ibm li

Results 1751 - 1773 of 1773Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 12, 2016
IBM commissioned Forrester Consulting to evaluate what consumers want from a mobile app (and its authoring brand) and focused on the following questions: - What elevates a good, serviceable, and even profitable app into the realm of great? - And if a mobile app achieves greatness, what is the impact?
Tags : 
ibm, commerce, digital experience, digital, applications, apps, mobile app, wireless, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 17, 2013
IBM’s Storage Hypervisor concept is the best news since server-less back-up, and easier to understand. Thanks to the popularity of server virtualization, most business folks have some idea of what a hypervisor can do but a storage hypervisor has the potential to be much more transformative.
Tags : 
storage, hypervisor, concept, virtualization, transformative, business
    
IBM
Published By: IBM     Published Date: Sep 16, 2014
IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."
Tags : 
power-based systems, big data, linux, fast deployment, open source infrastructure, data management, server hardware, application performance management
    
IBM
Published By: IBM Software     Published Date: Feb 07, 2011
Learn how midsize companies can use performance management solutions to gain competitive advantage without breaking the bank.
Tags : 
ibm cognos, performance management, midsize, business intelligence, cos of ownership, tco, application performance management, business analytics, total cost of ownership
    
IBM Software
Published By: IBM APAC     Published Date: Mar 19, 2018
IBM’s Spectrum Protect offering boasts more than 20 years of achievement in the protection and recovery of key IT systems. So, it would be easy to suppose that IBM’s new Spectrum Protect Plus and Spectrum Copy Data Management software offerings simply represent “Spectrum Protect with extra features.” That assumption would be incorrect. They are standalone, reimagined approaches aiming to solve a daunting IT challenge—virtualization protection/recovery—and aspiring to attain a coveted IT outcome—effective data management and enablement (DM&E), referred to by many as “copy data management” (CDM).
Tags : 
data protection, data availability, software defined storage
    
IBM APAC
Published By: IBM     Published Date: Jul 29, 2014
Development, IT and even testing teams must do more in less time, increase the frequency of software delivery, and produce higher quality software. All of this without adding headcount. In response, enterprises are creating collaborative, cross-silo teams that reflect the interdependence and importance of every stage within the software delivery pipeline. The benefits are steadily visible.
Tags : 
ibm, ibm urbancode, software delivery, it management, release, deployment, automation, automated release and deployment
    
IBM
Published By: IBM     Published Date: Jan 05, 2015
In an era when human resources departments are constantly being asked to do more with less, it’s clear that something needs to be done. As more and more resumes pile up for each position, HR teams need help to make a quality hire quickly. Fortunately, IBM Smarter Workforce technology can help, by providing companies the ability to test candidate skills at the beginning of the hiring process. Using simple and convenient skills assessments, it’s easy for HR departments to separate the serious candidates from the rest of the applicants. Once this is done, considering the candidates and making a quality hire becomes much more manageable.
Tags : 
hr technology, human resources, pre-employment assessment technology, hiring decisions, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : 
ibm, technology, information technology, it management, data management, data center, analytical applications, business intelligence, configuration management, data protection, secure content management, project management
    
IBM
Published By: IBM     Published Date: Nov 30, 2017
Analyst firm, Enterprise Strategy Group (ESG), makes the case for storing backup, archive and content repository data in the cloud. Learn how IBM Cloud Object Storage addresses these use cases and helps companies lower costs, provide higher availability and protect against unauthorized access to their data. Complete the form to download the analyst paper
Tags : 
ibm cloud, archival solutions, ibm, it services, storage, production storage, data management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management, business activity monitoring, business analytics, risk management
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
security
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
fraud detection, finance, account takeover, cybercrime, fraud prevention, application security, hacker detection, intrusion detection, intrusion prevention, security management
    
IBM
Published By: IBM     Published Date: Oct 22, 2013
Read the paper from Winter Research, Inc sharing details on the dramatic savings brought by IBM Rational automated test solutions. Learn about the positive ROI from an increased ability minimizing the cost and time to identify errors. 
Tags : 
ibm, wintergreen research, software testing, service virtualization, research approach, driving forces, application testing, leveraging service virtualization, application testing, testing cycle, automating test environments, complex software testing, software development, business intelligence, server virtualization, service management
    
IBM
Published By: IBM     Published Date: Jan 10, 2014
Independent research by Wintergreen Research, Inc. shows "Dramatic savings brought by IBM Rational automated test solutions".  Read this paper to see how you can see a positive ROI through the ability to minimize cost and time to identify errors and diminish subsequent impacts of defects using test automation and service virtualization.
Tags : 
ibm, wintergreen research, software testing, service virtualization, software development, testing, automation, quality assurance, roi, cost reduction, test automation, rational, risk management, data management, test and measurement, it spending, performance testing, return on investment, productivity, virtualization
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
This webcast, "Untangle Your Connectivity Infrastructure - Free Up Your Cost," shows how IBM SOA solutions and IBM WebSphere untangle costly and debilitating complexities associated with connecting and integrating applications, services, and processes spread throughout the organization. The result is business agility and cost optimization.
Tags : 
connectivity infrastructure, ibm, application intergration, cost optimization, it complexity, business integration, infrastructure, application integration, it spending, web sphere
    
IBM
Published By: IBM     Published Date: Aug 10, 2009
Digital Media convergence, Web 2.0 and social networking's growing influence are forcing Telecommunications companies to transform their service offerings. Watch this webcast to learn about IBM's asset-based telecommunications solutions that solve our clients most important challenges.
Tags : 
web 2.0, social networking, telecommunications, digital media, collaboration, ibm, empowering people, spde, cem, customer experience management, blogs, wikis, user profiles, tagging, feeds, mobile services, lotus, wireless, enterprise applications, mobile computing
    
IBM
Published By: IBM     Published Date: Dec 06, 2013
Partners and customers expect instantaneous response and continuous uptime from data systems, but the volume and velocity of data make it difficult to respond with agility. IBM PureData System for Transactions enable businesses to gear up and meet these challenges.
Tags : 
ibm, ibm puredata system, data, data mangement, database, integration, transactions, workload, availability, data system, data management, servers, data center
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : 
ibm, database security, enterprise, private data, privacy, intrusion, information security policies, auditing, monitoring, encryption, compliance, intrusion detection, intrusion prevention, policy based management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
When choosing among providers of identity and access management as a service (IDaaS), a great place to start is evaluating your own organization’s IAM needs. Create a personalized list of your identity and access management (IAM) needs and determine if IBM® Cloud Identity Service is right for you. With this checklist, you will be able to determine if your needs match up with the benefits of IBM Cloud Identity Service.
Tags : 
iam, idaas, web access management, cloud based security, governance administration, enterprise grade identity
    
IBM
Published By: IBM     Published Date: May 09, 2013
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
Tags : 
network, security, cybersecurity, endpoint manager, solution, eliminate vulnerabilities, technology
    
IBM
Published By: IBM     Published Date: Apr 22, 2014
This paper examines the present challenges and offers a realistic set of practices that can significantly reduce forecasting uncertainty, help enable better pricing decisions and improve profitability.
Tags : 
ibm, lifecycle, lifecycle pricing, ecommerce, retail, trend spotting, profitability, pricing decisions, lifecycle pricing tools, it management, product lifecycle management
    
IBM
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71     Next   End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.