ibm

Results 3976 - 4000 of 4154Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 20, 2015
A survey based digital tool that gives a score on level of maturity
Tags : 
ibm, media, entertainment, analytics, digital, data management, business technology, research
    
IBM
Published By: IBM     Published Date: Nov 20, 2015
A survey based digital tool that gives a score on level of maturity
Tags : 
    
IBM
Published By: IBM     Published Date: Nov 20, 2015
A survey based digital tool that gives a score on level of maturity
Tags : 
ibm, telecom, analytics, digital, business technology, research
    
IBM
Published By: IBM     Published Date: Jan 06, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles.
Tags : 
recruitment, recruitment marketing, critical role recruiting, human resources, talent attraction
    
IBM
Published By: IBM     Published Date: Jan 06, 2016
Companies are always looking for ways to determine just how effective and capable candidates can be in the workplace before they start.
Tags : 
assessment anayltics, ibm, performance, quality, maximize
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This paper outlines the challenge of insider threats - who they are, the damage and financial loss they can cause, and what organizations can do to protect themselves.
Tags : 
ibm, security, threat, insider threat, data security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control.
Tags : 
ibm, threat, trusteer apex, malware, application, networking, security, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, credentials, threat, data, analysis, security, data security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations.
Tags : 
ibm, identity, access assurance, identity, security, data security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe, cloud, information management, security, data security
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, overview, threats, security, enterprise applications, business technology, data security
    
IBM
Published By: IBM     Published Date: Jan 20, 2016
Hold for copy
Tags : 
ibm, c-suite, global study, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 21, 2016
IBM talent expert Andi Britt examines the modern pressures and challenges of human resource management and the opportunities that new technology presents for today’s CHROs.
Tags : 
ibm, chro, technology, enterprise applications, human resource technology, business technology
    
IBM
Published By: IBM     Published Date: Jan 20, 2016
CFOs must find new ways to drive enterprise agility, enhance decision-making and promote growth, all while ensuring traditional tasks run smoothly.
Tags : 
ibm, cfo, enterprise, agility, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Feb 02, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market.
Tags : 
ibm, forrester, cloud, mobile application, delivery, software development, wireless, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Mar 25, 2016
test
Tags : 
    
IBM
Published By: IBM     Published Date: Mar 25, 2016
test
Tags : 
    
IBM
Published By: IBM     Published Date: Mar 31, 2016
"The market buzz around APIs has distorted executive's thought processes about how to make money from APIs. Our guest speaker, Forrester analyst Randy Heffner, will tell the real truth about how to drive value from APIs. Who Should Read/View This webcast: business audience Attend to also learn how to: Provide business users with real-time information for more informed decision making Leverage the latest cloud, mobile, and analytics enhancements in IIB v10 Use the IIB Healthcare Pack to accelerate development and deployment of integration solutions Who Should Attend this Webcast: business audience"
Tags : 
ibm, api, integration, application program interface, middleware
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : 
ibm, hybrid it operations, cloud, mss, managed security services, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
"Achieving Application Delivery Velocity with a 482% ROI IBM commissioned Forrester Consulting to conduct their Total Economic Impact™ (TEI) study that examines and quantifies potential return on investment (ROI) for IBM UrbanCode Deploy within an enterprise DevOps environment. The study determined that a composite organization, based on the customers interviewed, experienced an ROI of 482%! Read the Forrester Consulting study and learn learn how these enterprise organizations achieved: 97% reduction in the cost of releases Reduction in the risk of failed deployments 75% faster deployment times Download Study – See how IBM UrbanCode brings deployment velocity while reducing release costs"
Tags : 
ibm, ibm urbancode, forrester consulting, total economic impact, deployment, software development, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 08, 2016
test
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 08, 2016
testing 2
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 15, 2016
This white paper takes a look at the current challenges that many organizations face in addressing this growing need. It examines the different types of users and stakeholders who need or want more self-service, and lays out four factors that are critical to realizing the full potential of self-service analytics.
Tags : 
ibm, business analytics, self-service analytics, business intelligence, business technology, analytics
    
IBM
Start   Previous    153 154 155 156 157 158 159 160 161 162 163 164 165 166 167    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com