automated it

Results 201 - 225 of 338Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Feb 10, 2016
New online/ecommerce flows and customer interactions make or break today's omni-channel customer experience. The most automated organizations have transformed business processes to understand B2B/B2C customers, channels, and costs. Leading companies (top 30% studied) successfully invest in cloud-based, customer-driven capabilities to support their omni-channel initiatives and strategies.
Tags : 
oracle, cloud based supply chain, business transformation
    
Oracle
Published By: Qualys     Published Date: Nov 05, 2013
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or a million.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security, internet security, intrusion detection, intrusion prevention, security management, vulnerability management
    
Qualys
Published By: Marathon Technologies     Published Date: Sep 18, 2009
There are many expensive, complex technologies that promise high availability for SQL. Fortunately there are also simple, automated ways to get the highest levels of protection. The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql, availability, infrastructure, network architecture, network management, server hardware, servers
    
Marathon Technologies
Published By: IEX     Published Date: May 27, 2008
Since the cost of staffing in most call centers is between 60 and 70 percent of the total budget, the incremental benefits of selecting the best solution for your operation and implementing it successfully are significant. Companies in the market for a workforce management tool today face a mind-boggling array of choices. Automated workforce management systems range from quite simplistic to highly complex, with a wide range of price tags to match. This paper will help contact center managers navigate the choices.
Tags : 
call center management, customer service, workforce management, contact management, iex, contact center, call center
    
IEX
Published By: IBM ILOG.     Published Date: Jul 14, 2009
This white paper discusses one of the most effective ways to extend CRM functionality to competitively enhance your customers' experiences. By using business rules as a non-disruptive extension to your existing CRM system, you will facilitate highly personalized, flexible and consistent interactions in real time at the point of contact. Learn more today!
Tags : 
ibm, crm, functionality, customer, efficiency, system, flexible, atm, website, automated, organization, optimization, brms, knowledge, competitor
    
IBM ILOG.
Published By: Kaseya     Published Date: Mar 01, 2010
IDC research shows that standardized IT operations processes and workflows supported by automated, integrated tools consistently save time and money while improving service levels.
Tags : 
kaseya, automated, integrated it operations, productivity, system management software, automation, operations management
    
Kaseya
Published By: Symantec     Published Date: Nov 12, 2015
By reading this whitepaper, you will gain insight into the following topics: The next steps in automated monitoring How automation can speed detection of attack attempts The role of automation as a key feature of the "20 security controls" or CSCs Practical guidelines for moving from manual to automated analysis
Tags : 
security automation, security breaches, automated monitoring, detect attack attempts, automated analysis, security
    
Symantec
Published By: nettime solutions     Published Date: Mar 04, 2014
This whitepaper covers the best practices, methods and standards for time off accruals that are affecting PTO policies and will explain how a customizable, automated time and attendance platform can provide workforce analytics and labor management solutions.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform, stratustime, workforce analytics, labor management, management solutions, pto banks, flexibility, privacy, traditional pto, bank-type pto, monitoring
    
nettime solutions
Published By: nettime solutions     Published Date: Mar 04, 2014
This webinar covers the best practices, methods and standards for time off accruals that are enhancing PTO policies nationwide, while showing you how a customizable automated time and attendance platform can provide workforce analytics and labor management solutions — all from your web-browser.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform, stratustime, workforce analytics, labor management, management solutions, pto banks, flexibility, privacy, traditional pto, bank-type pto
    
nettime solutions
Published By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : 
lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite, automated patch solution, lemss, agent communication, test groups, best practices, business intelligence, managing patches, vulnerability monitoring, remediation techniques
    
Lumension
Published By: Schneider Electric     Published Date: Aug 15, 2017
Schneider Electric is integrating datacenter infrastructure management (DCIM) software, big-data analytics and cloud services into the management of customers’ datacenters. Its recently launched StruxureOn cloud offering signals a new wave in datacenter operations, using a combination of machine learning, anomaly detection and event-stream playback to give operators real-time insights and alarming via their smartphones. More capabilities and features are planned, including predictive analysis and, eventually, automated action. Schneider’s long-term strategy is to build a partner ecosystem around StruxureOn, and provide digital services that span its traditional datacenter business.
Tags : 
incident tracking, historical trending, troubleshooting, operational analysis, prediction model, schneider equipment, maintenance, firmware updates
    
