task

Results 351 - 375 of 726Sort Results By: Published Date | Title | Company Name

Prepare and maintain your data - Data quality and master data management in a hybrid environment

Published By: IBM     Published Date: Jan 27, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, as discussed in “The truth about information governance and the cloud,” most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
    
IBM

Prepare And Maintain Your Data - Data Quality And Master Data Management In A Hybrid Environment

Published By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
cloud-based data, data quality, data management, hybrid environment, decision making
    
IBM

(DELETE)Best Practices For Mobile Application Lifecycle Management

Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM

Comprehensive Data Protection For Physical, Virtual And Cloud Infrastructures

Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM

Best Practices For Mobile Application Lifecycle Management

Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM

Unified Management of Endpoints, End Users and Everything in Between

Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM

Comprehensive Data Protection for Physical, Virtual and Cloud Infrastructures

Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM

eBook: Six Reasons to Upgrade Your Database

Published By: IBM     Published Date: Jul 06, 2017
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. In many cases, these systems are no longer up to the task—so it’s time to make a decision. Do you use more staff to keep up with the fixes, patches, add-ons and continual tuning required to make your existing systems meet performance goals, or move to a new database solution so you can assign your staff to new, innovative projects that move your business forward?
Tags : 
database, growth, big data, it infrastructure, information management
    
IBM

Continuous Testing For Dummies

Published By: IBM     Published Date: Aug 30, 2017
Welcome to Continuous Testing For Dummies, IBM Limited Edition. We hope you find this material helpful as you begin or continue your journey toward higher quality software and faster delivery. Successful companies are honing their software development approach to be as efficient as possible. This allows the software development, testing, and ops teams to spend their time on innovation instead of rework and manual, error-prone tasks.
Tags : 
ibm, continuous testing, software development, ops, testing
    
IBM

Cloud IAM Buyer's Guide: Which IDaas Vendor is Right for You?

Published By: IBM     Published Date: Oct 26, 2017
Choosing a vendor for cloud-based identity and access management (IAM), also known as Identity and Access Management as a Service (IDaaS), is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options—and share the findings with the rest of your team. It’s that simple!
Tags : 
idaas, cloud based identity, access management, iam, identity governance functionality
    
IBM

Protecting your company’s most critical information. Not all data is created equal

Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM

AI Is Ready For Employees, Not Just Customers

Published By: IBM     Published Date: Aug 01, 2018
Your customers aren't the only ones who can benefit from advancing artificial intelligence (AI) support — your employees can, too. Chatbots help employees who service customers, and you can build them with mature AI components. But success requires a focus on tasks rather than job replacement as well as a cyborg-like division between human and machine tasks. This report helps infrastructure and operations (I&O) pros determine which tasks are best executed by people and which are best left to machines, with use cases describing how that looks.
Tags : 
    
IBM

Forrester GDPR Microsite: Data Protection Gets Personal: GDPR Through the Lens of Data Security

Published By: IBM     Published Date: Sep 06, 2018
General Data Protection Regulation (GDPR) represents a paradigm shift in the way companies across the globe must approach protecting personal data. As of May 2018, EU data subjects now have greater autonomy than ever before over how their personal information is collected, stored and shared – and the repercussions for companies that fail to comply will be significant. At the heart of the matter lies Data Security and Protection. Protect the personal data, and you are well on your way to tackling many of the challenges the GDPR presents. But this is no easy task – before you protect your data, you must understand it, and even once you’ve achieved these goals, continually re-evaluate your data privacy and protection posture to adapt to changes in this dynamic environment.
Tags : 
    
IBM

Purchase And Deploy Security In The Cloud - Wherever Your Data May Be

Published By: IBM APAC     Published Date: Aug 22, 2017
For any sized organization, securing data and networks today is a daunting task. New vulnerabilities are discovered almost daily; new malware strains are developed as soon as a detection script is written for the old ones; and cybercriminals can buy prepackaged exploit kits on the Darknet backed by professional support teams. As a security analyst, you need more than a few point solutions designed to defend the network’s edge. You need visibility, perspective and an innate sense of when things just don’t seem right.
Tags : 
ibm, qradar, cloud, analytics, flexibility, scalability, organization
    
IBM APAC

Hitting the Wall with Server Infrastructure for Artificial Intelligence

Published By: IBM APAC     Published Date: Mar 19, 2018
Did you know that more than 77.1% of AI adopters have hit limitations with their on-premise server infrastructure? AI and deep learning are extremely demanding on server infrastructure. Unfortunately, not all servers are cut out for AI tasks. Read this white paper from IDC to find out: • What should be your server strategy when developing AI capabilities • Approaches for small to medium-sized AI initiatives, larger AI initiatives, choosing On-Premise or Cloud and the use of Accelerators Download this white paper to know why server infrastructure is crucial to your AI plans.
Tags : 
    
