ibm

Results 3801 - 3825 of 4254Sort Results By: Published Date | Title | Company Name
Published By: CareerBuilder     Published Date: May 06, 2010
It's no coincidence that many of today's most successful and admired businesses - Google, Whole Foods, IBM, USAA and UPS, to name just a few - are as widely recognized for their forward-thinking business practices as they are for their reputations as employers of choice. These companies all share one characteristic: A strong employment brand.
Tags : 
branding, employment, recruiting, careerbuilder, usaa, ibm, ups, employer, branding
    
CareerBuilder
Published By: IBM Corporation     Published Date: Apr 26, 2010
Learn more about IBM's approach for reducing complexity and unifying data and content archiving.
Tags : 
ibm filenet, content archiving, unifying data, archive
    
IBM Corporation
Published By: IBM Corporation     Published Date: Apr 26, 2010
Get more out of your information when you need it, and get rid of it when you don't. IBM's Smart Archive strategy will save you time, money and resources with a unified, enterprise-wide approach to archiving and information governance.
Tags : 
ibm filenet, smart archive strategy, data archiving, unify content, archive
    
IBM Corporation
Published By: IBM Corporation     Published Date: Apr 26, 2010
Register now to access a Smart Archive Strategy Library of assets that will help you make a case for the unified collection and classification of content and data.
Tags : 
ibm filenet, mail archiving, sharepoint archiving, file share archiving, backup and recovery, smart archive, information management, storage management
    
IBM Corporation
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Published By: IBM     Published Date: Feb 03, 2010
Project Liberate: Consulting Engagement to help customers understand alternatives when negotiating a Microsoft Enterprise Agreement.
Tags : 
ibm ep, empowering people, software license expense, consulting engagement, microsoft enterprise agreement, cost reduction, tco, spend management, client access licenses, project liberate, negotiating strategies
    
IBM
Published By: IBM     Published Date: Feb 03, 2010
Ease of Use in Web Conferencing (Wainhouse Research Whitepaper) - Why it Matters: include saving travel costs, increasing individual and team productivity, and removing distance as a barrier for getting the right people (and customers) involved and more.
Tags : 
ibm ep, empowering people, web conferencing, wainhouse, roi, productivity, online meeting, ease of use, employee training, hr management
    
IBM
Published By: IBM     Published Date: Feb 03, 2010
Catch the latest analyst insights on what matters in the UC market - what is critical - the value of telephony integration - and the benefits of a sound call control strategy.
Tags : 
ibm ep, empowering people, telephony integration, unified communications, collaboration cost
    
IBM
Published By: IBM     Published Date: Feb 03, 2010
This white paper is intended to provide service providers with IBM's point of view on the power of collaboration in a Web 2.0 environment and to introduce a new IBM solution that can help telecoms to use collaboration as a tool for enabling innovation.
Tags : 
ibm ep, empowering people, service provider, collaboration, web 2.0 environment, innovation factory, telecommunication
    
IBM
Published By: IBM     Published Date: Feb 03, 2010
Join industry leaders and experts on this panel as they discuss the business value of enterprise social software and share their best practices in implementation within their organizations .
Tags : 
ibm ep, empowering people, collaboration, enterprise social software, forrester research
    
IBM
Published By: IBM     Published Date: Feb 03, 2010
A recent IBM CEO study revealed innovation, along with global integration and a disruptive business model, to be among the key traits of the Enterprise of the Future.1 As to how that innovation will take place-CEOs include collaboration and the use of Web 2.0 tools at the top of the list.
Tags : 
ibm ep, empowering people, web 2.0, enterprise software, social networking environment, roi
    
IBM
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : 
ibm mmdg, credit card security, pci compliance, secure network, cardholder data
    
IBM
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM RedpaperT publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL.
Tags : 
ibm redpaper, websphere ilog rules, cobol, code, cics channels and containers, business rule management systems, brms
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : 
ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
    
IBM ILOG.
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability, data management
    
Vision Solutions
Published By: IBM     Published Date: Nov 24, 2009
This paper is aimed at IT architects and managers who need to understand how IBM CICS Transaction Server can be used in a modern service oriented architecture (SOA) enterprise solution.
Tags : 
ibm, leveraging middleware, system z software, soa enterprise, websphere, db2, cics transaction server, ims, websphere mq, renault, workload management, websphere, transaction server, service oriented architecture
    
IBM
Published By: IBM     Published Date: Nov 24, 2009
Server sprawl can divert valuable time and resources away from pursuing your core business goals. This white paper will show how System z can give you the visibility, control and automation your business needs to become more successful.
Tags : 
ibm tivoli, leveraging middleware, service management, system z, new enterprise data center, business continuity management, security, process automation
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
IBM Lotus® Sametime® software is an award- winning platform for realtime collaboration. For years, organizations of all types have taken advantage of the Lotus Sametime platform’s powerful, security-enhanced features, such as integrated presence awareness, instant messaging (IM), Web conferencing, voice and video, to help people quickly find, reach and collaborate with each other.
Tags : 
security-enhanced features, instant messaging (im), web conferencing, voice and video, sharepoint
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
    
IBM
Published By: IBM     Published Date: Nov 17, 2009
This paper provides an overview of what is required to create an environment to leverage information dynamically for innovation and competitive advantage.
Tags : 
content management, information management, data integration, ibm, li campaign, ibm li, leveraging information, data management
    
IBM
Published By: IBM     Published Date: Nov 17, 2009
This report describes a study of attempts by organizations to improve decision-making through the use of information, among other interventions.
Tags : 
ibm, organizational performance, business information systems, decision making, automating process, process efficiency, leveraging info
    
IBM
Start   Previous    146 147 148 149 150 151 152 153 154 155 156 157 158 159 160    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com