ibm

Results 3801 - 3825 of 4154Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data, security
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration, engineering disciplines, business objectives, change management, compliance standards, systems age, engineering process, information integration, communication, it management
    
IBM
Published By: IBM     Published Date: Apr 15, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, product development, systems development, it engineering, business objectives, traceability, collaboration, software development
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, systems development, advancing product, traceability, engineering information, collaboration, engineering disciplines, collaboration process, software development
    
IBM
Published By: IBM     Published Date: Mar 10, 2015
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, systems development, product development, traceability, customer lifecycle, software development, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Aug 21, 2013
Until now, marketers have been limited to two relatively uninspired options for sending direct communications to consumers on their mobile phones: SMS (a.k.a., text messaging), and text-only, imageless email on devices like the BlackBerry and Palm Treo. But with the introduction of Apple’s iPhone and competitor operating systems like Google’s Android and Palm’s Pre/Pixi now offering similarly rich user experiences, email marketers have a huge opportunity to reach consumers anywhere, any time, on their mobile devices.
Tags : 
email marketing, enterprise marketing management, email performance, mobile marketing, mobile reach, marketing channels
    
IBM
Published By: IBM     Published Date: Apr 16, 2014
Speed, simplicity and affordability: 3 capabilities businesses need from their warehousing environment. IBM DB2 with BLU Acceleration gives organizations a complete, multipurpose environment to rapidly distill insight from their data, make timely decisions and capitalize on opportunities
Tags : 
ibm, data warehouse, warehouse environment, speed, simplicity, affordibility, db2 with blu, acceleration, data warehousing, data system, data storage, infrastructure
    
IBM
Published By: IBM     Published Date: Nov 14, 2014
Data mining uncovers patterns in data through a variety of predictive techniques. By engaging in data mining, organizations like yours gain greater insight into external conditions, internal processes, your markets – and your customers.
Tags : 
ibm, data mining, data management, business results, predictive intelligence, business insights
    
IBM
Published By: IBM     Published Date: Feb 19, 2015
Data mining uncovers hidden patterns and relationships in data, driving more informed decisions in organizations of all sizes, and in virtually every industry.
Tags : 
roi, data mining, big data, business analytics, enterprise applications, data management, data center
    
IBM
Published By: IBM     Published Date: Oct 08, 2015
This 30-minute webcast is about analytics because without end-to-end analytics, organizations have little to no insight into what’s really happening with their mobile apps.
Tags : 
ibm, mobile, security, app, analytics, application development, software development, business technology, data security
    
IBM
Published By: IBM     Published Date: Jan 04, 2016
This 30-minute webcast is about analytics because without end-to-end analytics, organizations have little to no insight into what’s really happening with their mobile apps.
Tags : 
ibm, mobile, application, development, mobile apps, analytics, software development, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Join IBM Mobile Analytics expert, Michael Darden, to see how the analytics capabilities of IBM MobileFirst Platform can enable you to answer three critical questions about your apps and then take immediate action to correct any value-draining issues … faster than your clients can take matters into their own hands.
Tags : 
ibm, mobile, mobile applications, app development
    
IBM
Published By: IBM Software     Published Date: Jul 19, 2011
In this white paper, David Axson delves into what he considers to be the three key things you should do in 2011 to close that gap and deliver dramatically enhanced value and quality. Read "Time to Build the Last Mile to Full Financial Value", and set your sights on being able to guide your organization to new levels of competitive differentiation and achievement.
Tags : 
cognos, business intelligence, business intelligence software, business intelligence solution, corporate performance management, ibm
    
IBM Software
Published By: IBM     Published Date: Jul 14, 2014
In this Frost & Sullivan Executive Brief, you will learn valuable tips for choosing a cloud services provider.
Tags : 
ibm, cloud, cloud services, cloud service provider, cloud portfolio, it management, it purchasing
    
IBM
Published By: IBM     Published Date: Feb 01, 2017
View this webinar to learn what the experts are saying about the current state of digital analytics and hear why not upgrading is a threat to your business. James McCormack of Forrester will detail what steps you need to take now.
Tags : 
ibm, commerce, customer experience, digital intelligence, customer analytics, customer insights, enterprise applications, business technology
    
IBM
Published By: Red Hat     Published Date: Jan 01, 2009
The number 1 independent tire retailer tried, unsuccessfully, to build an online platform based on Windows. Ultimately, the company succeeded instead with a solution built with Red Hat Enterprise Linux, Red Hat Network Satellite, Apache, WebLogic, and IBM Lotus Domino Server.
Tags : 
e-commerce business, red hat, satellite
    
Red Hat
Published By: IBM Software     Published Date: Jul 06, 2011
Learn why you should keep your software subscription up to date.
Tags : 
ibm, tivoli, software subscription and support, renewal, bill kribbs, laura sanders, risk compliance, search, storage, service
    
IBM Software
Published By: IBM     Published Date: Oct 26, 2017
Threats to your digital assets are everywhere. They’re constant. So you build defenses to keep them out. But like a carpenter framing a new addition to a house, you want to regularly step back from working on the details for a full view of your work. Do the enterprise security measures you’ve built do a complete job of protecting against intrusions? Or have you left any gaps that allow bad actors an easy way in? When you check all the possibilities, you might be surprised.
Tags : 
data protection, sensitive data, data security, identity governance, digital assets
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
As a precursor to the IBM Global Chief Marketing Officer (CMO) Study to be published later in 2011, the Economist Intelligence Unit, in cooperation with the IBM Institute for Business Value, conducted an online survey of nearly 300 executives to assess which trends are impacting CMOs and how CMOs are responding to today's complex business environment.
Tags : 
ibm, retail, cmo, trends, business environment, innovate
    
IBM
Published By: IBM     Published Date: Jan 06, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles.
Tags : 
recruitment, recruitment marketing, critical role recruiting, human resources, talent attraction
    
IBM
Published By: IBM     Published Date: Jun 13, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles. Competition is fierce and the power has clearly shifted from employers to the candidate. Today’s job candidates expect to be treated like consumers, and the most successful marketing teams know that consumers are increasingly suspicious of brands. These marketing teams implement strategies to foster trust and loyalty among their target audience. Just like marketers, recruiters must have the ability to not only attract but engage candidates as well, and they are tasked with fostering that same trust and loyalty among the candidates they hire as well as the ones they don’t. It’s not enough to just leverage the latest tools and implement trend-setting processes in the recruiting department. Recruiters must also live the employer brand every day. Living the brand encompasses demonstrating the EV
Tags : 
ibm, ibm smarter workforce, work trends, employee acquisition, recruiting, recruiters
    
IBM
Published By: IBM     Published Date: Sep 07, 2016
Attend this webcast to learn ways you can: 1. Educate the acquisition team about your audience. What are their preferences and motivations? 2. Utilize marketing tactics to reach the talent you want. Are your recruiters storytellers? 3. Measure success. Are you evaluating your efforts along the way? 4. Engage in continuous improvement. What challenges are you tackling every day to make yourself a better recruiter?
Tags : 
ibm, ibm smarter workforce, work trends, employee acquisition, recruiting, recruiters, human resource technology
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
Attend this webcast to learn ways you can: 1. Educate the acquisition team about your audience. What are their preferences and motivations? 2. Utilize marketing tactics to reach the talent you want. Are your recruiters storytellers? 3. Measure success. Are you evaluating your efforts along the way? 4. Engage in continuous improvement. What challenges are you tackling every day to make yourself a better recruiter?
Tags : 
ibm, ibm smarter workforce, work trends, employee acquisition, recruiting, recruiters, human resource technology, business technology
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Read Tolly's assessment of web application protection, federation capabilities, risk-based access features and overall performance of IBM Security Access Manager.
Tags : 
ibm, security, security access manager, federation capabilities, risk management, best practices, technology, it management, business technology
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM
Start   Previous    146 147 148 149 150 151 152 153 154 155 156 157 158 159 160    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com