ibm

Results 1 - 25 of 4186Sort Results By: Published Date | Title | Company Name

IBM Multicloud Manager - The enterprise-grade multicloud management solution.

Published By: IBM APAC     Published Date: Mar 06, 2019
Achieve superior control and performance across multicloud environments with IBM Multicloud Manager. With a multicloud strategy, it can become time-consuming, expensive and difficult to manage environments as you contend with scattered visibility, security and workloads across multiple Kubernetes clusters and clouds. IBM Multicloud Manager integrates all your environments in a single view that gives you optimal control over how you see, govern and automate everything.
Tags : 
    
IBM APAC

Top 10 best practices for successful multicloud management.

Published By: IBM APAC     Published Date: Mar 06, 2019
A multicloud world is quickly becoming the new normal for many enterprises. Learn how the multicloud world is changing the face of IT. Understanding cloud environments and making decisions about multicloud management can be complex. IBM has identified ten key pain points and related best practices that help organizations successfully navigate these transformations.
Tags : 
    
IBM APAC

The Total Economic Impact™ Of IBM Watson Studio And Watson Knowledge Catalog

Published By: IBM APAC     Published Date: Mar 06, 2019
The Forrester Study on cost savings and business benefits enabled by Watson Studio and Watson Knowledge Catalog. Watson Studio provides a suite of tools for data scientists, application developers, and subject matter experts to collaboratively and easily work with data and use that data to build, train and deploy machine learning models at scale. The Forrester provides readers a framework to evaluate the potential financial impact of the Watson Studio and Watson Knowledge Catalog investment on their organizations.
Tags : 
    
IBM APAC

IBM Watson Studio and Watson Knowledge Catalog make data and AI more accessible.

Published By: IBM APAC     Published Date: Mar 06, 2019
A single environment to build, train, and deploy machine-learning and deep learning models. Take advantage of machine learning and AI to analyze your data. Catalog your data to make it easy to find. All applications are free and without time limit!
Tags : 
    
IBM APAC

2019 Annual IBM X-Force Threat Intelligence Index.

Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC

Ponemon Institute: The Third Annual Study on the Cyber Resilient Organization

Published By: IBM APAC     Published Date: Mar 06, 2019
A cyber resilient enterprise is one that can prevent, detect, contain and recover from a myriad of serious threats against data, applications and IT infrastructure. The Ponemon Institute and IBM surveyed more than 2,848 IT and IT security professionals from around the world and released the findings of the third annual study on the importance of cyber resilience for a strong security posture.
Tags : 
    
IBM APAC

Data is Oxygen

Published By: Group M_IBM Q119     Published Date: Jan 10, 2019
It is breathing life into our existing energy resources and creating new opportunities. Better use of data has visible, tangible and immediate results. It is helping energy companies become safer, more reliable and more efficient. This is good for both our wallets and our planet. For more information visit: www.ibm.com/energy or watch our webinar here
Tags : 
    
Group M_IBM Q119

Keep the lights on by predicting when an outage might occur

Published By: Group M_IBM Q119     Published Date: Jan 10, 2019
Download Infographic Now!
Tags : 
    
Group M_IBM Q119

Gartner Magic Quadrant for Mobile Marketing Platforms, July 2018

Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119

2018 Watson Marketing Digital Benchmark Report

Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
At IBM Watson Marketing, we believe deeply in this practice and have dedicated a large effort to provide some of this critical data to marketers. The newest IBM Watson Marketing annual report of marketing benchmarks is bigger and better than ever with mobile marketing metrics data in addition to email marketing metrics. This year’s report includes traditional benchmark metrics such as email marketing open, click-through and unsubscribe rates, as well as email client and device data and engagement/read rates. New this year to the report are delivery and message frequency metrics for SMS and open and clickthrough rates for mobile push messages.
Tags : 
    
Group M_IBM Q119

Adapting to the Cloud for New Data and Analytic Demands

Published By: Group M_IBM Q119     Published Date: Mar 04, 2019
One of the biggest changes facing organizations making purchasing and deployment decisions about analytic databases — including relational data warehouses — is whether to opt for a cloud solution. A couple of years ago, only a few organizations selected such cloud analytic databases. Today, according to a 2016 IDC survey, 56% of large and midsize organizations in the United States have at least one data warehouse or mart deploying in the cloud.
Tags : 
    
Group M_IBM Q119

Data Warehouse Appliances and the New World Order of Analytics

Published By: Group M_IBM Q119     Published Date: Mar 04, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
    
Group M_IBM Q119

The Hybrid Data Warehouse: Fluid, Flexible, and Formidable

Published By: Group M_IBM Q119     Published Date: Mar 11, 2019
This report explores a new breed of data warehouse that can operate in a world of legacy on-premise systems while exploiting the potential of cutting edge technologies and deployment styles
Tags : 
    
Group M_IBM Q119

Hybrid IT is the New Normal for IT Infrastructure

Published By: Group M_IBM Q119     Published Date: Mar 11, 2019
In this report, we'll analyze the many challenges that organizations face when it comes to building and managing a modern IT infrastructure
Tags : 
    
Group M_IBM Q119

Don't be the Last Business to Adopt the Cloud

Published By: Group M_IBM Q119     Published Date: Mar 11, 2019
The days when avoiding the Cloud was a defensible position for a business are gone. By taking advantage of the Cloud, organizations not only gain its direct benefits, but are also better able to leverage other new technologies and become more efficient and innovative
Tags : 
    
Group M_IBM Q119

Best Practices Guide for SAP Applications on an IBM XIV® Storage System

Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system, storage management, sap
    
Bell Micro

Microsoft Exchange on IBM XIV Storage Systems - resilience and performance

Published By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : 
bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system, network performance management, storage management, email archiving
    
Bell Micro

IBM XIV® Storage System: Ease of Management Reinvented

Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture, storage area networks, storage management, storage virtualization
    
Bell Micro

IBM XIV® Storage System: Storage Reinvented for VMware Environments

Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv, network architecture, server hardware
    
Bell Micro

The Right Tool for the Right Job

Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company

Knowledge is Power

Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
Ounce Labs, an IBM Company

Secure at the Source

Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company

Business Case for Data Protection

Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
Ounce Labs, an IBM Company

An Introduction to IBM System i High Availability

Published By: Vision Solutions     Published Date: Dec 11, 2008
This paper presents an overview of IBM System i high availability to companies that are beginning to explore this powerful business continuity technology.
Tags : 
vision, high availability, ibm, monitoring, network architecture, network management, as/400
    
Vision Solutions

The Benefits of Continuous Data Protection (CDP) for IBM i5/OS and AIX Environments

Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix, business intelligence, configuration management, data protection
    
Vision Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.