ibm

Results 3801 - 3825 of 4246Sort Results By: Published Date | Title | Company Name
Published By: IBM Software     Published Date: Feb 07, 2011
See what BI can do for your company in this complete four-chapter Shortcut Guide to BI success. Learn practical, affordable tips for creating or expanding your BI strategy.
Tags : 
ibm cognos express, midsize companies, business intelligence, data mining, data warehouse, reporting
    
IBM Software
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This solution brief introduces the Smart Archive strategy from IBM, which is a comprehensive approach that combines IBM software, systems and service capabilities to help you drive down costs down and help ensure critical content is properly retained and protected.
Tags : 
ibm uk, ibm smart archive, ibm smart archive strategy, hardware, software, services, optimize, unify content, ingest, infrastructure, integrate, integration, compliance, analytics, ediscovery, networking, security, storage, business technology, data center
    
Ogilvy - IBM UK
Published By: IBM     Published Date: Sep 30, 2013
Using social technologies, organizations can develop a workforce development program where employees can develop skills on the job by collaborating with experts and sharing tacit knowledge. This white paper shows how organizations that develop a social learning program can improve employee engagement, reduce attrition and decrease the amount of time employees waste searching for expertise and information.
Tags : 
workforce, workforce management, social business, social learning environment, social learning, social technologies, skills development, employee retention, human resource technology, business technology
    
IBM
Published By: IBM     Published Date: Aug 16, 2013
The 2012 IBM Global CEO study found today’s business leaders rank technology as the most important external force that will impact their organizations. A new IBV software development study supports this, with IT and business leaders identifying five top technology trends critical to competitiveness. However, the same survey reveals that most organizations are not prepared to take advantage of these trends. While management recognizes that software is crucial to capitalizing on technology for competitiveness, they are not successfully executing. Join this webcast to learn how organizations that leverage effective software development can help close the execution gap and gain competitive advantage.
Tags : 
software, ibv software development
    
IBM
Published By: IBM     Published Date: Mar 29, 2018
This study looks at what's driving container adoption, highlights key challenges and explaining the benefits.
Tags : 
app development, adopt cloud
    
IBM
Published By: IBM     Published Date: Aug 01, 2018
This study looks at what's driving container adoption, highlights key challenges and explaining the benefits.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 09, 2018
This study looks at what's driving container adoption, highlights key challenges and explaining the benefits.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 24, 2018
This study looks at what's driving container adoption, highlights key challenges and explaining the benefits.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
This outlines the current state of compliance,trends by industry and geography, and key Forrester recommendations for moving efforts forward
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Apr 13, 2018
This outlines the current state of compliance,trends by industry and geography, and key Forrester recommendations for moving efforts forward
Tags : 
gdpr, compliance, data protection, personal data
    
IBM
Published By: IBM     Published Date: Nov 09, 2011
Learn how intelligence, integration, and interactivity can drive the results you are looking for!
Tags : 
marketing, intelligence, integrattion, interactivity, unica, interactive, mobile marketing, mobile, integrate
    
IBM
Published By: IBM MaaS360     Published Date: Jul 09, 2015
The paper explores why security is being left behind or completely out of app development.
Tags : 
mobile applications, security, app development, mobile application insecurity, software development, enterprise applications
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
ibm, fiberlink, app security, mobile application, app development, data security, networking, security, software development, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : 
ibm, mobile, mobile applications, security, wireless, data security
    
IBM MaaS360
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : 
ibm, mobile security, mobile security maturity, ismg, security
    
IBM
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability, data management
    
Vision Solutions
Published By: IBM     Published Date: Mar 02, 2017
Marketers are expanding their use of advanced social media analytics and combining the insights from those tools with other enterprise data to learn more about their customers and their prospects.
Tags : 
social media analytics, marketing, social media marketing, social media, ibm, branding
    
IBM
Published By: IBM     Published Date: Feb 21, 2013
Automation of the Last Mile supports the growth of the CFO’s mission, as it builds efficiency and integrates information throughout the enterprise.
Tags : 
automation, last mile, finance, sec, xbrl, extensible business reporting language, reporting, cfo
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Financial services companies face an array of demanding and ongoing challenges—global competition, mergers, acquisitions, converging service offerings, and an imperative to build and maintain customer loyalty. This white paper explores the landscape of operational risk in the financial services industry, and suggests ways an IBM Maximo IT asset management solution can reduce IT and operation risk while adding strategic benefits.
Tags : 
asset management, service management, maximo, financial services, ibm, ibm mi, ibm grm, it management
    
IBM
Published By: Group M_IBM Q418     Published Date: Nov 01, 2018
The Ponemon Institute and IBM Resilient are pleased to release the findings of the third annual study on the importance of cyber resilience for a strong security posture. The key takeaway from this year’s research is that organizations globally continue to struggle with responding to cybersecurity incidents. Lack of formal incident response plans and insufficient budgets were reported as the main causes of this challenge.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Jan 19, 2017
New technology and requirements for work in the digital workplace is driving new demand for enterprise content management solutions. Cloud and Mobile have forced companies to rethink how they access and interact with content. ECM has a rich history, evolving over time to meet the new demands for working with content. This short video will show you how ECM has evolved over time and where it is going. Learn how ECM is transforming and how companies are applying traditional ECM principles combined with new ECM capabilities to put business content to work for them in today’s cognitive era.
Tags : 
ibm, analytics, data, ecm, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.
Tags : 
ibm, computer security, network security, malware protection, network security, security organization
    
IBM
Start   Previous    146 147 148 149 150 151 152 153 154 155 156 157 158 159 160    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com