rules

Results 251 - 275 of 285Sort Results By: Published Date | Title | Company Name
By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe, citrix, xactis
     Xactis
By: Xactis     Published Date: Feb 05, 2007
Learn the ‘bottom-up’ approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.
Tags : soa, service oriented architecture, service-oriented architecture, business rules extracting, software development, c++, quality assurance, legacy system, xactis
     Xactis
By: ElcomSoft     Published Date: Dec 06, 2007
These days we’re always hearing about the "information age," "information technology," and how "information rules the world." We have come to feel that information is everything. But what does that mean, and is information in itself so important? Not completely. We need information to make decisions – that's what is truly important. A proper decision lights the way to success in any situation. That's why having access to information is a competitive advantage in any business environment.
Tags : passwords, password, password protected, password management, access control, data protection, information management, elcomsoft
     ElcomSoft
By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
     LogRhythm
By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : aprimo, marketing process, financial control, digital asset management, data management
     Aprimo, Inc.
By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
     IBM ILOG.
By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
     IBM ILOG.
By: Athena Security     Published Date: Nov 20, 2009
This paper presents some techniques to cleaning up the rule base along with an effective solution that addresses these automatically for you using Athena FirePAC for Firewall Rule Cleanup.
Tags : firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
     Athena Security
By: Athena Security     Published Date: Nov 20, 2009
Making routine changes to the infrastructure should not be an additional source of stress, but with the additional roles of monitoring and troubleshooting often times it is. The reasons for this added stress are described in this paper along with an effective solution for addressing these problems using SolarWinds Orion Network Configuration Manager (NCM) and Athena FirePAC for firewall analysis.
Tags : solarwinds, solarwinds orion, solarwinds ncm, firewall management, firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
     Athena Security
By: Bazaarvoice     Published Date: Nov 08, 2010
Today's UK shopper is an "empowered" consumer. This new breed of consumer is changing the rules of engagement for retailers simply by the power they possess in managing their own shopping experiences. Shoppers can easily access competing stores, brands, and products as part of their product research-whether it be online or on their mobiles.
Tags : bazaarvoice, engagement, empowerment, uk shopper, channel switch, ecommerce, mobile phones, mobile marketing, wireless
     Bazaarvoice
By: SAS     Published Date: Aug 03, 2016
Banks and financial institutions have faced a spate of regulations centered on capital adequacy since the financial crisis started in 2008. The Basel Committee on Banking Supervision (BCBS) initiated a series of reforms to strengthen risk, capital and liquidity rules across banks. Among the important changes recommended are new rules for calculating Tier I and Tier II capital and the inclusion of additional risk measurement components for market risk, liquidity risk and counterparty risk. Despite these changes, a key drawback of the Basel framework is its focus on historical capital adequacy. While being useful, it does not help assess the impact of stress events on banks from an ex-ante basis. Hence regulatory agencies in several jurisdictions have mandated banks to define a forward-looking capital plan that incorporates stress scenarios.
Tags : best practices, business management, finance, banking, financial crisis
     SAS
By: Tavant Technologies     Published Date: Sep 21, 2010
Integrated and closed-loop warranty management strategy to significantly reduce the total warranty spend and reserves, improve product quality, and increase end-customer satisfaction
Tags : warranty white paper, warranty solution, warranty management, warranty integration, cross-functional warranty, warranty cost reduction, warranty intelligence, warranty analysis, warranty challenges, warranty business rules, warranty automation, warranty benchmarking, warranty best in class, warranty improvement
     Tavant Technologies
By: Intacct Corporation     Published Date: Jul 13, 2011
A good financial and accounting system should propel your business forward. It should give you the specific insights you need to spot the storms ahead, help you maximize resources with streamlined processes, and be nimble enough to help you navigate the changing currents of today's business environment. Download this white paper to make sure you have the facts straight about what to look for-and what to look out for.
