Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 2026 - 2050 of 2685Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 28, 2016
Software applications are the mainstay of modern business. Applications deliver business-critical services to customers and enable companies to function efficiently. To ensure performance and availability of their applications, companies must have full visibility and control of the applications and enabling infrastructure. If an outage or slowdown occurs, the company needs to know precisely where the problem originated, what caused it, and how to prevent it from occurring again.
Tags : 
software, data, best practices, productivity, applications
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
Web content management remains a vibrant and growing market, fueled by the aspirations of digital strategists on the demand side and continuous innovation on the supply side. IT application leaders, marketers, digital experience specialists and merchandisers all now view WCM as mission-critical.
Tags : 
ibm, mobile, applications, apps, mobile apps, customer engagement, it application, wcm, innovation, software development, wireless
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
With SUSE Linux Enterprise Server on IBM Power Systems, you gain the benefits of the latest generation of Enterprise Linux OS with the power and reliability of IBM hardware. This combination provides the performance and flexibility to run the most demanding business-critical workloads.
Tags : 
ibm, ibm power systems, suse, suse linux enterprise server, linux, ibm hardware, open source
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Open-source is becoming an increasingly critical component being leveraged by agile enterprises. The capital investment required to develop next generation business solutions demands that components be built and targeted to the platform best suited for the task. Understanding the tools available for you or your developers to gain efficiencies to build solutions once, and deploy on a choice of scalable and reliable platforms is of paramount importance.
Tags : 
ibm suse, suse enterprise linux server, linux, ibm power systems, open source, agile
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Join IBM Mobile Analytics expert, Michael Darden, to see how the analytics capabilities of IBM MobileFirst Platform can enable you to answer three critical questions about your apps and then take immediate action to correct any value-draining issues … faster than your clients can take matters into their own hands.
Tags : 
ibm, mobile, mobile applications, app development, cloud computing
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
If you were to ask a CHRO two questions: 1. Is employee onboarding critical to your business? 2. Could your company be more effective with this process? This webcast is about IBM's answer to these questions. "Succeeding at IBM" is the name of IBM's own strategic onboarding program. It is viewed by experts as a best in class example of how to effectively align the business and HR when it comes to our most important asset, our people! In this webcast, you will learn how IBM improved it's employee retention, time to productivity and overall engagement through it's formal pre-boarding and onboarding programs.
Tags : 
ibm, empoyee onboarding, new hire, human resources, chro, enterprise applications, human resource technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
New research from IBM found that one-third of employees surveyed at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. Why? They’re tired of workplace apps that don’t perform like their personal apps: intuitively, on the go, and with some intelligence. Saying “yes” might feel good to your teams, but it can also turn your infrastructure into a Beast. You don’t know all the different apps being used, like file sharing or online meetings. Or how much they cost. Or if your content is safe and manageable. Can you give your teams what they want without getting trampled by the Beast? Yes you can. You can transform the Beast into a Beauty. But you need to consider three critical ways to make that happen.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business operations, business technology, third-party cloud apps, workplace apps, enterprise applications
    
IBM
Published By: IBM     Published Date: Sep 14, 2016
IDC analyst Chandana Gopal shares the reasons as to why the line of business is critical in helping create a modernized B2B architecture that is scalable, reliable, and can quickly adapt to changing business requirements.
Tags : 
ibm, b2b, requirements, scale, reliability, platform, enterprise applications, data center
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats, network, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 12, 2016
Read this online report that can aid your horizontal portal selection decisions and help you identify key differentiators among products.
Tags : 
ibm, commerce, digital experience, digital, horizontal portals, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
cloud-based data, data quality, data management, hybrid environment, decision making
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 13, 2018
Get an overview of enterprise grade business critical messaging and its various deployment options in private, public or hybrid cloud.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 26, 2019
Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives. Read this report to gain a better understanding of: ? Who is most accountable to external parties following a data breach ? The importance for business executives to have visibility into data security metrics ? How to overcome challenges to equip business executives with data security information ? When executive level security tools can improve business executives ability to proactively manage data risk
Tags : 
    
Group M_IBM Q3'19
Published By: Gomez IT     Published Date: May 23, 2011
A Critical Look at Key Technologies to Help Ensure that Your Cloud Investments Work For and Not Against You.
Tags : 
compuware, enterprise management associates, ema, cloud computing, application delivery, peformance management strategy, cloud services, performance monitoring, user experience management
    
Gomez IT
Published By: CollabNet     Published Date: Dec 20, 2011
In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. Discover five tested and proven software development practices your team should be utilizing to accelerate software delivery.
Tags : 
agile, software development, continuous integration, alm, dev teams, accelerate delivery, developers, app dev
    
CollabNet
Published By: Cisco     Published Date: Jul 11, 2016
Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: Hewlett-Packard     Published Date: Aug 02, 2013
"Cloud computing, also known as 'IT as a Service', is predicated on delivering IT services on demand, an idea that has support from business leaders as a way to better align IT with business operations. Cloud computing has two key requirements: virtualized applications and seamless support and integration between the server, networking, storage and hypervisor components. In this paper, we explore these concepts and highlight the critical features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components-with a particular focus on the important role that storage plays in the evolution of the datacenter architecture."
Tags : 
datacenter, architectures, cloud, virtualization, data center design and management
    
Hewlett-Packard
Published By: IBM     Published Date: Apr 03, 2017
Businesses today certainly do not suffer from a lack of data. Every day, they capture and consume massive amounts of information that they use to make strategic and tactical decisions. Yet organizations often lack two critical capabilities when it comes to making the right decisions for the business: the ability to make accurate predictions about the future, and to then use those predicted insights in conjunction with organizational goals to identify the best possible actions they should take. The combination of predictive analytics and decision optimization provides organizations with the ability to turn insight into action. Predictive analytics offers insights into likely scenarios by analyzing trends, patterns and relationships in data. Decision optimization prescribes best-action recommendations given an organization’s business goals and business dynamics, taking into account any tradeoffs or consequences associated with those actions.
Tags : 
predictive analytics, analytics, data analytics, financial marketing, market analytics, data resources, data optimization
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
Customer engagement has emerged as the most critical competitive factor in the current environment. Fueled by widespread mobile access and constant social connectedness, customers are demanding that every interaction, across every channel, be simple, streamlined and seamless. High expectations mean high stakes. When options abound and patience is low, customers don’t stick around. Companies need to get it right the first time. This new customer-centric standard and the ability to connect directly with customers is fueling a depth and breadth of enterprise reinvention. Ensuring that every customer experience across every conceivable channel delights and adds value calls for a Smarter Process approach and a new perspective on business process management.
Tags : 
    
IBM
Start   Previous    75 76 77 78 79 80 81 82 83 84 85 86 87 88 89    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.