Skip to main content
 

ibm mi

Results 426 - 450 of 797Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 05, 2017
Read the IBM IBV CPO Study ebook to learn: - Four steps top procurement groups can take to realize and sustain greater savings than their peers - Three ways top-performing procurement teams achieve a more effective approach to risk mitigation - How top performers use insights from suppliers to bring innovative ideas to the business
Tags : 
ibm, procurement, commerce
    
IBM
Published By: IBM     Published Date: Jan 17, 2017
IBM Commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly and seamlessly.
Tags : 
ibm, commerce, forrester, digital experience
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
This paper explains how business analytics can help retailers select, place and price the right mix of products in stores and channels. It is intended for merchandising teams and associated functions.
Tags : 
ibm, retail, optimize, assortment, analytics, retailers, place, price
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
As a precursor to the IBM Global Chief Marketing Officer (CMO) Study to be published later in 2011, the Economist Intelligence Unit, in cooperation with the IBM Institute for Business Value, conducted an online survey of nearly 300 executives to assess which trends are impacting CMOs and how CMOs are responding to today's complex business environment.
Tags : 
ibm, retail, cmo, trends, business environment, innovate
    
IBM
Published By: IBM     Published Date: Nov 05, 2014
IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, ibm threat protection, security, it security, protection system, threat protection system, prevention, detection
    
IBM
Published By: IBM     Published Date: Nov 25, 2014
Coop Danmark implemented IBM DemandTec Markdown Optimization – delivering insight into the right products to markdown at the best price for the optimal length of time, and helping it maximize the profitability of local price reductions.
Tags : 
ibm, coop, markdown optimization solutions, smarter commerce
    
IBM
Published By: IBM     Published Date: Nov 25, 2014
When empowered customers use multiple channels to engage and purchase, merchants struggle to make optimal merchandising decisions to maximize sales, profit and shopper loyalty. We’ll show you how IBM can help through our portfolio of Omni-Channel Merchandise Optimization solutions.
Tags : 
ibm, ibm experienceone, optimal merchandising, cloud-computing
    
IBM
Published By: IBM     Published Date: Dec 03, 2015
IBM's white paper looks at the trends driving the move to SDN, the implications for the enterprise and the actions you can take to optimize the outcome for your business.
Tags : 
ibm, software defined networking, sdn, enterprise
    
IBM
Published By: IBM     Published Date: Nov 22, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
b2b, cloud integration, value chain optimization, cloud services
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
Defense and intelligence agencies want to leverage the data they collect so they can use artificial intelligence to enhance readiness – but most who run these programs don’t know how to get started and find it difficult to make the business case to their leadership. In this research report, created by GovLoop in partnership with IBM, which provides innovative technology solutions for national security and military intelligence, you’re going to learn where your peers stand—and some practical tips on how to get started—even if you think your data is “dirty” or not ready for advanced applications.
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Aug 05, 2014
IBM® InfoSphere® Master Data Management (MDM) helps organizations gain a comprehensive and accurate 360-degree view of their customers. This 360-degree view, when integrated with a CRM solution such as Salesforce.com, helps organizations improve the effectiveness of their CRM initiatives to help companies: -Increase user productivity -Improve sales and marketing performance to increase win rate and revenue -Mitigate risks associated with poor customer data Download here to learn more!
Tags : 
ibm, salesforce, mdm, crm, initiatives, data
    
IBM
Published By: IBM     Published Date: Aug 28, 2014
IBM value-based archiving solution helps insurer save as much as USD1 million per case.
Tags : 
value-based archiving, litigation costs, ilg, automated email collection
    
IBM
Published By: IBM     Published Date: Aug 28, 2014
Not storing data is cheaper than storing it. As enterprise data continues to grow and IT budgets remain flat, organizations need to more effectively maximize existing storage capacity and manage storage spend based on data value. In this white paper, Enterprise Strategy Group Sr. Analyst Mark Peters demonstrates how IBM's Information Lifecycle Governance solutions can help IT buyers improve the information economics for their organizations by curtailing data growth through defensible disposal of data.
Tags : 
data storage, data value, ilg, data disposal
    
IBM
Published By: IBM     Published Date: Sep 15, 2014
In this white paper, IDC examines how IBM's Storwize family of storage offerings is changing the game by delivering a robust enterprise grade virtualization platform that is efficient, cost-effective, and optimized.
Tags : 
enterprise storage, big data, cloud computing, virtualization platform
    
IBM
Published By: IBM     Published Date: Sep 16, 2014
In a world that demands scalability, modularity, quality, fast performance and a best practices approach is key to ensuring predictable results for the business. IBM’s PowerLinux Open Source Infrastructure Services solution is a workload-optimized system that meets or exceeds best practices for a virtualized infrastructure at a reasonable price point. The PowerLinux solution can help turn today’s IT infrastructure into a well-tuned utility, providing a more flexible, scalable and valuable asset to the business.
Tags : 
virtualized infrastructure, it infrastructure, deployment options
    
IBM
Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail
    
IBM
Published By: IBM     Published Date: Oct 06, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
cloud integration, b2b, value chain, cloud services
    
IBM
Published By: IBM     Published Date: Oct 22, 2014
Not storing data is cheaper than storing it. As enterprise data continues to grow and IT budgets remain flat, organizations need to more effectively maximize existing storage capacity and manage storage spend based on data value. In this white paper, Enterprise Strategy Group Sr. Analyst Mark Peters demonstrates how IBM's Information Lifecycle Governance solutions can help IT buyers improve the information economics for their organizations by curtailing data growth through defensible disposal of data.
Tags : 
data storage, big data, data disposal, data value
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
fraud detection, cybercrime, cyber threat, malware
    
IBM
Published By: IBM MaaS360     Published Date: Jun 30, 2016
Securing mobile productivity for Microsoft Office 365: IBM MaaS360 enables you to deploy Microsoft tools with robust security across all mobile platforms This white paper explains why IBM MaaS360 is the right choice for deploying and securing the Microsoft ecosystem across all mobile platforms, including Microsoft Windows 10. The focus is on enabling IT to efficiently manage enterprise productivity, connectivity and security in the mobile world of today and tomorrow.
Tags : 
ibm, mobile, mobile productivity, microsoft office 365
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
ibm, forrester, enterprise mobile management, mobile
    
IBM MaaS360
Published By: IBM     Published Date: Feb 11, 2015
IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.
Tags : 
ibm, ibm security, continuous diagnostics, network monitoring capabilities, risk-based decision-making
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.
Tags : 
ibm, ibm x-force, ip reputation tracking, iot, security landscape
    
IBM
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.