ibm

Results 1 - 25 of 3659Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Jul 09, 2017
In a recent report, Aberdeen's research suggests that Hadoop usage could be a catalyst for an enhanced and well-rounded data strategy. Read on to find out more.
Tags : 
hadoop, big data, data strategy
    
IBM APAC
Published By: IBM APAC     Published Date: Jul 09, 2017
Organizations today collect a tremendous amount of data and are bolstering their analytics capabilities to generate new, data-driven insights from this expanding resource. To make the most of growing data volumes, they need to provide rapid access to data across the enterprise. At the same time, they need efficient and workable ways to store and manage data over the long term. A governed data lake approach offers an opportunity to manage these challenges. Download this white paper to find out more.
Tags : 
data lake, big data, analytics
    
IBM APAC
Published By: IBM APAC     Published Date: Jul 09, 2017
This Knowledge Brief investigates the impact of a data lake maintained in a cloud or hybrid infrastructure.
Tags : 
data lake, cloud, hybrid
    
IBM APAC
Published By: IBM APAC     Published Date: Jul 09, 2017
This document outlines how Best-in-Class firms use efficient content processes to achieve higher levels of customer centricity.
Tags : 
customer, ecm, enterprise content management, customer experience
    
IBM APAC
Published By: IBM APAC     Published Date: Jul 09, 2017
The purpose of this executive brief is to explore the challenges companies face in implementing enterprise search and to offer a new, robust set of technologies to help.
Tags : 
data, ecm, enterprise content management
    
IBM APAC
Published By: IBM APAC     Published Date: Jul 09, 2017
IT departments are under constant pressure to deliver improved user experiences that lead to revenue growth. Achieving this goal requires addressing multiple areas at once: taking advantage of the flexibility and scalability of the cloud; empowering mobile users with anytime, anywhere access; and accelerating digital transformation.
Tags : 
digital transformation, ecm, enterprise content management, cloud, flexibility
    
IBM APAC
Published By: IBM APAC     Published Date: Jul 09, 2017
Are you making the most of your enterprise content? Doing so can mark the difference between being a disruptor and being disrupted. Download this infographic to find out more.
Tags : 
digital transformation, enterprise content, ecm, enterprise content management
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 07, 2017
The 2017 CEI results indicate that brands have significant room for improvement in terms of satisfying customer expectations: On a scale from 0 to 100, the average CEI score is 33. Download this white paper to find out more.
Tags : 
customer experience, customer analytics, customer behavioural analytics, customer experience management
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 07, 2017
This Total Economic Impact (TEI) analysis has been prepared exclusively for you based on your inputs. The analysis provides a high-level estimate of the impact of implementing IBM customer behavior analytics solutions.
Tags : 
customer experience, customer analytics, customer behavioural analytics, customer experience management
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 07, 2017
Read this white paper to discover the 5 best practices for understanding customer journeys.
Tags : 
customer experience, customer journey, satisfaction, customer experience management
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 07, 2017
The analytics tools you’ve come to rely on probably haven’t kept pace with this rapid change, and may now be less effective. Systems may not be nimble enough to follow customer journeys across channels and time. Different platforms in different departments can’t talk to each other, so reporting is slowed. And it’s difficult to take proactive steps when your view of the total customer experience is a little blurry. Download this white paper to find out more.
Tags : 
customer experience, analytics, analytics tools, customer analytics, customer experience management
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 13, 2017
Using more than 70 criteria and combining feedback from customer interviews, IDC found that the providers in this evaluation bring diverse capabilities for modernizing SAP applications. Download this paper to find out more.
Tags : 
ibm, sap, applications, modernization, application services
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 13, 2017
In this interactive document, we present the key results from the IBM Institute for Business Value’s recent report “Redefining Markets: Insights from the Global C-suite Study – The CMO perspective,” and examine how IBM and SAP can help CMOs meet the challenges of marketing in a digital world.
Tags : 
cmo, digital era, ibm, sap, c-suite, study, digital transformation
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 13, 2017
In this e-book, we look at the key topics CIOs have outlined as their priorities and discover how solutions from IBM and SAP can help CIOs achieve them.
Tags : 
digital transformation, cio, ibm, sap, c-suite
    
IBM APAC
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
    
IBM
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: IBM     Published Date: May 26, 2017
This white paper is intended for: • Potential users such as analysts and investigators who want information about i2 Analyst’s Notebook Premium and the benefits it provides • System administrators who wish to gain a high-level understanding of the product and the system prerequisites that are needed to install and run the application • Users who wish to learn how to exploit the maximum value of i2 Analyst’s Notebook Premium This document provides an overview of the i2 Analyst’s Notebook Premium product.
Tags : 
ibm, ibm i2, ibm i2 analyst, notebook premium
    
IBM
Published By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : 
security. ibm, ibm i2, cyber-intelligence, fraud, malware
    
IBM
Published By: IBM Watson Health     Published Date: Jun 14, 2017
Learn how IBM Watson Health clinical application advisors helped Floyd Health Care System take full advantage of the platform’s many benefits. Business Challenge As part of its journey toward population health management, Floyd wanted to optimize the way it used the IBM® Phytel® solution from IBM Watson Health™ and take advantage of its analytical tools. Transformation With help from an IBM Watson Health clinical application advisor, Floyd expanded its IBM solutions and used their unique capabilities to progress toward a more robust population healthcare model by adding care coordination activities and improving key process measures.
Tags : 
floyd health care system, ibm, ibm watson health, analytics, healthcare
    
IBM Watson Health
Published By: IBM Watson Health     Published Date: Jun 14, 2017
Electronic health records (EHRs) are necessary, but were not designed to anchor population health management (PHM). This is partly because they lack semantic interoperability, which is the ability of disparate information systems to share data and enable communications among users in a meaningful way. This paper explains how an approach that includes a care collaboration platform can manage population health by aggregating and normalizing the necessary data.
Tags : 
ehr, ibm, health management, population health management, data aggregation, information systems
    
IBM Watson Health
Published By: IBM     Published Date: Apr 21, 2017
"When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing. Speakers include Liz Miller, Senior Vice President of Marketing for the CMO Council; Jody Sarno, Dedicated Client Partner, Communications Industry for IBM; Chris Crayner, Ch
Tags : 
ibm, senior marketing decision makers, audience targeting, digital experiences, branding
    
IBM
Published By: IBM     Published Date: Apr 21, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
customer experience, branding, customer interaction, technological influence, customer engagement
    
IBM
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system
    
Bell Micro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.