethoric flow of new applications and data, these models demonstrate how to eliminate bottlenecks, increase self-service, and move the business forward. The NGDC applies a software-defined everything (SDx) discipline in a traditional, hardware-centric business to gain business advantage.
Tags : 
    
SolidFire_NetApp
Published By: CA Technologies EMEA     Published Date: Sep 30, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : 
srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage, networking, platforms
    
CA Mainframe
Published By: VMware, Inc     Published Date: Oct 28, 2014
For organizations with disaster recovery services in place, the challenge often lies in supporting the ongoing maintenance and re-evaluating the initial investment versus newer offerings as their environment continues to expand, or leases expire. Fortunately, the landscape of disaster recovery solutions is shifting to accommodate changing IT needs. VMware vCloud® Air™ Disaster Recovery provides simple, affordable, automated processes for replicating and recovering critical applications and data — at a fraction of the cost of duplicating infrastructure or maintaining additional data centers. Organizations can afford to scale their efforts as needed, with flexible terms and resource options.
Tags : 
cloud, disaster recovery, infrastructure, automated processes, replication, networking, data center
    
VMware, Inc
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Generate rich virtual data that covers the full range of possible scenarios and provide the unconstrained access to environments needed to deliver rigorously tested applications on time and within budget. Model complex live system data and apply automated rule-learning algorithms to pay off technical debt and uncover in depth understanding of composite applications, while exposing virtual data to distributed teams on demand and avoiding testing bottlenecks.
Tags : 
virtual services, data, avoid project delays, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: IBM     Published Date: Jan 27, 2017
A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamlessly integrate with diverse technologies, from data marts to Apache Hadoop systems. And it must automatically discover, protect and monitor sensitive information as part of big data applications.
Tags : 
    
IBM
Published By: Kofax     Published Date: Sep 08, 2011
This whitepaper will review how business processes are more efficient in an electronic data environment. Enterprise Capture enables customer service improvement, cost cutting, and compliance for financial institutions such as Flagstar and Randolph Brooks Federal Credit Union (RBFCU).
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
Published By: Kofax     Published Date: Sep 08, 2011
See how some retail banks have redirected their focus to a more customer -centric approach. This whitepaper includes success stories from Banco Inversis and GMAC Commercial Mortgage Corporation (now Ally Financial) which highlight how Kofax has helped them maintain and even increase their competitive edge.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
Published By: Kofax     Published Date: Sep 08, 2011
The Kofax enterprise capture platform offers unmatched scalability from centralized to highly distributed environments, from individual desktops to enterprise deployments and from basic archival scanning to powerful document classification and separation and data extraction. The company's market leading technology supports a wide variety of input devices and line of business applications, providing a strong enterprise-wide platform on which to standardize document driven processes.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
Published By: IBM     Published Date: Sep 11, 2017
This book is written for readers who have varying levels of familiarity with ODM. It doesn’t focus on any particular vendor’s offering; instead, it talks about the features of ODM as a model for managing operational decision-making. This book isn’t about offline business intelligence systems. While those systems are very valuable, the focus of this book is on automated decisions that can be executed in real time in conjunction with your business applications and processes.
Tags : 
odm, management, operation-decision making, intelligence systems
    
IBM
Published By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
It’s probably no surprise to you that the financial services industry is changing rapidly. Digital technology is redefining the possibilities with automated processes, AI insights, customized experiences, new operating models and next-generation applications — yet global industry profits are stagnating. As the number of disruptors in the space rises, many banks are being asked to innovate while lowering structural costs and improving capital returns — and many traditional banks are falling behind.
Tags : 
    
Group M_IBM Q2'19
Published By: TeamQuest     Published Date: Sep 05, 2014
TeamQuest Director of Market Development Dave Wagner and Chris Lynn, Safeway's Capacity Manager and Performance Analyst, cover the application of automatic, exception-oriented analytics to a wide variety of IT and business metrics in order to simultaneously optimize service performance and IT cost. Multiple conceptual approaches are shared, including pros and cons. Most of the presentation includes real examples by which Safeway has integrated performance, capacity, business, and power data into an automated optimization process spanning 1000s of servers and virtual servers and their applications.
Tags : 
automated analytics, automated optimization, it cost, power data
    
