IBM Machine Learning for z/OS® brings AI to transactional applications on IBM zSystems. It can embed machine learning and deep learning models to deliver real-time insight, or inference every transaction with minimal impact to operational SLAs.
Search Results
Listings (5,001-5,025 of 10,000)
Sage Fixed Assets provides simplified fixed-asset tracking with comprehensive depreciation calculations, including over 300,000 U.S. and Canadian regulations for businesses, governments and nonprofits.
Kofax SignDoc is an enterprise-level electronic signature solution for the cloud that has functionality for complete signing scenarios. It helps organizations remove the need for capturing wet ink signatures on paper documents, helping them to achieve goals like cutting operational costs, speeding u…
Modus (formerly App Data Room) is designed to drive sales success, by helping customers create and distribute content for the most critical moments of their sales process. The vendor boasts more than 120,000 sales and marketing professionals are using Modus to conduct 250,000 Critical Customer Conve…
DATABASICS is a web-based time tracking and project management solution for freelancers, employees, and small companies alike used to track time on projects without the need to install software. Time tracking, time sheets, and time management are notoriously time consuming and inefficient. DATABASI…
Retainly is an automated engagement platform that helps businesses maximize customer retention. The app enables users to automate emails, web push notifications, and SMS messages to retain customers and drive lifetime value. Retention & LTV: Increasingly business leaders are expecting marketin…
CIENCE GO Digital enables targeted ads to be served -- down to the individual contacts in an Ideal Customer Profile. Boasting pinpoint accurate data, CIENCE GO Digital is a Demand Side Platform, with DSP features that include: Comprehensive advertising coverage at auction prices.Display, Audio (Pod…
Adobe Send & Track (formerly SendNow) is Adobe's managed file transfer system.
TemplateToaster is website template and theme generating software. It is developed by AcrossSoft, a software development company in New York, NY. The software is a desktop based application and generates templates or themes for content management systems such as WordPress, Joomla, Drupal, Magento, a…
DonorDock in Fargo offers their eponymous CRM, a solution designed to help Nonprofits save time and raise more funds with a centralized system of record and fundraising toolset.
Access Auditor from UK-based company SCC is an identity management and user provisioning solution.
Propellerhead Software headquartered in Stockholm offers Reason, the company's flagship digital audio workstation and audio editing application.
Barracuda Content Shield and Content Shield Plus for MSPs are cloud-based service that combines robust content filtering, file-based protection, granular policy enforcement and reporting, simple centralized management, and real-time threat intelligence to protect users and organizations. Its proxy-f…
Unifyed Student – Engage helps institutions communicate with students and provide them with a personalized campus experience. It enables students to stay engaged with the campus community and provides them with access to services that can help them graduate. Content ManagementUnifyed Student - Engag…
Delta sales app is an application that helps track the user's sales force and increase their productivity. The app can be used by distributors, retailers, dealers, or any other team of salespeople to monitor field performance in real-time. It's a solution for sales team management that offers featur…
Nvoicepay headquartered in Beaverton offers accounts payable automation, and vendor payment data management to enterprises.
Arcserve backup appliances are presented by the vendor as combining enterprise-ready software and industrial-grade hardware united, to create turnkey backup appliances for disaster recovery (DR) and application availability – now with Sophos Intercept X Advanced for defense against malware, exploits…
HID Global offers the HID SAFE suite of physical identity and location and visitor management system, designed to prevent unauthorized access to secure areas, a web-based solution which includes capabilities for visitor pre-registration, security and background checks, access authorization, check-in…
Webeo is a B2B website personalization solution. The platform leverages an IP database to personalize the user's website to audience sectors in real time. Without knowing who the visitor is, the vendor states Webeo users get a competitive edge from the first interaction. Deliver relevant messages, c…
foundU is a payroll automation and HRIS solution from the company of the same name in Queensland, presented as an end-to-end cloud system featuring employee self-service, roster costing and efficiency management, and comprehensive reporting capability.
First Advantage in Atlanta delivers comprehensive background check solutions and insights that enable employers and housing providers to make confident choices, reduce risk, and maintain compliance.
Trend Micro PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware of. Its web reputation technology blocks malicious links from entering web portals, while its content…
Deliforce's is a delivery management software designed to offer local delivery businesses the tools they need to run a successful delivery business with features like driver tracking, restaurant food deliveries management, transportation/logistics tracking, courier and dispatching services.
Bilflo provide staffing firms the option to use their existing ecosystem and take advantage of automation software. With Bilflo, users can automate a back office, interface a front office (ATS, CRM) with back office processes (Time Management, Payroll, Accounting). and access needed business intelli…
As a network-based threat detection solution, Attivo BOTsink stands guard inside the business network, using high-interaction deception and decoy technology to lure attackers into engaging and revealing themselves. Through misdirection of the attack, the vendor states organizations gain the advantag…