Book Image

Robotic Process Automation for Developers [Video]

By : Ramesh Nougain
2 (1)
Book Image

Robotic Process Automation for Developers [Video]

2 (1)
By: Ramesh Nougain

Overview of this book

The future of work is here: digital workforces. RPA solves a major software integration problem by automating at the presentation layer. Robotic Process Automation is the automation of repetitive and rule-based human tasks working with software applications at the User Interface layer. This course aims to make you ready for new-age RPA Developer jobs in the Digital Workforce era. You will begin by learning RPA concepts and how they can benefit people at their work. Then, you will master UI automation and extract content using scraping methods. You will get to know the various recorders available in UiPath to record human actions. Finally, you will build a workflow automation and get the hang of automating Excel, PDF, e-mail and Citrix applications. By the end of the course, you'll be equipped with the knowledge and skills to apply the power of automation to your projects. The code files are placed on GitHub at this link https://github.com/PacktPublishing/Robotic-Process-Automation-RPA-for-Developers
Table of Contents (6 chapters)
Chapter 6
Automating Excel, PDF, and Email Documents
Content Locked
Section 3
Email Automation
Emails are often used as inputs and outputs of steps involved in business processes. In many places, input files are received as email attachments (.xlsx, .pdf etc). Using Email Automation, steps in processes can work with such input files and send out emails for notification, alerts, reports, etc. - Get to know UiPath activities are available for sending & receiving emails, downloading attachments, moving and deleting emails, etc - Understand that all commonly used protocols are supported for sending and receiving emails (SMTP, POP3, IMAP, Exchange, Outlook) - See how Credential Management activities are available to work with credentials from MS Credential Manager, Orchestrator Credential Asset and third-party products such as CyberArk