business practices

Results 251 - 275 of 537Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 28, 2016
Businesses all over the world run on applications and data. Your business does as well. The success of your business relies on the performance of your applications because they deliver the services to your customers that keep you in business. Your IT infrastructure supports and carries these applications—the lifeblood of your company. How to keep things up and running, connected, responsive and relevant is enough to keep most app owners up at night.
Tags : 
business, technology, infrastructure, best practices, applications, productivity
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
ibm, big data, trusted data, data management, data solutions, data center, data science, data storage
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
Cloud-based data and processing services present too much opportunity for organizations to ignore. How can organizations realize the obvious financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy? Good hybrid information governance implies several priorities for IT and the business which are based on these foundational pillars: - Broad agreement on what information means - Clear agreement on how owned information assets will be maintained and monitored - Standard practices for securing strategic information assets - Enterprise data integration strategy
Tags : 
ibm, trusted data, big data, governance, data governance, data management, business technology, data center, data science
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
ibm, big data, trusted data, data management, data solutions, business technology, data center, analytics, data science
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 19, 2017
Data is only as good as the insights it produces, the actions it influences, and the results it fosters. That’s the secret recipe for data management. Your business stakeholders depend on data-based insights to drive decisions and priorities throughout the organization. Insights based on sound data practices can give your business a competitive advantage in the marketplace. Is your data management system ready to support your business? Find out using Forrester’s Data Management Infrastructure Self-Assessment Tool. IBM has licensed this tool to help you identify the areas of strength and opportunities for improvement.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM
Published By: IBM     Published Date: Apr 26, 2017
"Business buyers are shopping online as private consumers and they expect the same experience when purchasing business products and services online. While B2B organizations can learn from B2C online retailers in terms of user experience, B2B selling is much more complex. Read this white paper to learn how to: Use B2C best practices to meet buyer expectations for enhanced online experiences Deliver multiple combinations of products and services for faster, streamlined quoting and ordering Support complex buying cycles and selling executions across channels and markets—and around the world"
Tags : 
b2b commerce, efficiency, online retail, buying cycles, b2b selling
    
IBM
Published By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : 
data analytics, data storytelling, business intelligence
    
IBM
Published By: IBM APAC     Published Date: Sep 25, 2017
Today, SAP’s solution portfolio looks very different and addresses different business needs than the SAP of a few years ago. Instead of primarily managing back-office enterprise resource planning (ERP) processes such as finance and the supply chain, SAP is evolving into a new type of software company that’s poised to enable digital business. Numerous acquisitions — including leading eCommerce solution hybris and cloud solutions Ariba, Concur, and SuccessFactors — and a new platform strategy based on SAP Hana, an in-memory computing solution, mean that the SAP core is positioned to support real-time digital business in the era of connected everything.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
IBM APAC
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach.
Tags : 
ibm ouncelab, application security tools, best practices, database management, network security, security management, application security, security, security administration
    
IBM Software
Published By: iCims     Published Date: Mar 06, 2014
Growing organizations have different hiring needs than companies in low growth mode. Companies that plan to grow must consider their recruitment technology and how it will impact their ability to scale. When businesses start to expand, they are often required to change many of their recruiting and talent acquisition practices. Typically, emerging companies find themselves unprepared when it comes to increasing workforce changes. The solution: Implementing Talent Acquisition Software to streamline all hiring needs.
Tags : 
talent acquisition software, recruitment technology, hiring needs, talent acquisition practices, human resources, hr technology, icims, human resource technology, business technology
    
iCims
Published By: Impact Radius     Published Date: Oct 14, 2014
Affiliate marketing is big business and it is poised to grow to $4.5 billion by 2016! While affiliate marketing is growing and evolving, the best practices for this channel seem to be outdated and causing stagnating campaigns, weak affiliate relationships, and status quo sales metrics. Download this Whitepaper that outlines 10 new performance marketing best practices that will keep your affiliate program manageable, targeted, and profitable
Tags : 
    
