hi def

Results 526 - 550 of 1121Sort Results By: Published Date | Title | Company Name

The Data Center Impact of Cloud, Analytics, Mobile, Social And Security

Published By: IBM     Published Date: Oct 06, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
ibm, cloud, analytics, mobile, social, security, infrastructure, data center
    
IBM

Is Your Data Center Being Overwhelmed By Rapidly Converging Technologies?

Published By: IBM     Published Date: Oct 06, 2015
An IBM infographic highlighting the infrastructure implications of today’s converging technology forces and the software defined, data center transformation essential to capitalizing on them.
Tags : 
ibm, data center, software defined data center, data center transformation, it management
    
IBM

Mitigating risks with security intelligence and identity assurance

Published By: IBM     Published Date: Oct 13, 2015
White paper describes how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
Tags : 
ibm, security intelligence, identity assurance, intelligent iam, boost compliance, qradar, security, data management
    
IBM

Seven ways to reduce waste and accelerate software delivery

Published By: IBM     Published Date: Dec 29, 2015
This paper will explore best practices for identifying and eliminating seven types of waste: Waiting, handoffs and task switching, motion, extra processes, extra features, partially completed work and defects.
Tags : 
ibm, software delivery, task switching, eliminate waste, defect, software development, it management
    
IBM

Recruitment is Marketing : The future of talent acquisition

Published By: IBM     Published Date: Jan 06, 2016
Your recruiting strategy should be an integrated partnership between strategy and tools. There is no secret sauce. However, if you broaden your approach and your definition of recruiting, attraction and connection, the goal of finding the right talent becomes increasingly attainable. Try creating a multi-faceted approach to talent attraction using target audiences and ads. Create a robust strategy to connect with talent in your lead management tool, social network, and career site or recruitment technology system. Be willing to change and try new tactics, even if it means starting small. There are countless ways to approach a truly social strategy for recruitment – when done right; they yield great results that can actually prove ROI. Embrace that recruiting is marketing and change how your team finds, attracts and connects with the next great employee for your company.
Tags : 
recruitment, marketing, talent acquisition, recruiting strategy, talent search, social strategy, lead management tool
    
IBM

The data center impact of cloud, analytics, mobile, social and security

Published By: IBM     Published Date: Feb 26, 2016
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
data center, cloud computing, analytcs, mobile, social, cyber security, ibm, infrastructure
    
IBM

Talent Acquisition Technology: Today, Tomorrow, and Beyond

Published By: IBM     Published Date: Mar 28, 2016
Nowadays, organizations need top-notch technologies to attract top talent, support their recruiters, and empower their organizations to grow. Thankfully, data analytics, open talent acquisition suites, talent communities, mobile optimization, and more are readily available and can enhance experiences for both candidates and recruiters while providing insight on HR for business leaders. But refreshing talent acquisition isn't just about technology; it's also about realigning its definition to the demands and expectations of the twenty-first century.
Tags : 
ibm, recruiting, talent acquisition, talent acquisition technology, workforce management software, recruiting software/services
    
IBM

Quality Improvement –A DevOps for Middleware Scenario

Published By: IBM     Published Date: Mar 31, 2016
"Fingers wagging, eyes squinting –“Why didn’t you find this problem during testing?!”How many times have you been asked that, only to try to defend yourself with things like “we can’t test everything!” and “it’s a corner case”? Everyone knows you can’t improve quality by testing alone, so what can you do when your testing team is taking the blame for poor quality in production? Join us on this TechByte session where we will discuss practices and tools that will help improve your test effectiveness and overall quality."
Tags : 
ibm, middleware, cloud, devops, techbyte
    
IBM

Seven ways to reduce waste and accelerate software delivery

Published By: IBM     Published Date: Apr 11, 2016
This paper will explore best practices for identifying and eliminating seven types of waste: Waiting, handoffs and task switching, motion, extra processes, extra features, partially completed work and defects.
Tags : 
ibm, software delivery, application platform, software development, cloud computing, business technology
    
IBM

Monetize your Data with Business Intelligence

Published By: IBM     Published Date: Apr 15, 2016
Ziff Davis Custom Whitepaper: Analytics relies on BI, Big Data, and data discovery to provide reporting, trend analysis, and what-if analysis.iii Analytics is defined as the scientific process of transforming data into insight for making better decisions.
Tags : 
ibm, business analytics, business intelligence, agile, decision making, big data, business technology
    
IBM

Talent Acquisition Technology: Today, Tomorrow, and Beyond

Published By: IBM     Published Date: Jul 20, 2016
Nowadays, organizations need top-notch technologies to attract top talent, support their recruiters, and empower their organizations to grow. Thankfully, data analytics, open talent acquisition suites, talent communities, mobile optimization, and more are readily available and can enhance experiences for both candidates and recruiters while providing insight on HR for business leaders. But refreshing talent acquisition isn't just about technology; it's also about realigning its definition to the demands and expectations of the twenty-first century.
Tags : 
ibm, recruiting, talent acquisition, talent acquisition technology, human resource technology
    
IBM

Better High Performance Computing through IBM’s Software Defined Infrastructure

Published By: IBM     Published Date: Nov 07, 2016
Is your software defined infrastructure (SDI) for high performance computing (HPC) and big data analytics meeting the needs of your growing business? Would you like to know how to justify the switching cost from unsupported open source software to a commercial grade SDI that ensures your resources are more effectively used cutting down time to market? This webcast will give you an overview of the true costs of building out and managing a HPC or Big Data environment and how commercial grade SDI software from IBM can provide a significant return on investment.
Tags : 
ibm, platform computing, software defined infrastructure, enterprise applications, business technology
    
IBM

Safeguard Sensitive Data Against Insider Threats and External Attacks: Top 5 scenarios

Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM

Talent Acquisition Technology: Today, Tomorrow, and Beyond

Published By: IBM     Published Date: Oct 13, 2016
Nowadays, organizations need top-notch technologies to attract top talent, support their recruiters, and empower their organizations to grow. Thankfully, data analytics, open talent acquisition suites, talent communities, mobile optimization, and more are readily available and can enhance experiences for both candidates and recruiters while providing insight on HR for business leaders. But refreshing talent acquisition isn't just about technology; it's also about realigning its definition to the demands and expectations of the twenty-first century.
Tags : 
ibm, recruiting, talent acquisition, talent acquisition technology, human resource technology, business technology
    
IBM

Seeing is Believing: IBM Kenexa Talent Insights

Published By: IBM     Published Date: Oct 28, 2016
Watch this complimentary, on-demand 30 minute demo to see how you can: - Use HR analytics to redefine the way you manage your talent and help drive better business results. - Gain deep insights from your talent data without having to dig through mountains of reports. - Know exactly what data to explore to get the very best answers to your talent questions. - Answer your CEO's questions about the workforce in minutes, not months.
Tags : 
ibm, kenexa, talent insights, talent analytics, knowledge management, enterprise applications, human resource technology, business technology
    
IBM

Engaging in the age of the customer

Published By: IBM     Published Date: Nov 10, 2016
Are you aware of the ongoing dialog about your products and services? Are you participating? Recent surveys show that organizations that deliver good customer experiences are reaping greater revenues than those that don’t. Yet companies are struggling to pivot towards the customer, because it often requires a complete overhaul of management, culture and technologies. This session will show how to defeat content chaos, streamline and accelerate onboarding and service processes, minimize friction with customers, use analytics to anticipate and prepare for customer needs, and give your front-line people the tools they need to offer a superior experience that will grow your revenues and generate great word of mouth.
Tags : 
ibm, analytics, ecm, engagement, customer, enterprise applications, business technology
    
IBM

Knowledge Management for Strategic Decisions with IBM Watson in Aerospace and Defense

Published By: IBM     Published Date: Dec 05, 2016
IBM Watson enables a global Aerospace and Defense company to use cognitive technologies to assess its portfolio enhancements, assess its offering competitiveness, and evaluate its supply and sales opportunities. Democratizing knowledge is key for success. Especially in an environment of constant change within corporate transformations, employees lose access to key information in order to support the company's operational stability during these changes. Watson takes over the role of a human expert to support a fast and fact-based steering of the company.
Tags : 
ibm, watson, leadership, knowledge management, aerospace, defense, enterprise applications, business technology
    
IBM

The Evolving Face of Cyber Threats

Published By: IBM     Published Date: Jan 11, 2017
Download this eBook to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats - Why Cyber Threat Analysis is the most effective defensive strategy - How analysts benefit from the use of sophisticated data visualization to identify hidden threat relationships and patterns - Why shifting from attack prevention to mitigation is a more practical goal for commercial organizations
Tags : 
ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk, enterprise applications
    
IBM

Growing Government Cyber Intelligence1

Published By: IBM     Published Date: Jan 11, 2017
Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence - Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM

Growing Government Cyber Intelligence

Published By: IBM     Published Date: Jan 13, 2017
As traditional network perimeters surrounding data centers dissolve, agencies face enormous difficulties fending off attacks using a patchwork of traditional security tools to protect classified or personally identifiable information (PII). Time and again, traditional security practices have proven porous and/or unsustainable. Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence -Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM

Scaling Data Integration to Handle Big Data

Published By: IBM     Published Date: Apr 14, 2017
Any organization wishing to process big data from newly identified data sources, needs to first determine the characteristics of the data and then define the requirements that need to be met to be able to ingest, profile, clean,transform and integrate this data to ready it for analysis. Having done that, it may well be the case that existing tools may not cater for the data variety, data volume and data velocity that these new data sources bring. If this occurs then clearly new technology will need to be considered to meet the needs of the business going forward.
Tags : 
data integration, big data, data sources, business needs, technological advancements, scaling data
    
IBM

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.