RecruitingBlogscom

Follow Us:

 

rules

Results 251 - 275 of 279Sort Results By: Published Date | Title | Company Name
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : 
ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
    
IBM ILOG.
Published By: Athena Security     Published Date: Nov 20, 2009
This paper presents some techniques to cleaning up the rule base along with an effective solution that addresses these automatically for you using Athena FirePAC for Firewall Rule Cleanup.
Tags : 
firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
    
Athena Security
Published By: Athena Security     Published Date: Nov 20, 2009
Making routine changes to the infrastructure should not be an additional source of stress, but with the additional roles of monitoring and troubleshooting often times it is. The reasons for this added stress are described in this paper along with an effective solution for addressing these problems using SolarWinds Orion Network Configuration Manager (NCM) and Athena FirePAC for firewall analysis.
Tags : 
solarwinds, solarwinds orion, solarwinds ncm, firewall management, firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
    
Athena Security
Published By: Bazaarvoice     Published Date: Nov 08, 2010
Today's UK shopper is an "empowered" consumer. This new breed of consumer is changing the rules of engagement for retailers simply by the power they possess in managing their own shopping experiences. Shoppers can easily access competing stores, brands, and products as part of their product research-whether it be online or on their mobiles.
Tags : 
bazaarvoice, engagement, empowerment, uk shopper, channel switch, ecommerce, mobile phones, mobile marketing, wireless
    
Bazaarvoice
Published By: SAS     Published Date: Aug 03, 2016
Banks and financial institutions have faced a spate of regulations centered on capital adequacy since the financial crisis started in 2008. The Basel Committee on Banking Supervision (BCBS) initiated a series of reforms to strengthen risk, capital and liquidity rules across banks. Among the important changes recommended are new rules for calculating Tier I and Tier II capital and the inclusion of additional risk measurement components for market risk, liquidity risk and counterparty risk. Despite these changes, a key drawback of the Basel framework is its focus on historical capital adequacy. While being useful, it does not help assess the impact of stress events on banks from an ex-ante basis. Hence regulatory agencies in several jurisdictions have mandated banks to define a forward-looking capital plan that incorporates stress scenarios.
Tags : 
best practices, business management, finance, banking, financial crisis
    
SAS
Published By: Tavant Technologies     Published Date: Sep 21, 2010
Integrated and closed-loop warranty management strategy to significantly reduce the total warranty spend and reserves, improve product quality, and increase end-customer satisfaction
Tags : 
warranty white paper, warranty solution, warranty management, warranty integration, cross-functional warranty, warranty cost reduction, warranty intelligence, warranty analysis, warranty challenges, warranty business rules, warranty automation, warranty benchmarking, warranty best in class, warranty improvement
    
Tavant Technologies
Published By: Intacct Corporation     Published Date: Jul 13, 2011
A good financial and accounting system should propel your business forward. It should give you the specific insights you need to spot the storms ahead, help you maximize resources with streamlined processes, and be nimble enough to help you navigate the changing currents of today's business environment. Download this white paper to make sure you have the facts straight about what to look for-and what to look out for.
Tags : 
intacct, geni whitehouse, accounting system, investment, gaap, ifrs accounting standards, navigation system, books, currencies, log
    
Intacct Corporation
Published By: Ameriteck Web Services     Published Date: Feb 18, 2011
You want a firm that can understand your business rules and your customer demands and implement it the right way. You want a firm that has an experience and proven track records into the e-Business industry. AWS has it all!
Tags : 
website design, ecommerce websites, ecommerce solution, free quote for website design, website design quote, custom website design, business website design, retail ecommerce solution, small business website design
    
Ameriteck Web Services
Published By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : 
hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
    
dvsAnalytics
Published By: Mobile PRM     Published Date: May 18, 2011
This eBook offers the exclusive and critical rules for using the power of mobile to transform your patient relationships.
Tags : 
mobile health, mhealth, ehealth platform, pharmaceutical marketing, patient-centric, mobile health technology
    
Mobile PRM
Published By: Urban Airship     Published Date: Jun 20, 2012
Push is a permission-based, staggeringly powerful mobile customer communication channel. Learn the "7 Rules of Good Push", in this useful primer, from Urban Airship, the world's largest provider of push messaging. A must-read for marketers everywhere!
Tags : 
push, push communications, push messaging, push notifications, mobile communications, smartphone alerts, smartphone push, push messages, permission-based mobile communications, mobile customer loyalty, push applications, mobile apps, mobile messaging, good push, mobile customer communications, personalized mobile alerts, social push, mobile marketing, sales
    
Urban Airship
Published By: Urban Airship     Published Date: Mar 15, 2013
Push is a powerful, permission-based, mobile customer communication channel. Leveraging push effectively inherently demands particular rules of engagement. Learn the “7 Rules of Good Push” in this useful primer from Urban Airship.
Tags : 
customer engagement, push messaing, mobile marketing, mobile, smartphone, good push
    
Urban Airship
Published By: Sage     Published Date: Jul 30, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
sage, compliance, workforce, fines, reporting, mandates, human resources
    
Sage
Published By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies, mitigating risk, pum, security
    
NETIQ
Published By: OutSystems     Published Date: Jan 29, 2014
11 Usability Rules for IT Developers
Tags : 
outsystems, usability, apps, it developers, outsystems platform, usability principles, it management
    
OutSystems
Published By: Dyn     Published Date: Mar 30, 2016
Most organizations today are moving at least some of their infrastructure to the cloud. A cloud or hybrid cloud approach often requires constant monitoring, planning, testing and optimizing to keep a consistent, reliable, always available web experience. Read this O’Reilly report to learn the latest rules and recommendations to architecting your cloud instance, debunk the common fears to cloud adoption and discover how to gain back control in areas you didn’t realize you could.
Tags : 
dyn, cloud, performance optimization, cdn, rum
    
Dyn
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : 
data security, byod, corporate security, mobile data security, user experience, security, it management, data management
    
IBM MaaS360
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Want to appeal to financial executives? Dial up the logic. Financial executives differ from almost every other line of business (LOB) executive when it comes to decision-making, according to a new study conducted by the FORTUNE Knowledge Group in collaboration with gyro. While executives in most other industries are moving toward a more innate approach to decision-making, this group relies primarily on logic to guide their decisions. Understanding the differences between what financial executives look for in partnering with companies and what their peers value is key to developing messaging that appeals to this unique segment.
Tags : 
    
Tyco Integrated Security
Published By: Workforce Software     Published Date: Nov 23, 2015
Access this white paper to learn how WorkForce Software’s EmpCenter suite meets the needs of global employers by automating organizational policies in alignment with national and local labor laws, as well as internal policies and union rules. You’ll learn: The challenges associated with overlapping and ambiguous labor regulations WorkForce Software’s approach to meeting the needs of global companies How WorkForce Software applies regulatory updates to the EmpCenter suite Which compliance regulations are covered in EmpCenter’s preconfigured solutions
Tags : 
labor compliance, multinational organizations, global employers, automation, labor laws, union rules, compliance, labor regulations, human resources
    
Workforce Software
Published By: FICO     Published Date: Nov 10, 2015
"Ever wonder how FICO Blaze Advisor moved a US Insurance Company from 100% manual to 99% automated underwriting? FICO Blaze Advisor decision rules management system created a central, standardized and user friendly system for ACG Michigan"
Tags : 
    
FICO
Published By: FICO     Published Date: Sep 02, 2016
The unifying concept that defines FICO and its substantial technology and solutions stack is Decision Management. This term has not yet become mainstream - but it will. All business analytics activities are performed with the single aim of improving the accuracy and efficiency of business decisions. This applies to business intelligence, data visualization, data mining, business rules management, and many other forms of analysis. Unifying these activities under a single discipline means that currently fragmented analytical efforts can be combined into a single whole, with benefits that will be discussed in this review.
Tags : 
    
FICO
Published By: Thomson Reuters     Published Date: Mar 08, 2018
Many seasoned attorneys will agree that remediating an enormous amount of documentation to ensure regulatory compliance is no easy feat. The volume of repapering necessary for compliance with the new rules governing margin requirements for non-centrally cleared derivatives (UMR) presented new challenges, exposed structural weaknesses, and provided many lessons learned which can be applied to any documentation remediation effort. Many UMR initiatives suffered significant hurdles that contributed to delays and missed deadlines. Common among the various challenges faced were the dearth of talent in the quantities needed, and the limited technology and data management solutions utilized.
Tags : 
legal. umr, project, management, alsp, thomson, reuters
    
Thomson Reuters
Published By: KPMG     Published Date: Sep 21, 2017
Drive change or be changed. KPMG’s 2017 HR Transformation Survey reveals organizations divided into two camps: one half ‘enlightened’ and boldly engaged on strategic HR transformation, the other half ‘unenlightened’ and faltering amid uncertainty as the digital era redefines the world around them and dramatically rewrites the rules for success. View now.
Tags : 
    
KPMG
Published By: IBM     Published Date: Apr 20, 2017
Learn how to protect corporate data when users use personal devices for work. The rapid proliferation of mobile devices entering the workplace appears to be like divine intervention to many IT leaders. Mobile devices and their apps have transformed the way we live – how we communicate, travel, shop, work and so much more. This mobility transformation has been so radical, so revolutionary, that it is hard to imagine life without these devices. Bring Your Own Device (BYOD) was born and employees followed with fervor.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top