ibm

Results 3951 - 3975 of 4273Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 07, 2012
You need a single view of the customer, inventory orders and shipments everywhere - across all channels, from order initiation through to fulfillment, including returns. So you know exactly what you need, where you need it and when. Access the perfect order briefcase to learn how you can achieve.
Tags : 
commerce, ibm, inventory, customer, cross channel, sales, business technology
    
IBM
Published By: IBM     Published Date: Jul 13, 2012
This white paper examines the changing nature of the workplace and the demands it places on IT managers for faster delivery of high-quality, flexible services while providing a quick return on IT investment.
Tags : 
ibm, technology, security, white paper, management, it managers, productivity, workplace, business technology
    
IBM
Published By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : 
security, cloud, ibm, access management, identity management, governance, risk management, compliance
    
IBM
Published By: IBM     Published Date: Jan 25, 2013
Educating Everyone To Guard the Cloud
Tags : 
security, cloud, ibm, access management, identity management, governance, risk management, compliance
    
IBM
Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention
    
IBM
Published By: Workday     Published Date: Sep 13, 2018
Finance teams are helping businesses prepare and compete in the age of disruption. But how? In this webinar, Argyle, IBM, and Workday discuss how finance leaders are using innovative technologies and smarter talent to increase customer and employee engagement, drive efficiency, and enable finance to be a strategic partner despite disruption. Watch the webinar replay now.
Tags : 
    
Workday
Published By: SilverSky     Published Date: May 22, 2014
Are you looking for a Microsoft Hosted Exchange Provider? Want to see how the providers in this space stack up? The Radicati Group provides vendor analysis and reveals the Trail Blazers, Specialists, Mature Players and Top Players in this report.
Tags : 
silversky, ibm, microsoft hosted exchange, microsoft hosted exchange providers, email service providers, cloud, cloud business email providers, cloud business email, business technology
    
SilverSky
Published By: IBM     Published Date: Apr 04, 2013
What is a workload-optimized system? Simply put, it is one that matches architecture to the needs it is purchased for. Systems performance is no longer defined only by the fastest processor or other leading benchmarks, but rather by the ability to deploy new services faster, with higher quality, and within financial objectives. Commoditization has led some to think that financial objectives will lead to Intel-based systems for all uses. In this Advisory, we show that this is not the case, and by way of example, we demonstrate how Power Systems can be less expensive for ongoing operational costs and initial outlay.
Tags : 
business value, processor, new services faster, higher quality, financial objectives, intel-based, commoditization
    
IBM
Published By: HP and Intel ®     Published Date: May 06, 2013
The objective of this white paper is to provide IT executives and UNIX subject matter experts (SMEs) with a high level comparison of the UNIX virtualization offerings from HP for Integrity and HP-UX1 vs. IBM for Power and AIX. To assist in making a balanced comparison, this paper provides: - A high-level, feature-to-feature comparison of key areas of virtualization and virtualization management. - Modular table-based comparisons. - Information from publicly available resources.
Tags : 
    
HP and Intel ®
Published By: IBM     Published Date: Sep 06, 2013
In this IBM security report, we will take a look at the data we've gathered through our monitoring operations and the security intelligence generated by our analysts and incident response teams who interpret that data. Our aim is to help you gain important insights into the current threat landscape - with a close look at the volume of attacks, the industries most impacted , the most prevalent types of attacks and attackers, and the key factors enabling them.
Tags : 
ibm, security services, cyber security intelligence, index, security report, security attacks, security protection, business security, data security, security intelligence index, security, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands, security, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Sep 06, 2013
An Assessment Of The Current Security Landscape And How to Overcome It -- Technical information security skills are in higher demand today than ever before. As IT environments become more complex and the threat landscape grows more malicious , organizations need skilled technical staff to meet increasing security and compliance demands. Read this white paper and learn how to survive the technical security skills crisis.
Tags : 
forrester, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands, security, data management, business technology
    
IBM
Published By: IBM     Published Date: Sep 10, 2013
This guide discusses the benefits of each capability and provides checklists to help you evaluate whether or not a particular vendor's solution addresses each of these areas effectively. You will also find a list of attributes and capabilities yous should look for in selecting a provider that can support the full breadth of your endpoint management requirements.
Tags : 
endpoint management, endpoint, security, ibm, it management, capabilities, vendor solutions, endpoint solutions, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks, security, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Virtualization has moved to the forefront of many organizations’ IT agendas, because it reduces both the number of physical servers required and the associated costs. This independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : 
ibm, ibm powervm, ibm powervm virtualization, virtualization, virtualization technology, x86, servers, business technology
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Analyst Joe Clabby writing about HP's flawed Itanium strategy states that continued investment in a converged Itanium/x86 infrastructure is a huge waste of research and development money. Itanium should be treated as a specialty processor that performs certain workloads. Read it here.
Tags : 
hewlett packard, itanuim, converged infrastructure, feint, x86 server, servers, data management, business technology
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
In this paper, Ptak/Noel describes the new IBM PureFlex system and the unique management capabilities of the IBM Flex System Manager.
Tags : 
ibm, data center, data center management, ibm pureflex, ibm pureflex system, expert integrated system, computing systems, ibm flex system manager, networking, business technology
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Using data from real customer deployments, Solitaire examines differentiators for SAP deployments on either PowerLinux or Windows. PowerLinux clearly emerges as a preferred platform.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
ITIC asserts that IBM’s latest Linux-only Power Systems offer current and prospective Big Blue customers high performance and reliability for physical and virtualized environments at an extremely aggressive price point.
Tags : 
itic, ibm, powerlinux, servers, powerlinux servers, big blue customers, servers, virtualization, business technology
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking, security, data management, servers, operating system, infrastructure, ibm puresystems, storage, business technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2013
IBM conducted more than 1,700 in-depth, face-to-face interviews with CEOs, general managers and senior public sector leaders from around the globe. Our newest CEO Study, the largest of its type ever undertaken, is the latest in the IBM C-suite Study Series. It explores how CEOs are responding to the complexity of increasingly interconnected organizations, markets, societies and governments – what we call the connected economy. Three themes emerged. Today's CEOs must: - Empower employees through values - Engage customers as individuals - Amplify innovation with partnerships Register now to access the insights that can help you lead more effectively through impactful connections with your employees, customers and partners.
Tags : 
global chief executive officer, leadership, technology, connectedness, customer insights, connections, ceos, business strategy, knowledge management, business technology
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks, security
    
IBM
Published By: IBM     Published Date: Nov 12, 2013
Integrated Workplace Management System Systems (IWMS) is gaining industry momentum, in large part, because of the increasing focus on the importance of optimized, unified management of all assets across a complex enterprise. And that certainly includes real estate, facilities, and related assets that have historically been managed in isolated domains. In this study, leading technology analyst Gartner Inc. assesses the IWMS market to determine how the field is changing, who the leading software providers are, and how IWMS solutions have evolved in new directions to better fulfill emerging demand.
Tags : 
integrated workplace management system, fasb, capital project management, iasb, sustainability, cafm, roi, magic quadrant, vendors, market overview, consolidation
    
IBM
Start   Previous    152 153 154 155 156 157 158 159 160 161 162 163 164 165 166    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com