IBM APAC

Ready to Scale AI? Don't Suffer from Core Starvation

Published By: IBM APAC     Published Date: Jul 19, 2019
AI applications and especially deep learning systems are extremely demanding and require powerful parallel processing capabilities. IDC research shows that, in terms of core capacity, a large gap between actual and required CPU capability will develop in the next several years. IDC is seeing the worldwide market for accelerated servers grow to $25.6 billion in 2022, with a 31.6% CAGR. Indeed, this market is growing so fast that IDC is forecasting that by 2021,12% of worldwide server value will be from accelerated compute. Download this IDC report to find out why organizations like yours will need to make decisions about replacing existing general-purpose hardware or supplementing it with hardware dedicated to AI-specific processing tasks.
Tags : 
    
IBM APAC

Businesses are Ready for a New Approach to IT

Published By: IBM Corporation     Published Date: May 21, 2012
The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing.
Tags : 
deployment, information technology, smarter computing, integrated systems, platform systems, infrastructure systems, business technology
    
IBM Corporation

SOA Whitepaper - Multichannel SOA and BRMS

Published By: IBM ILOG.     Published Date: Jul 14, 2009
This paper presents service-oriented architecture (SOA) through the eyes of people with different roles within an organization. It will show their needs, challenges and tasks as they relate to SOA.
Tags : 
soa, ibm, brms, multichannel, approach, business, application, maintence, solution, transparency, service, system, data, enterprise applications, application performance management, business management
    
IBM ILOG.

Smarter Insurance Processes in 2010: Streamline Insurance Processes with Business Rules

Published By: IBM ILOG.     Published Date: Oct 26, 2009
This automation not only cuts costs by reducing manual tasks, bottlenecks and errors-it also delivers the right answer to the right person at the right time.
Tags : 
ibm, ilog, business rule management systems, brms, insurance operation, business intelligence, business management, business process automation, business process management
    
IBM ILOG.

Four Steps to Successful Omnichannel Order Management Fulfillment. An Industry Leaders Guide

Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
The key to order management success is to recognize that the product alone is no longer what is being sold, but the entire purchase experience from the point of view of the customer. Each retail task is a challenge that brings the customer and their needs to the center of the conversation. With the help of IBM Order Management and Watson Order Optimizer, your company can address the key challenges of optimizing inventory and minimizing cost-to-serve while delivering omni-channel services that satisfy your customers.
Tags : 
success management, optimization, watson order optimizer, customer success, omni channel, ibm
    
IBM UK&Ireland

Agenda Automation Frees Up Time and Budget to Focus on New Projects

Published By: iCompass Technologies     Published Date: Feb 06, 2015
You know every tax dollar counts: The post-recession drop in funding coupled with mounting financial commitments and legislative demands for improved access to information leave no choice but to make operations more efficient. Agenda automation software eliminates manual tasks associated with creating, distributing, and publishing agendas, reduces the prep time (by as much as 50% or more) and associated costs of meetings while introducing a flexibility that makes tight deadlines easier to manage. The impact is far reaching, from improved transparency to freeing up staff time to work on other priorities. It not only pays for itself in paper savings, it brings money back into the budget—from $300 to $1000 per meeting, depending on the size of the organization. Learn more about how easy it can be to automate your meeting agendas, and what you can get back as a result.
Tags : 
agenda management, meeting management, meeting management software, records management, records management software, paperless document management, local government transparency, agenda automation, local government software, municipal government software, city government software, e-government software, digital governing, agenda automation software, citizen engagement software, government transparency initiatives, granicus, iqm2, agenda pal, novus agenda
    
iCompass Technologies

Accelerating "Time to Value" Through Network Automation

Published By: Infoblox     Published Date: Jun 11, 2012
Companies require products that offload routine functions from the technology staff so that they can focus on more-important tasks. Download this whitepaper to learn what automation can do for you.
Tags : 
infoblox, time, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance, networking
    
Infoblox

Private Cloud Without Network Automation - Can It Be done?

Published By: Infoblox     Published Date: Jun 11, 2012
The dynamic nature of virtual and private cloud environments cannot be accommodated by an underlying infrastructure that is a static, physical assembly of routers, switches, servers, and firewalls. Find out more in this complimentary white paper
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls, agilitytime, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox

Ensuring Business Continuity Through IPv6 Adoption. What To Do Now and What Can Wait

Published By: Infoblox     Published Date: Jun 11, 2012
Learn why any organization relying on the IT ecosystem enabled by the Internet Protocol - especially those organizations with public-facing content - are at great risk. Get your free complimentary white paper NOW!
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls, agilitytime, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox

Infoblox Cloud Network Automation for VMware vRealize Suite

Published By: Infoblox     Published Date: Jun 18, 2015
Download this detailed technical analysis to learn how to avoid manual tasks and processes.
Tags : 
infoblox, cloud network, vmware, vrealize, tolly group, flexible deployment architecture, scale up, scale out, cloud network automation
    
Infoblox
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.