Five Areas Every Oracle Retail Customer Should Automate

Jeff Suellentrop, Director of Enterprise Architecture at PETCO, and Matt Busch, Sr. Product Manager at UC4
As a retailer, you depend on Oracle’s sophisticated retail solution to ensure a continuous stream of revenue and good customer service. However, implementing it can be time-consuming, requiring several months or more.

Join Jeff Suellentrop, Director of Enterprise Architecture at PETCO, and Matt Busch, Sr. Product Manager at UC4, as they discuss how a single unified automation platform can automate five key areas of your Oracle Retail suite including:

1.Running multiple Oracle Retail and non-Oracle application processes
2.Oracle Retail Merchandise Operations Management
3.Managing Point-of-Sale Processing
4.Oracle Retail Merchandising Analytics
5.The Oracle Retail Template

As an added bonus all attendees will receive the complementary white paper “Optimize Performance, Reduce TCO for Oracle Retail”.
Jul 25 2012
34 mins
Five Areas Every Oracle Retail Customer Should Automate
Oracle
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2865)
  • Upcoming (85)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • Today most companies are witnessing an explosion in the amount of data that they store. According to recent estimates, large databases grow by 65% year over year and 85% of the data contained in these large databases is inactive. This often out-of-control data growth stems from a variety of sources and can have a negative impact on application performance, database management tasks, and overall total costs.

    During this webinar, learn how you can improve application performance while simplifying IT for Oracle applications with Informatica Smart Partitioning and Oracle ZS3 storage appliance.

    In this event, we will share how the combination of Oracle Tiered Storage and Informatica Data Archive Smart Partitioning:
    Reduces the cost of data by enabling storage tiering and compression of referentially intact data partitions
    Improves application performance up to a factor of 6X or more by automatically optimizing datasets for user requests
    Eliminates complex archiving strategies and provides full and rapid access to archived data from the native Oracle Application
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Security professionals are increasingly realizing that protecting executives and corporate assets requires more than just “guns and guards.” It requires a proactive strategy to identify and prevent a threat, rather than reacting to one. So how can security professionals be proactive and minimize the threats that originate from the Internet?

    In this webcast we’ll look at how you can use an individual’s online “footprint” to identify potential threats and develop a more effective security plan. We’ll also present a case study of one of our own executives and show why online threat intelligence is not the same as news alerts or monitoring social media for brand buzz.
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Email Gateway 7.6 including advanced threat defense, hybrid cloud setup and ”ClickProtect” spear phishing protection.
  • Channel
  • Channel profile
Up Down
  • Best Practices in Automating SAP and Non-SAP Processes Recorded: Nov 1 2012 34 mins
    Managing the SAP portion of your IT infrastructure has become a major challenge for many IT groups. SAP users struggle with manual interactions and custom scripts when trying to integrate SAP applications with other applications in their enterprise.

    Join Ralf Paschen, Sr. Product Manager at UC4, as he discuss how UC4’s One Automation for SAP solutions provides process-oriented integration of all SAP and non-SAP applications throughout the enterprise. Scale your business operations without adding additional staff.

    Register for this webcast and learn:

    - How you can handle aggressive growth and manage an ever increasing workload without additional staff
    - How to run multiple SAP instances and processes in sequence and in parallel, reducing job execution times.
    - Save thousands of dollars per year in licensing fees, maintenance, administrative costs, invoicing and IT time savings
    - Increase measurable ROI for all mass data processes by up to 80%.
  • Automate Ellucians Higher Education Banner with UC4 Recorded: Oct 22 2012 60 mins
    Ellucian's Banner Higher Education applications are helpful for aligning IT operations with your academic institutions’ requirements, but they can also create major challenges for your IT staff, including manual interventions for report generation, financial aid processing, and lack of visibility across your IT environment.

    Join John Sundet, Sr. Systems Analyst/Programmer at College of St. Benedict /St. John's University and Matt Busch , UC4 Sr. Product Manager; as they discuss how a unified automation platform can turn manual cross-functional Banner activities, into well-orchestrated, automated and predictable process.

    Attend this webcast and learn how an automation platform can improve your Banner applications including:


    - Streamlining finance, payroll, student, financial aid, and alumni file processing
    - Automate Banner ODS processing
    - Automating batch processes and report generation
    - Preventing server overload
    - Managing complex interdependencies across heterogeneous IT infrastructure
  • Automate your Open Solutions DNA processes Recorded: Oct 22 2012 42 mins
    If your community-based financial institution is like most, your daily business batch cycle in DNA consists of manually entering 30, 40, 50, or more jobs that must be run in the correct sequence. This process is inefficient, time consuming, and susceptible to errors.

    Join Eric Gauthier, Senior IT Systems Administrator at BECU, and Mark Romeo, UC4 Sales Engineer, as they discuss how a single unified automation solution can integrate existing applications and automate financial processes.

    Attend this webinar and learn:

    - How BECU was able to automate approximately 80 percent of their batch processing jobs
    - How to streamline Automated Clearing House (ACH) transaction processing
    - How to run DNA and non-DNA applications together
    - How an automation solution can eliminate data entry errors
  • Cut Your System Copy Time Up To 90% Recorded: Oct 1 2012 58 mins
    Join Scott Rohrbach, Deployment and Automation Engineer at Air Products and Chemicals, and Ralf Paschen, Senior Product Manager at UC4, to discover how Air Products and Chemicals optimized their SAP System Copy processes, to achieve 100% automated weekly system copy.

    In 60 minutes attendees will learn:

    - How to automate up to 90% of the system copy process
    - Why pre and post-processing is the stumbling block that trips up most IT departments — and how to dramatically improve the time
    - How a template library with predefined process flows can speed up the system copy process from your production environment to your non-production environment
  • Five Areas Every Oracle Retail Customer Should Automate Recorded: Jul 25 2012 34 mins
    As a retailer, you depend on Oracle’s sophisticated retail solution to ensure a continuous stream of revenue and good customer service. However, implementing it can be time-consuming, requiring several months or more.

    Join Jeff Suellentrop, Director of Enterprise Architecture at PETCO, and Matt Busch, Sr. Product Manager at UC4, as they discuss how a single unified automation platform can automate five key areas of your Oracle Retail suite including:

    1.Running multiple Oracle Retail and non-Oracle application processes
    2.Oracle Retail Merchandise Operations Management
    3.Managing Point-of-Sale Processing
    4.Oracle Retail Merchandising Analytics
    5.The Oracle Retail Template

    As an added bonus all attendees will receive the complementary white paper “Optimize Performance, Reduce TCO for Oracle Retail”.
  • SAP System Copy: Reduce Time, Effort, and Costs By Up to 90% Recorded: Jun 27 2012 5 mins
    In under 5-minutes we'll walk you through the steps it takes to complete a totally automatic SAP system copy, with no pre- and post-processing to chew up time and money, and no needless mistakes.
  • Five Areas Every Oracle E-Business Suite Customer Should Automate Recorded: Jun 27 2012 50 mins
    Watch RK Nageswaran, IT DBA Manager at VeriFone, and Grant Chen, UC4 Oracle Solutions Director, as they discusses how a single unified automation platform can automate five key areas of your organization including:

    1.Oracle and Non-Oracle applications
    2.Financial period close process
    3.Payroll Processing
    4.Customer Invoicing
    5.Manufacturing replenishments
Webcasts on how to automate and integrate applications
Learn how Application Automation provides your organization standardized, stable, and repeatable integrations to any new application,
database, or tool that is introduced.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Five Areas Every Oracle Retail Customer Should Automate
  • Live at: Jul 25 2012 5:00 pm
  • Presented by: Jeff Suellentrop, Director of Enterprise Architecture at PETCO, and Matt Busch, Sr. Product Manager at UC4
  • From:
Your email has been sent.
or close
You must be logged in to email this