Tags : intacct, geni whitehouse, accounting system, investment, gaap, ifrs accounting standards, navigation system, books, currencies, log
     Intacct Corporation
By: Ameriteck Web Services     Published Date: Feb 18, 2011
You want a firm that can understand your business rules and your customer demands and implement it the right way. You want a firm that has an experience and proven track records into the e-Business industry. AWS has it all!
Tags : website design, ecommerce websites, ecommerce solution, free quote for website design, website design quote, custom website design, business website design, retail ecommerce solution, small business website design
     Ameriteck Web Services
By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
     dvsAnalytics
By: Mobile PRM     Published Date: May 18, 2011
This eBook offers the exclusive and critical rules for using the power of mobile to transform your patient relationships.
Tags : mobile health, mhealth, ehealth platform, pharmaceutical marketing, patient-centric, mobile health technology
     Mobile PRM
By: Urban Airship     Published Date: Jun 20, 2012
Push is a permission-based, staggeringly powerful mobile customer communication channel. Learn the "7 Rules of Good Push", in this useful primer, from Urban Airship, the world's largest provider of push messaging. A must-read for marketers everywhere!
Tags : push, push communications, push messaging, push notifications, mobile communications, smartphone alerts, smartphone push, push messages, permission-based mobile communications, mobile customer loyalty, push applications, mobile apps, mobile messaging, good push, mobile customer communications, personalized mobile alerts, social push, mobile marketing
     Urban Airship
By: Urban Airship     Published Date: Mar 15, 2013
Push is a powerful, permission-based, mobile customer communication channel. Leveraging push effectively inherently demands particular rules of engagement. Learn the “7 Rules of Good Push” in this useful primer from Urban Airship.
Tags : customer engagement, push messaing, mobile marketing, mobile, smartphone, good push
     Urban Airship
By: Sage     Published Date: Jul 30, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : sage, compliance, workforce, fines, reporting, mandates
     Sage
By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies, mitigating risk, pum, security
     NETIQ
By: OutSystems     Published Date: Jan 29, 2014
11 Usability Rules for IT Developers
Tags : outsystems, usability, apps, it developers, outsystems platform, usability principles, it management
     OutSystems
By: Dyn     Published Date: Mar 30, 2016
Most organizations today are moving at least some of their infrastructure to the cloud. A cloud or hybrid cloud approach often requires constant monitoring, planning, testing and optimizing to keep a consistent, reliable, always available web experience. Read this O’Reilly report to learn the latest rules and recommendations to architecting your cloud instance, debunk the common fears to cloud adoption and discover how to gain back control in areas you didn’t realize you could.
Tags : dyn, cloud, performance optimization, cdn, rum
     Dyn
By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : data security, byod, corporate security, mobile data security, user experience, security, it management, data management
     IBM MaaS360
By: Tyco Integrated Security     Published Date: Sep 10, 2015
Want to appeal to financial executives? Dial up the logic. Financial executives differ from almost every other line of business (LOB) executive when it comes to decision-making, according to a new study conducted by the FORTUNE Knowledge Group in collaboration with gyro. While executives in most other industries are moving toward a more innate approach to decision-making, this group relies primarily on logic to guide their decisions. Understanding the differences between what financial executives look for in partnering with companies and what their peers value is key to developing messaging that appeals to this unique segment.
Tags : 
     Tyco Integrated Security
By: Workforce Software     Published Date: Nov 23, 2015
Access this white paper to learn how WorkForce Software’s EmpCenter suite meets the needs of global employers by automating organizational policies in alignment with national and local labor laws, as well as internal policies and union rules. You’ll learn: The challenges associated with overlapping and ambiguous labor regulations WorkForce Software’s approach to meeting the needs of global companies How WorkForce Software applies regulatory updates to the EmpCenter suite Which compliance regulations are covered in EmpCenter’s preconfigured solutions
Tags : labor compliance, multinational organizations, global employers, automation, labor laws, union rules, compliance, labor regulations
     Workforce Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com