TeamQuest
Published By: Aldon     Published Date: Jan 13, 2009
Learn how automated tracking can significantly cut compliance costs.
Tags : 
aldon, compliance costs, automated tracking, it compliance, automated applications, process tracking, software compliance solution, it management
    
Aldon
Published By: IBM     Published Date: Oct 01, 2012
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher
Tags : 
disaster recovery, backup and recovery, ibm power systems, automated virtualization management, virtualization, downtime, mission-critical applications, servers
    
IBM
Published By: SAS     Published Date: Mar 06, 2018
Imagine getting into your car and saying, “Take me to work,” and then enjoying an automated drive as you read the morning news. We are getting very close to that kind of scenario, and companies like Ford expect to have production vehicles in the latter part of 2020. Driverless cars are just one popular example of machine learning. It’s also used in countless applications such as predicting fraud, identifying terrorists, recommending the right products to customers at the right time, and correctly identifying medical symptoms to prescribe appropriate treatments. The concept of machine learning has been around for decades. What’s new is that it can now be applied to huge quantities of data. Cheaper data storage, distributed processing, more powerful computers and new analytical opportunities have dramatically increased interest in machine learning systems. Other reasons for the increased momentum include: maturing capabilities with methods and algorithms refactored to run in memory; the
Tags : 
    
SAS
Published By: Esker     Published Date: Dec 08, 2014
Is your company looking to gain the efficiencies and savings of automated accounts payable processing? Find out how you can: • Quickly deploy one easy, web-based AP workflow solution for all users and systems • Ensure a continuous invoice audit trail • Simplify shared services setup In this white paper, you'll learn important cost and risk factors to consider with AP tools installed inside ERP applications — especially if you have multiple ERP instances or a mix of different enterprise applications. Download the white paper to learn more!
Tags : 
automation, best practices, ap workflow, cost, erp system, data recognition, applications, invoicing, enterprise applications
    
Esker
Published By: SAS     Published Date: Jan 04, 2019
As the pace of business continues to accelerate, forward-looking organizations are beginning to realize that it is not enough to analyze their data; they must also take action on it. To do this, more businesses are beginning to systematically operationalize their analytics as part of a business process. Operationalizing and embedding analytics is about integrating actionable insights into systems and business processes used to make decisions. These systems might be automated or provide manual, actionable insights. Analytics are currently being embedded into dashboards, applications, devices, systems, and databases. Examples run from simple to complex and organizations are at different stages of operational deployment. Newer examples of operational analytics include support for logistics, customer call centers, fraud detection, and recommendation engines to name just a few. Embedding analytics is certainly not new but has been gaining more attention recently as data volumes and the freq
Tags : 
    
SAS
Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit, web security, cenzic, security, it management
    
Cenzic
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 is a comprehensive solution for software developers, network administrators and IT departments wanting to integrate automated update capabilities into their software applications and business processes. Read through a comprehensive list of features, and learn about the system requirements of TrueUpdate 2.0.
Tags : 
software development, networking, it management, indigo rose
    
Indigo Rose Corporation
Published By: SAS     Published Date: Aug 03, 2016
As the pace of business continues to accelerate, forward-looking organizations are beginning to realize that it is not enough to analyze their data; they must also take action on it. To do this, more businesses are beginning to systematically operationalize their analytics as part of a business process. Operationalizing and embedding analytics is about integrating actionable insights into systems and business processes used to make decisions. These systems might be automated or provide manual, actionable insights. Analytics are currently being embedded into dashboards, applications, devices, systems, and databases. Examples run from simple to complex and organizations are at different stages of operational deployment.
Tags : 
best practices, embedding analytics, technology, data, operational analytics
    
SAS
Published By: BlackLine     Published Date: Apr 10, 2017
For many, the idea of Robotic Process Automation (RPA) might conjure images of large automated assembly line welders and pickers. But RPA actually refers to software robots, or applications that replicate human interaction with a user interface on a computer system. Download now to learn more!
Tags : 
    
BlackLine
Previous   1 2    Next    
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.