it foundation

Results 276 - 300 of 380Sort Results By: Published Date | Title | Company Name
Published By: EMA     Published Date: Dec 07, 2012
Don't miss EMA VP of Research, Dennis Drogseth, and BMC Software Product Marketing Manager, Criss Scruggs discuss the key components in successful ITAM business cases and how to lay the foundation for a successful outcome and ensure project approval.
Tags : 
asset management, bmc software, tool adoption, project management, itam, it asset management
    
EMA
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Dec 01, 2011
HP and Intel are building a multifaceted storage product portfolio with a common foundation that will enable the integration of server and storage into Converged Systems.
Tags : 
    
Sponsored by HP and Intel® Xeon® processors
Published By: Adobe     Published Date: Oct 25, 2017
With the right foundation, the road to digital transformation is easy. Find out the steps you can take to start your journey – and start delivering experiences that truly put your customers at the center. Read the guide, Customer-centric Digital Transformation: What You Need to Know to learn: • Five steps toward customer-centric digital transformation • Four key components that make up excellent customer experiences • Tips and inspiration from industry experts and digital government agencies
Tags : 
public sector, digital innovation, customer-centric, digital government, customer experience
    
Adobe
Published By: Signal     Published Date: Nov 09, 2016
With the emergence of people-based marketing, an identity graph is the foundation required to recognize people across channels and devices at every step of the customer journey to deliver true 1:1 marketing at scale.
Tags : 
signal, marketing, people-based marketing, identity graphs, id graphs, cross channel
    
Signal
Published By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : 
tripwire, information security, infrastructure, change management, change, change auditing
    
Tripwire
Published By: IBM     Published Date: Feb 25, 2014
In their efforts to keep up with these varied needs, healthcare organizations are experiencing a proliferation of assets and asset types. But assets themselves are experiencing a convergence. Clinical devices for patient monitoring and care, building systems for cooling and lighting, and technology devices for communications and record keeping share a common foundation. An enterprise asset management system can be at the core of this transformation. Download the whitepaper to learn more.
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 06, 2014
IBM has worked for years with retailers to help them develop a complete Omni-channel Commerce solution that integrates various channels and provides a foundation that helps enable the seamless experience that consumers are looking for. Due to this joint effort, IBM provides the only Commerce Solution that can truly support a unique and personalized buying experience for consumers that incorporates marketing, selling, fulfillment, and returns across all physical and digital channels. This paper describes the best practices needed to enable a store to meet the cross-channel expectations of the customer and the ever-increasing order volumes of Omni-channel fulfillment.
Tags : 
omni-channel commerce, store enablement, channel integration
    
IBM
Published By: Net Atlantic     Published Date: Dec 08, 2009
How to Keep Compliant, Avoid Mistakes, and Manage a Healthy Member List. Net Atlantic's whitepaper, "Email Compliance & Best Practices for Healthcare" helps healthcare providers and healthcare product and service vendors understand email communications compliance issues. It illustrates how CAN-SPAM forms the foundation of compliance, and also explains why healthcare organizations have to go beyond CAN-SPAM to sustain a truly effective email communications strategy. Healthcare users of email for communications should know how to use these best practices before building their email campaigns.
Tags : 
net atlantic, email compliance, spam, can-spam, healthcare, members, hmtl messages, email marketing
    
Net Atlantic
Published By: IBM     Published Date: Sep 16, 2014
To compete in today’s rapidly changing business environment, organizations need to capture, analyze and act on information rapidly. If they can quickly identify trends, discover patterns and generate new insights, they can address a wide array of strategic and operational goals—from increasing customer loyalty and creating targeted marketing offers to enhancing operational efficiency and reducing risk. In their report, Business Value of Big Data on Power Systems, NC State University talks about unlocking the business value of big data, and how IBM Power Systems can deliver the foundation for organizations to bring insight to the point of impact faster.
Tags : 
big data, targeted marketing offers, ibm power systems, structured data
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.
Tags : 
application deployment, point security, ibm, ibm security solutions
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Read why the right architecture is a key factor in successful BI deployments and how the open architecture of IBM Cognos Enterprise can help reduce IT workload, improve productivity and make better use of your IT budget.
Tags : 
business intelligence, bi deployments, it workload, employee productivity, it budget
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
With Watson Explorer, you can keep enterprise search as the foundation and transform search into Cognitive Exploration. Leveraging technological advances such as deep search and exploration, advanced content analytics, and cognitive capabilities, IBM Watson Explorer provides a unified view of the information you need, combining data from multiple internal silos and a variety of outside datasets including social media. Stop limiting your search to traditional data sources in the new, non-traditional data world.
Tags : 
watson explorer, ibm, deep search, content analytics, enterprise software
    
IBM
Published By: IBM     Published Date: May 25, 2016
Securely unlock enterprise data and services for the digital economy with an integrated API foundation
Tags : 
ibm, api, connect, api connect, middleware, api foundation
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Listen to videos with WIRED Editor Jim Daily and technology experts from The Linux Foundation, Canonical/Ubuntu, SUSE, The Met Office and IBM as they discuss how the latest hybrid cloud infrastructure technology and the best of Linux and open source can yield business innovation and growth.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions
    
IBM
Published By: IBM     Published Date: Oct 18, 2016
Listen to videos with WIRED Editor Jim Daily and technology experts from The Linux Foundation, Canonical/Ubuntu, SUSE, The Met Office and IBM as they discuss how the latest hybrid cloud infrastructure technology and the best of Linux and open source can yield business innovation and growth.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions
    
IBM
Published By: IBM     Published Date: Dec 15, 2016
Watch to learn: - How to tackle the challenge of multi-speed IT with WebSphere Application Server's unique approach to delivering application infrastructure based on Java EE 7 - How to provide continuous availability for running modern apps that require on-demand dynamic scalability and high operational resiliency - How the lighweight and modular architecture of WebSphere Liberty provides an ideal foundation to develop and deploy microservices - How to deliver flexibility to develop, deploy and consume application infrastructure - on-premises or on the cloud, including emerging virtualization technologies such as Docker - How to manage and monitor thousands of applications and servers with a single management interface for ease of problem determination
Tags : 
ibm, middleware, it transformation, websphere application server
    
IBM
Published By: Intel     Published Date: Apr 16, 2012
Read how blades are the best infrastructure choice for an extremely wide range of enterprise applications and use cases.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation
    
Intel
Published By: Hewlett-Packard     Published Date: Aug 02, 2013
As the amount of information we generate grows, and as our relationship with information grows more complex, the race to innovate new products and services to help us harness information, manage it, and tap into it more easily intensifies. This paper discusses the continuing development of HP’s strategy for delivering Converged Storage that improves the ability of your business to capitalize on information. Building on the foundation provided by fusing industry-standard technologies, federated scale-out software, and converged management, HP is now extending Converged Storage into new solutions and segments with a new initiative that introduces the next evolution of this HP Converged Storage strategy and vision.
Tags : 
storage, converged storage
    
Hewlett-Packard
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centricity,
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centrici
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: Seagate Technology     Published Date: Apr 14, 2015
Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.
Tags : 
surveillance, security system, virtual management software, cameras
    
Seagate Technology
Published By: SAS     Published Date: Aug 13, 2018
You may know some data management basics, but are you aware of the transformational results that can result from doing data management right? This paper explains core data management capabilities, then describes how a solid data management foundation can help you get more out of your data. Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
You may know some basics about data management, but do you realize the transformational results data-management-done-right can produce? This paper explains core data management capabilities, then describes how a solid data management foundation can help you get more out of your data. From getting fast, easy access to trustworthy data to making better decisions and becoming a data-driven business, you’ll learn why good data management is essential to success. Multiple real-world examples illustrate how SAS customers have used data management to improve customer experience, boost revenue, remain compliant and become more efficient.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
“Unpolluted” data is core to a successful business – particularly one that relies on analytics to survive. But preparing data for analytics is full of challenges. By some reports, most data scientists spend 50 to 80 percent of their model development time on data preparation tasks. SAS adheres to five data management best practices that help you access, cleanse, transform and shape your raw data for any analytic purpose. With a trusted data quality foundation and analytics-ready data, you can gain deeper insights, embed that knowledge into models, share new discoveries and automate decision-making processes to build a data-driven business.
Tags : 
    
SAS
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.