software

Results 76 - 100 of 5351Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software     Published Date: Sep 16, 2019
Los bancos de todo el mundo están apostando fuertemente a la inteligencia artificial y el machine learning a fin de obtener la ventaja tecnológica que necesitan para ofrecer servicios bancarios más personalizados, predictivos y en tiempo real. Un marco ayudará a diferenciar a los primeros ganadores y ofrecerles ventajas continuas en inteligencia. Descargue este IDC Analyst Infobrief que le permitirá conocer cómo los mejores bancos del mundo se están volviendo más personales, más predictivos, y más en tiempo real que nunca. Lo que usted conocerá: • Las ocho tendencias que reflejan el nivel de preparación de los bancos para la inteligencia conectada • Los nueve obstáculos que evitar y las nueve formas de salvar las brechas • Los elementos básicos personales, predictivos y de tiempo real de la IA y el ML para los bancos • Los líderes destacados de acuerdo con la investigación de IDC Financial Insights y sus respectivos casos de uso • Una guía esencial de IDC para los bancos líderes
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Servicios Financieros es una industria en la que la innovación siempre está presente. Los modelos de negocio transformadores como las casas de bolsa de bajo costo, los productos de inversión innovadores como los fondos de inversión cotizados, y las regulaciones estrictas como Gramm-Leach-Bliley son algunos ejemplos. Otros ejemplos incluyen: • Las nuevas firmas fintech, como la reciente inversión de nueve mil millones de dólares hecha en Ant Financial Services Group, y un sinnúmero de otras empresas emergentes similares apoyadas con capital de riesgo, están apuntando a segmentos bien establecidos de la industria de servicios financieros. • Servicios de gestores automatizados potenciados por la inteligencia artificial y el machine learning que apoyan a los asesores financieros y a los gestores de carteras • Las regulaciones y las leyes para el manejo de riesgos que cambian constantemente, como GDPR, Basilea III y Open Banking, y que transforman la manera en que se interactúa con los
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
La transformación digital de la institución de servicios financiera familiar más grande de América, con una historia que data de tres generaciones atrás. Entérese de cómo la función de los datos cambió en el banco durante la evolución de la experiencia del cliente. First Citizens Bank ha estado utilizando la integración y la tecnología analítica avanzada de TIBCO para ofrecer a sus clientes una experiencia de autoservicio consistente y continua, con el propósito de combatir el fraude y brindar servicios financieros más precisos y proactivos.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Para la mayoría de los equipos de operaciones de pago, el control de costos representa un gran dolor de cabeza -y en gran medida se origina del manejo de fraudes: • Los equipos de investigación dedican mucho tiempo solamente a reunir los datos necesarios para tomar decisiones. • Los motores de detección siempre están tratando de ponerse al día con los patrones de fraude más recientes. • Las regulaciones que cambian constantemente incrementan el tiempo y el costo necesarios para lograr el cumplimiento y cubrir los estándares de auditoría. Dado su alcance e impacto, reemplazar los sistemas de fraude centrales no es una opción para la mayoría de las empresas. Pero contrario a reemplazarlos, usted puede mejorar el proceso de investigación con la investigación aumentada, y mejorar el proceso de detección mediante el reforzamiento de los sistemas actuales. Este reporte describe tres formas en que las empresas de servicios financieros pueden utilizar las soluciones de TIBCO para reducir el
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Lo que aprenderá: • Aplicar la analítica avanzada y las técnicas de machine learning / IA a fin de optimizar procesos de manufactura complejos • De qué manera el control de procesos estadísticos de múltiples variantes puede ayudar a detectar las desviaciones en una base de referencia • Cómo monitorear el OEE en tiempo real y producir una vista de 360 grados de su fábrica Asimismo, el webinar también da cuenta de los casos de estudio de nuestros clientes que ya han implementado con éxito los modelos de optimización de procesos.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Por años, los fabricantes han estado tratando de optimizar sus procesos y cadenas de suministro asociadas creando mercados, intercambios estandarizados, y sistemas monolíticos. En muchos casos, estas soluciones no logran su objetivo, lo que da origen a procesos fragmentados y frágiles, y en los que compartir datos es complicado. Blockchain, la tecnología que está detrás de Bitcoin y otras criptomonedas, puede resolver estos problemas. Compartir información mediante una red distribuida confiable con una lógica de negocio integrada ofrece muchos beneficios al sector manufacturero, especialmente cuando se combina con las comunidades de IoT y de IA. Vea este webinar titulado Blockchain y Manufactura: Una Manera Inteligente de Elevar la Eficiencia en las Cadenas de Suministro de Semiconductores y Electrónica, conducido por Nelson Petracek, director de Tecnología de TIBCO Software. Entre los temas que se abordan se incluye: • Blockchains empresariales • Casos de uso en el sector manufactur
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
La tendencia actual en la industria de manufactura se inclina hacia los productos hechos a la medida en lotes más pequeños y con tiempos de entrega más reducidos. Con frecuencia, este cambio puede alterar la producción, lo que se deriva en un mayor tiempo de inactividad de las máquinas, costos de producción más altos, desperdicio de productos, y la necesidad de volver a producir los productos defectuosos. A fin de satisfacer la demanda de los clientes detrás de esta tendencia, los fabricantes deben cambiar rápidamente a nuevos modelos de producción. El control de calidad es el área clave que TI debe apoyar. Al mismo tiempo, el trazabilidad de los productos se vuelve vital para el cumplimiento, al igual que la calidad. La trazabilidad puede lograrse al interconectar fuentes de datos dentro de la fábrica, analizando los datos históricos para obtener conocimientos y actuar de inmediato para controlar el proceso en su totalidad. Lograrlo puede llevar a reducciones de costos importantes,
Tags : 
    
TIBCO Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Red Hat     Published Date: Jun 26, 2019
Everything changes. We are in a period of significant shifts in companies—even entire industries—demonstrated in rankings, like the Fortune Global 500. For the last century, these periods of volatility have been driven by a combination of technological change and capital expansion.1 There is obvious competition between direct, traditional market segments, but digital disruption also opens up the ability to compete and gain revenue in new areas. For example, a movie streaming service like Netflix also launches a community around the software it created to run its services, or an online retailer like Amazon also innovates with public cloud management. Innovation requires more than a slick customer user interface (UI). There has to be a foundation of technology, processes, and culture that allow an organization to be flexible, to build on its existing knowledge, and to incorporate new ideas. At a strategic level, today’s software is expected to deliver on a multitude of new and different
Tags : 
    
Red Hat
Published By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : 
akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
    
Akamai Technologies
Published By: Velaro     Published Date: Jun 11, 2014
Live Chat software can help you to increase online sales conversions and customer service productivity - if you use it correctly. To maximize your live chat ROI it's important to select the right live chat vendor. This PDF provides some essential tips that you should consider in making the best selection.
Tags : 
    
Velaro
Published By: NEC     Published Date: Aug 25, 2009
This is a case study which shows how Voorhees College implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC to provide students, faculty and staff in five locations with software-based voice and desktop communications tools to achieve a 40 percent savings over its previous traditional telephony solution.
Tags : 
voorhees, nec, desktop communications, communications, service orientated, widearea network, wan, unified communications architecture
    
NEC
Published By: Velaro     Published Date: May 06, 2014
Did you know that those who respond to a proactive online chat invitation are 6 times more likely to buy than the average website visitor? Download this paper for practical advice on using proactive chat to increase sales online sales and customer satisfaction.
Tags : 
live chat, live chat software, proactive live chat, online sales conversions, ecommerce, online customer experience, customer support productivity, online sales
    
Velaro
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Aug 20, 2008
A forward-looking CMDB does more than keep an organization's IT operations running. It draws clear connections between IT components and business services, which is the core of Business Service Management (BSM). But even more critical than the CMDB's ability to support business as it is now, is the question of how well it will drive business innovation in the future.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Aug 04, 2009
Businesses expect IT management to demonstrate their contributions to end-user benefits and the bottom line while addressing immediate needs and long-term performance management goals. This white paper presents IT2020, a new performance management paradigm for meeting both of these expectations.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Aug 10, 2008
Over the past ten years, IT personnel costs have risen faster than hardware and software investments. IT services have not improved process-wise and still require as much manpower, if not more, to operate now as they did in the past. As firms spend 76% of their IT budget on maintenance and support, they will naturally invest in BSM solutions that will reduce costs, enable ITIL, and provide an optimal ROI.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 30, 2008
In order to provide high quality, cost effective business services in complex, distributed environments, improved IT management strategies are required. Business Service Management (BSM) is a strategic approach to managing IT services in support of improved business performance.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob
    
ASG Software Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.