People having only a passing familiarity with robotic process automation (RPA) may primarily associate the technology with one type of situation. The common RPA scenario involves a person performing a repetitive, computer-based task using keyboard entries and mouse movements. By enlisting an RPA tool to record those manual actions, the person can create a software robot, or bot, to automate the task. When the need to perform the task arises, the user initiates the automation and continues to do other work while the bot operates in the background.\nThis type of RPA application \u2013 called an \u201cattended\u201d bot \u2013 is often the first guise that RPA assumes within an organization. In essence, the attended bot functions as a personal assistant that can offload and expedite many rote and tedious tasks.\nThe individual tasks performed by attended bots may be quite simple, but their value lies in their volume. If hundreds or thousands of manual processes can be automated, the impact enterprise wide in time saved and reapplied \u2013 as well as in errors avoided \u2013 can be huge.\nAs RPA technology has matured and grown more sophisticated, however, it is also being used to automate tasks that require little or no human interaction. Such \u201cunattended\u201d bots are being used within many organizations to perform a wide range of back-end and often complex workflows. Those automated processes can range from financial processing to report generation to IT infrastructure reconfigurations.\nBoth attended and, especially, unattended bots require RPA platforms that can easily integrate with and leverage a wide range of software applications and services. If IT departments needed to custom-build interfaces with every system a bot-driven process spanned, the costs and hassles of deploying RPA solutions would quickly eclipse the benefits.\nIn the real world, of course, even a process designed to be fully automated may sometimes require human intervention and judgement. One example might be an automated cybersecurity process that monitors network traffic, searching for patterns that are known cyberattack signatures.\nIf a pattern similar to, but not exactly like, a known signature appears, an unattended bot might flag the potential risk for evaluation and action by a security analyst. Ideally, the analyst\u2019s assessment and actions would then be used to educate the bot so that it could automatically handle a similar event in the future.\nEvery organization will have a mixture of attended and unattended automations, with some attended processes likely to evolve into unattended processes over time as users become more comfortable with RPA\u2019s capabilities and reliability. As such, any holistic RPA solution must be able to accommodate, and integrate, both attended and unattended processes.\nUiPath offers a multifaceted RPA platform that makes it easy to create, manage, and modify attended, unattended, and hybrid bots. For further information, go here.