RSS feed Get our RSS feed

News by Topic

ibm

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 18, 2017
IBM Compose Enterprise delivers a fully managed cloud data platform on the public cloud of your choice - including IBM SoftLayer or Amazon Web Services (AWS) - so you can run MongoDB, Redis, Elasticsearch, PostgreSQL, RethinkDB, RabbitMQ and etcd in dedicated data clusters.
Tags : ibm, analytics, aps data, database, cloud db toolkit
     IBM
By: IBM     Published Date: Jan 18, 2017
You’ve taken the first step and already know that a document- oriented database is the right database for your application. From here, you still have to decide where and how you’ll deploy the software and its associated infrastructure. These decisions lead to additional considerations around administrative overhead, technical support, open-source options, data sovereignty and security, and more. This paper aims to outline the deployment options available when you select IBM® Cloudant® as your JSON store.
Tags : ibm, cloud, analytics, cloudant managed service, cloudant local, apache couchdb, databases
     IBM
By: IBM     Published Date: Jan 18, 2017
This report is designed to help you make an informed decision about IBM Cloudant. It is based on 43 ratings and reviews of Cloudant on TrustRadius, the trusted user review site for business software.
Tags : ibm, analytics, aps data, database, cloud db toolkit, cloudant
     IBM
By: IBM     Published Date: Jan 26, 2017
This whitepaper talks about how organized criminals and lone fraudsters are continuously adapting to the ever-changing world we live in. Through IBM solutions for insurance fraud prevention, both enterprise and industry-wide financial institutions can prevent future fraud.
Tags : ibm, analytics, insurance fraud, insurance, organized crime
     IBM
By: IBM     Published Date: Jan 26, 2017
The IBM Counter-Fraud Management for Insurance solution is designed to help insurers prevent and intercept attempted fraud while detecting, identifying, and building the case against past fraudulent activity and improper payments.
Tags : ibm, analytics, insurance, counter-fraud management, fraud
     IBM
By: IBM     Published Date: Jan 26, 2017
By taking full advantage of the integration and advanced capabilities currently being offered by leading counter fraud solution providers - including predictive analytics and cognitive computing - enterprises can expect to achieve significantly better outcomes.Aberdeen Group's analysis helps to quantify the value of counter fraud analytics in the insurance industry.
Tags : ibm, analytics, fraud analytics, insurance, fraud
     IBM
By: IBM     Published Date: Feb 01, 2017
White paper from FirforCommerce and IBM on the 5 roadblocks to avoid on the journey to omnichannel retail success.
Tags : ibm, commerce, b2c ecommerce, b2c
     IBM
By: IBM     Published Date: Feb 01, 2017
Self assessment whitepaper allows retailers to determine where they are on the path to omnichannel.
Tags : ibm, omnichannel, commerce, b2c, b2c ecommerce
     IBM
By: IBM     Published Date: Feb 01, 2017
Watch this short video to see how the right commerce solution can help you understand your customers like never before, and deliver exactly what they want.
Tags : ibm, commerce, cloud, b2c ecommerce
     IBM
By: IBM     Published Date: Apr 10, 2017
"Your video business is poised for dramatic growth. Can your provider keep up? SVOD revenues are rising more than 30$ annually. Learn how to avoid common pitfalls and identify a video provider that can grow with you. Download the first entry in IBM Cloud Video’s OTT Success Series to discover: -Important distinctions that can mean the difference between scalable success and an embarrassing false start -How to anticipate and avoid common pitfalls in the OTT 2.0 environment -The right questions to ask when taking your video business to the next level -How the right provider can help you master multiscreen delivery, drive subscriber growth and reduce churn"
Tags : ibm cloud video, video business, scalable success, multiscreen delivery, subscription growth
     IBM
By: IBM     Published Date: Apr 10, 2017
"Finding the right monetization model doesn’t have to be difficult... if you have the right provider. Identifying the right provider now is critical for your monetization strategy, even if it changes over time. Download this exclusive brochure from IBM Cloud Video’s OTT Success Series to learn: -The importance of planning for multiple billing and payment options across multiple international markets and currencies -The critical behind-the-scenes role of asset markup for dynamic advertising insertion -How to understand (and fulfill) metadata demands that differ by distribution avenue"
Tags : ibm cloud video, monetization model, billing, payment, metadata demands, distribution avenues, advertising
     IBM
By: IBM     Published Date: Apr 10, 2017
"Is your premium video content really secure? Don’t let security blind spots compromise your content – or business. Download the latest installment in IBM Cloud Video’s OTT Success Series and discover insights around: -Business logic security and why it matters more than ever -The importance of matching the proper level of security with your intended content use case -New security considerations – and solutions – associated with migration to the cloud"
Tags : ibm cloud video, premium content, cloud migration, security, content
     IBM
By: IBM     Published Date: Apr 10, 2017
"In the world of OTT 2.0, cross-device personalization is critical. (Not to mention really cool.) Deliver the experience your viewers expect with the confidence your business requires. Download this brochure from IBM Cloud Video's OTT Success Series to learn: -The new imperatives for multi-stream, multi-device orchestration -Why live video now demands seamless cross-device interplay -The importance of server-side APIs in allowing for rapid iterations and device extensions"
Tags : ibm cloud video, cross-device personalization, live video, api, device extensions
     IBM
By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : bell micro, sap application, best practices, ibm xiv, storage system
     Bell Micro
By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system
     Bell Micro
By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : bell micro, ibm xiv, storage system management, virtualization architecture
     Bell Micro
By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : bell micro, hardware, storage management, vmware, ibm xiv
     Bell Micro
By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
     Code42
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
     Ounce Labs, an IBM Company
By: Vision Solutions     Published Date: Dec 11, 2008
This paper presents an overview of IBM System i high availability to companies that are beginning to explore this powerful business continuity technology.
Tags : vision, high availability, ibm
     Vision Solutions
By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : vision, high availability, ibm, cdp, aix
     Vision Solutions
By: Vision Solutions     Published Date: Sep 11, 2008
Journaling is a powerful feature, one that IBM has continued to develop and improve over the years. Yet, depending upon your business requirements, you probably still need more protection against downtime than journaling alone can provide. This white paper will cover what you need to know about journaling, what it can do and how it supports and cooperates with high availability software.
Tags : vision, high availability, ibm, idata protection, journaling
     Vision Solutions
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics