Case Study
Societe Generale Bank Brazil Uses RPA for Automatic Report Generation
Societe Generale Bank Brazil is one of the leading suppliers of financial services in Brazil. They offer consultancy and other services to both corporate and institutional clients.
On-Demand Webinar
How to Be Smart When Selecting a Job Scheduler
Watch this webinar with Fortra scheduling experts to learn which enterprise job scheduler is right for your environment.
On-Demand Webinar
The Mid-Market RPA Journey: Empowering Your Employees Through RPA Adoption
Mon, 09/16/2019
Watch as we take the fear out of automation and show you how bots aren’t here to replace employees, but to free your employees from manual, repetitive, time consuming tasks so they can focus on more strategic activities.
On-Demand Webinar
Maxmize ERP System Processes with RPA
By Pat Cameron
A lot of businesses depend on their ERP system to conduct business. Whether it’s SAP, Syspro, Microsoft Dynamics, M1, NetSuite, or another ERP, critical data is processed and stored every day. These systems are powerful for managing business processes, but the built-in capabilities aren’t enough.
So many businesses spend hours and manual effort prepping data, launching ERP procedures, and other...
On-Demand Webinar
IBM i Security for Programmers: Part 2
By Robin Tatam
IBM i security expert Robin Tatam wraps up the last session of his two-part series on IBM i security issues that native application programmers should be aware of.
On-Demand Webinar
IBM i Security for Programmers
By Robin Tatam
In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.
On-Demand Webinar
The Rise of Insider Threats and How to Prevent Them
By Bob Erdman
Watch this webinar to get actionable advice on how to keep insider threats out of your organization. Learn about important, achievable strategies
On-Demand Webinar
Top 10 Configuration Mistakes that Leave Your System Vulnerable
Tue, 07/30/2019
Learn about the top 10 IBM i security configuration errors that will leave your system—and therefore, your data and organization—vulnerable.
Case Study
Nationale-Nederlanden Brings Disparate Applications Together with RPA
Nationale-Nederlanden is a global financial services company offering medium and long-term savings and investment solutions, insurance, and pensions to more than 800,000 customers throughout Spain.
Datasheet
Robot Schedule Interface to SAP
When you need a more dynamic job scheduler for SAP processes, simply schedule recurring jobs once in the Robot Schedule interface and there’s nothing more to do, ever.
Datasheet
Robot Schedule Interface to EnterpriseOne
Enjoy more flexibility and control over scheduling Oracle JD Edwards EnterpriseOne jobs. With the Robot Schedule interface to EnterpriseOne, data selection is dynamic, making it a snap to schedule jobs to run unattended.
Case Study
SQL SCHEDULING GOES ENTERPRISE
Company Background
Frontline Technologies is a market leader in workforce management software. The Pennsylvania company serves thousands of global clients through its three applications: Aesop, an automated substitute placement and absence management system; Veritime, a time and attendance product; and Jobulator, an automatic job-notification service for substitute teachers. One in every five U.S...
Case Study
SharkNinja Uses Fresh Retail Data for Fast Decision-Making with JAMS
Company Background
SharkNinja is the maker of class-leading Shark® vacuums and steam mops, and the innovative line of Ninja® kitchen appliances. Shark® and Ninja® are two of several house-care brands developed by SharkNinja Operating LLC, a pioneer in small household appliances and cleaning solutions that fit the lifestyles of busy people.
The company’s products are widely distributed through...
On-Demand Webinar
Expert Tips for Securing AIX Systems
By Bob Erdman
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier.
One of the most serious mistakes is failing to create a well-defined security policy.
A written statement of how your...
On-Demand Webinar
Simplify Processes with PowerShell RPA
By Pat Cameron
You don't have to manually schedule PowerShell scripts anymore. Watch the webinar to learn how you can easily automate critical PowerShell processes with RPA.