Impact Radius
Published By: Inc.     Published Date: Feb 20, 2017
Learn from five inspiring entrepreneurs as they share their experiences growing their companies. From selling coffee to coding to world travel, they blazed different paths. Now they offer real-world, everyday advice that can make a difference.
Tags : 
salesforce, small business, customer service, business growth, customer data, best practices, business technology
    
Inc.
Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula
Published By: Infor     Published Date: Feb 27, 2007
A fast-growing supplier, NEI's delivery performance was declining, creating a significant problem with past-due shipments, even though the company had an excess of finished goods. Access this case study to learn about how they addressed their challenges.
Tags : 
productivity, supply chain management, scm, product lifecycle management, enterprise resource planning, erp, customer service, customer satisfaction, business process management, customer experience management, best practices, manufacturing, infor
    
Infor
Published By: Infor     Published Date: May 25, 2007
External forces can knock your business off balance with no warning. To meet these external challenges, you need the capability to extend supply chain visibility, respond to changes in real time, and improve performance measurement across the entire chain.
Tags : 
supply chain, scm, business management, bpm, best practices, customer service, manufacturing, manufacture, supply, demand, concept-to-customer, productivity, infor
    
Infor
Published By: Inovis     Published Date: Aug 06, 2007
The challenges presented by multiple Value-Added Networks (VANs) and managing diverse trading partners create barriers to the efficiencies promised by EDI. Multiple providers mean multiple points of failure with no one entity to hold accountable. Also, as trading communities grow, end-to-end supply chain visibility becomes an essential operational requirement.
Tags : 
van, vans, value added, value-added, value added, edi, electronic data interchange, scm, supply chain, migration, inovis, tco, total cost of ownership, business metrics, vendor selection, best practices
    
Inovis
Published By: Insight Software     Published Date: Oct 03, 2017
It’s critical that Finance teams have accurate, relevant, and timely data to understand current run rates and to steer your company toward growth. “The Finance Boss Guide to Oracle E-Business Suite to Drive Exponential Financial Gains” will help you translate numbers into fiscal performance through better reporting, analytics and planning, such as: How to create your own usable, sharable reports and web-based dashboards tracking financial performance and progress against company-wide KPIs Avoiding over-investing in dated ERP tools Industry analyst’s take on how to get better reporting and planning best practices and tools How Finance leaders at Bibby Distribution used the ability to drill down into reports to get exactly the detail they needed to address immediate business issues
Tags : 
    
Insight Software
Published By: Intapp     Published Date: Jan 08, 2019
Five global legal trends are testing the limits of even the best new business acceptance models. In this ebook, you’ll explore their effects, learn best practices on how to adapt to them, and evaluate your current processes with an assessment checklist.
Tags : 
law firm business acceptance, law firm business acceptance trends, law firm improving business acceptance, law firm better business acceptance, law firm business acceptance problems, law firm business acceptance issues, law firm client onboarding, law firm better client onboarding, law firm improving client onboarding, law firm conflicts, law firm conflicts clearance, law firm better conflicts clearance, law firm improving conflict clearance, law firm client terms, law firm managing client terms, law firm managing client terms better, law firm compliance, law firm better compliance, law firm improving compliance
    
Intapp
Published By: Integrated Research     Published Date: Apr 13, 2011
"How to be a Sustainable IT Hero: Building a Business Case for PC Power Management" explains the benefits of implementing a PC Power Management solution, and shows how to avoid the common pitfalls along the way.
Tags : 
energy management software, power management, pc power management, power management software, computer power management, green technology, how to save electricity, save power, electricity saving tips, desktop power management, sustainable business practices, saving electricity, reduce carbon emissions, reduce electricity consumption, powerminder, energy management systems, verdiem, power saving software, energy efficiency, nightwatchman
    
Integrated Research
Published By: Intermec     Published Date: Jun 20, 2013
Nearly all the transportation and distribution companies in a market are governed by the similar labor laws, pay the same fuel prices and share the same roads. So why are some much more successful than others? Winning T&L companies don’t rely on cyclical business conditions to be successful. They can be profitable in any business conditions because they are differentiated, either in the services they offer customers or in their underlying business processes.
Tags : 
transportation, logistics technology, business practices
    
Intermec
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications, data management, business technology
    
Intralinks
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com