Schneider Electric
Published By: SAP     Published Date: Dec 14, 2009
Consider how you can gain control of cost structures by taking systematic steps to improve operational efficiency. By using efficient, automated processes, you can reduce waste, unnecessary overtime, and other cost factors. Integrated business software systems put this efficiency overhaul within reach, quickly, and affordably.
Tags : 
sap, efficiency, infrastructure, capital, structure, integration, automation, erp, enterprise resource planning
    
SAP
Published By: IBM     Published Date: Jul 15, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
best practices, business intelligence, ibm, finance, automated protection
    
IBM
Published By: IBM     Published Date: Jul 01, 2015
This white paper discusses how organizations can benefit from implementing collaboration and analytics processes in the three core areas
Tags : 
healthcare analytics, analytics technology, quality assurance, wellness monitoring, performance analysis, patient self-management
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat, global threat intelligence, protection, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud, security, network security
    
IBM
Published By: SAS     Published Date: Mar 06, 2018
Imagine getting into your car and saying, “Take me to work,” and then enjoying an automated drive as you read the morning news. We are getting very close to that kind of scenario, and companies like Ford expect to have production vehicles in the latter part of 2020. Driverless cars are just one popular example of machine learning. It’s also used in countless applications such as predicting fraud, identifying terrorists, recommending the right products to customers at the right time, and correctly identifying medical symptoms to prescribe appropriate treatments. The concept of machine learning has been around for decades. What’s new is that it can now be applied to huge quantities of data. Cheaper data storage, distributed processing, more powerful computers and new analytical opportunities have dramatically increased interest in machine learning systems. Other reasons for the increased momentum include: maturing capabilities with methods and algorithms refactored to run in memory; the
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Tax fraud is already prevalent, and fraudsters are more sophisticated and automated than ever. To get ahead of the game in detecting fraud and protecting revenue, tax agencies need to leverage more advanced and predictive analytics. Legacy processes, systems, and attitudes need not stand in the way. To explore the challenges, opportunities, and value of tax fraud analytics, IIA spoke with Deborah Pianko, a Government Fraud Solutions Architect within the SAS Security Intelligence practice.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 11, 2017
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys
Published By: Dell Software     Published Date: Oct 01, 2012
Finding what you need in Active Directory’s native audit log can be an awful manual-intensive nightmare. There is a better, automated way to help you take control of AD auditing. Read this paper to learn seven essential audit needs, and how Active Administrator meets them.
Tags : 
active directory, auditing, dell software, audit log, ad auditing
    
Dell Software
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : 
file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape
    
GlobalSCAPE
Published By: Mentor Graphics     Published Date: Sep 01, 2010
What Is CFA and Why Do I Need It? This five-part paper series examines the conditions that led to the development of recommended rules, and describes the process by which automated design analysis and rule verification can help designers optimize designs to the fullest and most efficient use of area, while still ensuring manufacturability.
Tags : 
mentor graphics, critical feature analysis, cfa, design for manufacturing, dfm, automated design analysis, rule verification
    
Mentor Graphics
Published By: Numara Software     Published Date: Jul 16, 2009
Find out how Numara Track-It! can help you build better processes, manage organizational knowledge and solve problems quickly. Keep issues from falling through the cracks and efficiently manage help desk requests as well as other processes that require request management: • Optimize help desk efficiency with easy to use systems • Empower customers with self service • Improve productivity with automated alerts, notifications and assignments • Reduce diagnostic time with knowledge management • Reduce resolution time with asset and work order history
Tags : 
help desk, track it, numara, customer management, best practices, customer satisfaction, self service, knowledge management, asset, work order, request management, alerts, sla, service level agreement, performance evaluation, dashboard
    
Numara Software
Published By: TeamQuest     Published Date: Nov 13, 2014
Learn how to drive success with business metrics, data, and automated forecasting and see how you can increase staff productivity and free up time for other projects.
Tags : 
teamquest, enterprise rent-a-car, business metrics, data, automated forecasting, capacity management, service optimization, itso, it analytics, show back, charge back, virtualized it
    
TeamQuest
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.