RSS feed Get our RSS feed

News by Topic

automated analysis

Results 1 - 18 of 18Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : social media, business intelligence, customer hub, crm, oracle
     Oracle
By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
     Splunk
By: Datawatch     Published Date: Feb 03, 2016
Some companies estimate that up to 80 percent of their analysts’ time is spent on data preparation. Thorough, automated data preparation, however, can quickly transform raw information into reliable, consistent data sets ready for analysis. This report from Gartner details why information management and business analytics leaders must introduce data preparation into their big data initiatives in order to improve both the understanding of the data, and the productivity of analysts. Read the report now to learn more.
Tags : datawatch, data preparation, data analytics, data analysis, analyst productivity, information management, business analytics, big data
     Datawatch
By: Concur     Published Date: Apr 17, 2013
In this survey report analysts examine electronic invoicing, imaging and data extraction, and automated workflow solutions at US-based enterprises. The analysis is based on over 300 survey results and more than nine years of research findings.
Tags : ap automation, accounts payable, invoice management, invoice automation, invoicing, ap report, ap study
     Concur
By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
Kinder Design Inc., a design and engineering services consulting firm, developed the Lift Top — an adjustable desktop table which enables users to comfortably work in either a sitting or standing position. With SOLIDWORKS Premium software, the firm automated the design process, cut development time and reduced the number of prototypes. This case study shares how Kinder Design implemented SOLIDWORKS Premium design and analysis software to support services and drive innovative product development.
Tags : kinder, design, solidworks, development, streamline, production
     Dassault Systemes SolidWorks Corp.
By: Esker     Published Date: Jan 06, 2014
13 Questions for Maximizing Your Order Processing Automation Investment
Tags : esker, automation, sales order processing, order-to-cash, erp systems, automated sales, automation investment, saas
     Esker
By: BlackLine     Published Date: Jun 15, 2016
Finance is shifting from traditional rigid and manual accounting processes to more automated, more flexible, and more agile cloud based systems. This shift is essential, because it provides the productivity benefits so that finance can focus more on reporting and analyzing financial performance. Download this eBook, “The Modern Approach to Closing the Books” to learn a new approach to the Record-to-Report processes - an approach in which automation, controls and period-end tasks are embedded within daily activities allowing for; more balanced workloads, time freed for analysis, current – not out of date – results, and Finance to better align with business operations.
Tags : 
     BlackLine
By: Symantec     Published Date: Nov 12, 2015
By reading this whitepaper, you will gain insight into the following topics: The next steps in automated monitoring How automation can speed detection of attack attempts The role of automation as a key feature of the "20 security controls" or CSCs Practical guidelines for moving from manual to automated analysis
Tags : security automation, security breaches, automated monitoring, detect attack attempts, automated analysis, security
     Symantec
By: AWS     Published Date: Jul 24, 2019
Trupanion, a Seattle-based medical insurance provider for cats and dogs, needed to find data insights quickly. With only 1% of pet owners insured, the process of evaluating a claim to approve or deny payment was manual and time-consuming. Building accurate predictive models for decision-making required manpower, time, and technology that the small company simply did not have. DataRobot Cloud, built on AWS, helped Trupanion create an automated method for building data models using machine learning that reduced the time required to process claims from minutes to seconds. Join our webinar to hear how Trupanion transformed itself into an AI-driven organization, with robust data analysis and data science project prototyping that empowered the company to make better decisions and optimize business processes in less time and at a reduced cost. Join our webinar to learn: Why you don’t need to be an expert in data science to create accurate predictive models. How you can build and deploy pr
Tags : 
     AWS
By: IBM     Published Date: Jul 01, 2015
This white paper discusses how organizations can benefit from implementing collaboration and analytics processes in the three core areas
Tags : healthcare analytics, analytics technology, quality assurance, wellness monitoring, performance analysis, patient self-management
     IBM
By: Mentor Graphics     Published Date: Sep 01, 2010
What Is CFA and Why Do I Need It? This five-part paper series examines the conditions that led to the development of recommended rules, and describes the process by which automated design analysis and rule verification can help designers optimize designs to the fullest and most efficient use of area, while still ensuring manufacturability.
Tags : mentor graphics, critical feature analysis, cfa, design for manufacturing, dfm, automated design analysis, rule verification
     Mentor Graphics
By: IBM     Published Date: Apr 23, 2013
Profitability analysis is important to all companies. But in times of economic uncertainty, it becomes even more critical because organizations need a comprehensive and forwardlooking view of profitability to ensure that they can remain financially viable, whatever the economic circumstances. For companies to be successful, they need automated systems that enable interactive profitability analysis that can be shared across a broad swath of users. They also need robust, advanced analytics, to provide detailed granular metrics for assessing profitability and measuring performance. IBM offers solutions that can meet those needs.
Tags : profitability, analysis, finance, projection, prediction, analytics, automation, metrics
     IBM
By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
     BlackBerry Cylance
By: Asure Software     Published Date: Nov 06, 2013
Based on third party research and our own experience, we know that organizations that have successfully implemented automated technology and reporting tools to support their HR activities have seen real workforce productivity benefits. This white paper will provide you with an in-depth analysis of the top 8 ways you can improve your workforce productivity using the latest advances in HR technology.
Tags : workforce management, workforce management solutions, workforce software solutions, workforce software, workforce productivity
     Asure Software
By: Evolveware     Published Date: Nov 06, 2006
Software analysis, documentation, migration, upgrades or replacements are daunting and risky endeavors because they are primarily manual and time-consuming. EvolveWare’s S2T Technology provides a solution to these problems with tools that automate the process up to 90%, thus reducing the time and cost of such initiatives by as much as 40-60%.
Tags : software analysis, software documentation, software migration, migration, software upgrades, patch management, s2t, software management
     Evolveware
By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
     ProofSpace
By: Oracle     Published Date: Nov 05, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : business intelligence, integrated marketing, social media strategy, content marketing, insight, social data, customer hub, social analytics
     Oracle
By: Palo Alto Networks     Published Date: Sep 30, 2016
in our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue coat, check Point, cisco, cyphort, Fidelis cybersecurity, Fireeye, Fortinet, intel Security, Palo Alto networks, lastline, and trend Micro — and researched, analyzed, and scored them.
Tags : palo alto, automated malware, security, cloud, forrester report
     Palo Alto Networks
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics