automated

Results 101 - 125 of 630Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Aug 07, 2017
Protect Your Business with End-to-End Automated Network Security
Tags : 
    
Juniper Networks
Published By: VMware     Published Date: Jul 24, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
    
VMware
Published By: Progress     Published Date: Mar 06, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : 
data driven marketing, buyer behavior, buyer interactions, web content management, content management systems
    
Progress
Published By: Progress     Published Date: Oct 09, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : 
    
Progress
Published By: CA Technologies     Published Date: Aug 22, 2017
CA Dynamic Capacity Intelligence from CA Technologies is an easy-to-use, fully automated and intelligent capacity management and realtime dynamic capping solution. The solution is designed to streamline your ability to monitor and effectively manage SLAs and improve operational efficiency. It helps IT to achieve rapid value by enabling priority mainframe workloads to the required capacity to meet SLAs while at the same time helps remove the guesswork for MLC pricing.
Tags : 
management, sla, application delivery, workload, mainframe, lpar boundaries, ca technologies
    
CA Technologies
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia
Published By: ServiceNow     Published Date: Aug 20, 2018
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 22, 2018
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
service, business, infrastructure, remotely, servicenow
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 22, 2018
Achieving complete visibility into your infrastructure requires reliable configuration data. With a solid plan, you can have a healthy CMDB and provide a foundation for implementing automated discovery. Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.
Tags : 
cmdb, servicenow, discovery, infrastructure, data, visibility
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 13, 2019
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 13, 2019
Achieving complete visibility into your infrastructure requires reliable configuration data. With a solid plan, you can have a healthy CMDB and provide a foundation for implementing automated discovery. Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: May 14, 2019
Achieving complete visibility into your infrastructure requires reliable configuration data. With a solid plan, you can have a healthy CMDB and provide a foundation for implementing automated discovery. Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.
Tags : 
    
ServiceNow
Published By: TIBCO Software     Published Date: Aug 15, 2018
World leader in design and manufacture of innovative sensing solutions that enhance safety, security, and energy efficiency. For this manufacturers of high-tech imaging systems, monitoring accuracy and product quality are critical. Any quality problem could mean a part fails sooner than expected, or triggers a false alarm at a customer site that causes unnecessary panic. By setting up automated manufacturing analytic workflows with the TIBCO StatisticaTM platform, the company can complete complicated processes in just a few minutes and improve product quality by decreasing the variability of everything they produce.
Tags : 
    
TIBCO Software
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
    
Splunk
Published By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : 
data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics, database transactions, streaming environments, real-time data replication, data configuration
    
Attunity
Published By: Intel     Published Date: Dec 13, 2018
In today’s world, advanced vision technologies is shaping the next era of Internet of Things. However, gathering streaming video data is insufficient. It needs to be timely and accessible in near-real time, analyzed, indexed, classified and searchable to inform strategy—while remaining cost-effective. Smart cities and manufacturing are prime examples where complexities and opportunities have been enabled by vision, IoT and AI solutions through automatic meter reading (AMR), image classification and segmentation, automated optical inspection (AOI), defect classification, traffic management solution—just to name a few. Together, ADLINK, Touch Cloud, and Intel provide a turnkey AI engine to assist in data analytics, detection, classification, and prediction for a wide range of use cases across a broad spectrum of sectors. Learn more about how the Touch Cloud AI brings cost savings, operational efficiency and a more reliable, actionable intelligence at the edge with transformative insi
Tags : 
    
Intel
Published By: HP Inc.     Published Date: Jun 12, 2018
You can stop waiting for what’s next in 3D printing. With the HP Jet Fusion 300/500 series of 3D printers, HP has redefined the process of prototyping and manufacturing. We invite you to explore how to make functional parts faster, cost-effectively, and in full color with HP Jet Fusion 3D devices. HP is what’s next for automated, in-house production. Visit the website to learn more
Tags : 
    
HP Inc.
Published By: VMWare EMEA     Published Date: Oct 23, 2017
The enhanced performance that results from the DevOps approach has been proven to have a big impact on the overall performance of the business, with faster, more reliable software delivery, consequent cost savings, and faster time to value. Now that cloud is an integral element of the enterprise, automation of cloud management is key, and feeds into the DevOps approach. VMware offers your IT organization the opportunity to become DevOps-ready, using the GUI and API-led approach to enable an automated self-service infrastructure.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 28, 2019
US Based multinational technology conglomerate were having too many business critical incidents and lot of manual efforts. Leveraging LTI’s Mosaic Discovery solution various issues were detailed out accordingly to identify impacting business processes. Download complete case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: athenahealth     Published Date: Apr 30, 2013
Our web-based patient communication system and services go well beyond medical scheduling software by improving all patient interactions outside of the office. Learn how physicians can communicate with patients online and improve their bottom lines with our unique approach to medical scheduling software and other automated messaging services.
Tags : 
healthcare, medical, hitech act, ehr, patient engagement, practice efficiency, self-pay collections
    
athenahealth
Published By: athenahealth     Published Date: Sep 05, 2013
The large family practice located near Boston, MA leverages athenaCommunicator, an on-demand, automated and live patient communication service that supports and streamlines patient-physician interactions outside the exam room.
Tags : 
athenahealth, suite of services, athenacommunicator, live patient communication service, patient-physician interactions
    
athenahealth
Published By: GetWellNetwork, Inc.     Published Date: Feb 22, 2014
Managing pain is vital to how hospitals are measured on patient satisfaction. Learn how a hospital uses an interactive patient care solution to streamline pain feedback, integrating with an EMR, nursing notification and pharmacy dispensing systems.
Tags : 
hcahps, pain management, pain control, integration, patient satisfaction, emr, outcomes, press ganey, pharmacy, care coordination, hit, nursing communications, automated documentation, emr, electronic medical record, patient education, pain assessment, patient engagement, interactive patient care
    
GetWellNetwork, Inc.
Published By: Hitachi Vantara     Published Date: Mar 21, 2018
Challenge: Ensure that technology infrastructure will support business transformation, new growth and services. Solution: Implement highly automated converged infrastructure and managed cloud services from Hitachi Vantara. Outcomes: Use new capabilities to integrate acquired companies, deploy next-generation security and speed time to the market.
Tags : 
    
Hitachi Vantara
Published By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : 
mdm, big data, automation, organization
    
IBM
Published By: Juniper Networks     Published Date: Feb 01, 2016
In this paper from TechTarget you will examine: The six key considerations for building security into your architecture The value of an integrated and automated security strategy How the Juniper Unite architecture enables it all
Tags : 
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee