ibm

Results 1 - 25 of 4150Sort Results By: Published Date | Title | Company Name

Forrester Wave Report The Forrester Wave™: Full-Stack Public Cloud Development Platforms, N

Published By: Google     Published Date: Dec 03, 2018
This Forrester research looks at how 7 full-stack public cloud development platform providers perform against a 31-criteria evaluation. The most important vendors — Alibaba, AWS, CenturyLink, Google, IBM, Microsoft, and Oracle — were researched, assessed, and scored. Download the complete report and find out how each provider measures up and helps application development and delivery professionals make the right choices.
Tags : 
    
Google

Driving Digital Destiny

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
We are renegades and realists who blend strategy, technology and creativity to tackle every client challenge. We imagine the businesses that will shape tomorrow’s world and help our clients make them real. We uncover insights from data that others can’t see and deliver progressive ideas through the use of IBM Design Thinking. We ground every strategy with a focus on delivering the ultimate experience – for customers, for employees, for shareholders. Everything we do drives measurable impact at scale. For more information, visit ibm.com/ibmix
Tags : 
    
Group M_IBM Q119

Blockchain for Mobility Services

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Car-sharing, ride-sharing and ride-hailing aren’t new. Uber and other personal mobility services have redefined how people move from place to place. And now these services are beginning to redefine traditional car ownership itself. As people move from one vehicle to another, their personal information and preferences need to follow them, so the car they use feels like their own. Blockchain is defined as a shared, immutable ledger, and it can address many of the challenges that new types of personal mobility present.
Tags : 
    
Group M_IBM Q119

Customer Care_Forrester Wave - Conversational Computing

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
In Forrester's evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Tags : 
    
Group M_IBM Q119

Customer Engagement 101 - Self Expression

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Download Webinar Now!
Tags : 
    
Group M_IBM Q119

Six Steps for Building a Robust Incident Response Function

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Over the years, IBM Resilient customers have increased their IR sophistication at various levels across a spectrum of maturity. Maturity levels are often necessitated by industry, available resources, or experience, but most IBM Resilient customers continually look to evolve their IR function into a more advanced phase.
Tags : 
    
Group M_IBM Q119

Intelligent Orchestration Battling Complex Cyberattacks with the Next Generation of Incident

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Security leaders across all industries face mounting challenges. Cyberattacks are continually growing in volume, complexity, and sophistication, and incident response (IR) teams are pushed to the limit of their time, skill, and resources. Additionally, the average Security Operation Center (SOC) uses more than 75 different security tools – making full visibility nearly impossible and integrating those tools challenging as well.
Tags : 
    
Group M_IBM Q119

IDC Thinking Supply Chain Whitepaper

Published By: Group M_IBM Q119     Published Date: Jan 04, 2019
Digital transformation is poised to change the supply chain more profoundly than any other functional area and more dramatically than at any point in its history in terms of driving efficiency and resiliency to disruption. In the context of the challenges facing supply chains, both now and in the future, it becomes clear that the old ways of working will not suffice and that even best-in-class performance today is unlikely to be good enough in the future. It is the view of IDC that the supply chain must become a "thinking" supply chain, one that is intimately connected to all data sources, enabled with comprehensive and fast analytics, openly collaborative through cloud-based commerce networks, conscious of cyberthreats, and cognitively interwoven. According to IDC supply chain research, technology is emerging as a prime driver of change, particularly artificial intelligence, blockchain, and the Internet of Things (IoT).
Tags : 
    
Group M_IBM Q119

POV: Watson Supply Chain

Published By: Group M_IBM Q119     Published Date: Jan 04, 2019
Digital business is changing business models – and how we conduct business. It is both connecting and blurring the lines between the digital and physical worlds. It is changing how businesses communicate, transact and interact with customers, suppliers and partners. And it is accelerating the pace of business, in a world already operating 24/7.
Tags : 
    
Group M_IBM Q119

Gartner Magic Quadrant for Data Quality Tools

Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
The discipline of data quality assurance ensures that data is "fit for purpose" in the context of existing business operations, analytics and emerging digital business scenarios. It covers much more than just technology. It includes program management, roles, organizational structures, use cases and processes (such as those for monitoring, reporting and remediating data quality issues). It is also linked to broader initiatives in the field of enterprise information management (EIM), including information governance and master data management (MDM)
Tags : 
    
Group M_IBM Q119

IBM’s Journey to GDPR Readiness

Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
IBM has established a global readiness programme tasked with identifying the key impacts of the GDPR across IBM’s business and preparing IBM’s internal processes and commercial offerings for compliance with the GDPR.
Tags : 
    
Group M_IBM Q119

Data is Oxygen

Published By: Group M_IBM Q119     Published Date: Jan 10, 2019
It is breathing life into our existing energy resources and creating new opportunities. Better use of data has visible, tangible and immediate results. It is helping energy companies become safer, more reliable and more efficient. This is good for both our wallets and our planet. For more information visit: www.ibm.com/energy or watch our webinar here
Tags : 
    
Group M_IBM Q119

Keep the lights on by predicting when an outage might occur

Published By: Group M_IBM Q119     Published Date: Jan 10, 2019
Download Infographic Now!
Tags : 
    
Group M_IBM Q119

The Forrester Wave: Digital Intelligence Platforms, Q2 2017

Published By: Adobe     Published Date: Oct 11, 2018
In our 26-criteria evaluation of digital intelligence (DI) platform providers, we identified the 10 most significant ones — Adobe, Cxense, evergage, google, IBM, localytics, Mixpanel, optimizely, sAs, and Webtrekk — and researched, analyzed, and scored them. this report shows how each provider measures up and helps customer insights (CI) professionals make the right choice.
Tags : 
    
Adobe

Best Practices Guide for SAP Applications on an IBM XIV® Storage System

Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system, storage management, sap
    
Bell Micro

Microsoft Exchange on IBM XIV Storage Systems - resilience and performance

Published By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : 
bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system, network performance management, storage management, email archiving
    
Bell Micro

IBM XIV® Storage System: Ease of Management Reinvented

Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture, storage area networks, storage management, storage virtualization
    
Bell Micro

IBM XIV® Storage System: Storage Reinvented for VMware Environments

Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv, network architecture, server hardware
    
Bell Micro

The Right Tool for the Right Job

Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company

Knowledge is Power

Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
Ounce Labs, an IBM Company

Secure at the Source

Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company

Business Case for Data Protection

Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
Ounce Labs, an IBM Company

Watson Studio: Simplify and scale AI for hybrid, multi-cloud world

Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
• Do you want to win with AI in the hybrid, multi cloud world? Are you tackling data, algorithms and apps to drive business value from AI? We got you covered. Come and learn how you can simplify and scale your AI projects on Watson Studio. Hybrid cloud use cases spanning cloud, desktop and local are featured. Key Takeaways: • Open, trustworthy and secure approach to put AI to work for business • Go live and scale faster with AI-infused platform • Build train and deploy models across hybrid, cloud environments – including popular public cloud environments like AWS and Azure • Flexibility for cloud, on-premise and desktop deployment, bringing algorithms to wherever data resides • Progressing your AI/data science with Watson Studio • Register now and get ready to simplify and scale your AI investments to work for your business.
Tags : 
    
Group M_IBM Q119

An Introduction to IBM System i High Availability

Published By: Vision Solutions     Published Date: Dec 11, 2008
This paper presents an overview of IBM System i high availability to companies that are beginning to explore this powerful business continuity technology.
Tags : 
vision, high availability, ibm, monitoring, network architecture, network management, as/400
    
Vision Solutions

The Benefits of Continuous Data Protection (CDP) for IBM i5/OS and AIX Environments

Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix, business intelligence, configuration management, data protection
    
Vision Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.