RSS feed Get our RSS feed

News by Topic

information system

Results 151 - 175 of 421Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Feb 04, 2015
Read this white paper to discover how to: Accelerate the flow of messages throughout your organization and extend business value outward to smart devices and mobile phones. Create a more-responsive business by supporting rapid, reliable, and secure transport of information between your applications, systems and services. Reduce cost when you diminish complexity and reduce maintenance. Take action to drive
Tags : application systems, application services, it solutions, application complexity
     IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security
     IBM
By: IBM     Published Date: Oct 06, 2015
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : ibm, zero trust model, zero trust, information security, intrusion prevent systems, ips, security
     IBM
By: IBM     Published Date: Oct 13, 2015
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : ibm, security management, mainframe cloud, information management, security, data
     IBM
By: IBM     Published Date: Oct 16, 2015
The core principles of retailing may remain the same but the methods by which retailers must reach out to customers are constantly evolving. As the need for real-time analytics and customer information grows more important, retailers need robust systems to manage the ever-expanding volumes of data.
Tags : customer experience, transaction processing, omnichannel banking, consumer demands, customer interaction, shopper experience, retail, crm & customer care
     IBM
By: IBM     Published Date: Jan 07, 2016
Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data, security, compliance, information
     IBM
By: IBM     Published Date: Jan 07, 2016
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : ibm, security management, mainframe, cloud, information management, security
     IBM
By: IBM     Published Date: Jan 12, 2016
The core principles of retailing may remain the same but the methods by which retailers must reach out to customers are constantly evolving. As the need for real-time analytics and customer information grows more important, retailers need robust systems to manage the ever-expanding volumes of data.
Tags : customer experience, transaction processing, omnichannel banking, consumer demands, customer interaction, shopper experience, retail
     IBM
By: IBM     Published Date: Jan 13, 2016
By using InfoSphere Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of-impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time.
Tags : ibm, data, infosphere, server, data warehousing
     IBM
By: IBM     Published Date: Jan 14, 2016
Built using the IBM® InfoSphere® Information Server, IBM BigInsights® BigIntegrate and BigInsights BigQuality provide the end-to-end information integration and governance capabilities that organizations need.
Tags : ibm, biginsights, bigintegrate, bigquality, data, ecosystem, governance, integration
     IBM
By: IBM     Published Date: Mar 28, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : ibm, talent analytics, kenexa talent insights, workforce science, talent insights
     IBM
By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data security, risk management, big data, security
     IBM
By: IBM     Published Date: Apr 18, 2016
"Built using the IBM® InfoSphere® Information Server, IBM BigInsights® BigIntegrate and BigInsights BigQuality provide the end-to-end information integration and governance capabilities that organizations need."
Tags : ibm, big data, ibm infosphere, ibm biginsights, ibm bigintegrate, ibm bigquality, data management, data quality
     IBM
By: IBM     Published Date: Apr 18, 2016
By using InfoSphere Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of-impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time.
Tags : ibm, big data, ibm infosphere, information empowerment, data integration, data management
     IBM
By: IBM     Published Date: May 16, 2016
The data-driven organization is the new benchmark for success. Firms that harness data to dictate strategic and tactical decisions companywide make more informed business plans, better optimize operations, improve customer interactions, and provide competitive edge. To achieve these benefits, organizations increasingly see data refinement - transforming raw data from various sources into relevant and actionable information and delivering it through self - service access to any user who needs it - as the path toward success by helping break though immature processes and legacy systems. However, data refinement only functions as well as the strategies and approaches behind it. Organizations that do not understand the right way to embrace refinement will fail to catch up to competitors that have mastered the correct approach.
Tags : ibm, forrester, data-driven organization, data, analytics, analytic architecture
     IBM
By: IBM     Published Date: Jun 13, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : ibm, talent acquisition, talent acquisition technology, human resources, recruiting, talent acquisition technology
     IBM
By: IBM     Published Date: Jul 06, 2016
Built using the IBM® InfoSphere® Information Server, IBM BigInsights® BigIntegrate and BigInsights BigQuality provide the end-to-end information integration and governance capabilities that organizations need.
Tags : ibm, big data, ibm infosphere, ibm biginsights, ibm bigintegrate, ibm bigquality, data management, data quality
     IBM
By: IBM     Published Date: Jul 20, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : ibm, talent acquisition, talent acquisition technology, human resources, recruiting, talent acquisition technology
     IBM
By: IBM     Published Date: Oct 28, 2016
What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses? This is referred to as cognitive computing and is key to providing an analytics system that is easy to use but extremely powerful. Listen to this webinar, led by Jackie Ryan, the Director of Product Management for IBM's Smarter Workforce Portfolio, and learn about: The evolution of cognitive computing How cognitive computing transforms HR How to get started with cognitive talent analytics
Tags : ibm, kenexa, talent insights, talent analytics
     IBM
By: IBM     Published Date: Jan 27, 2017
A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamlessly integrate with diverse technologies, from data marts to Apache Hadoop systems. And it must automatically discover, protect and monitor sensitive information as part of big data applications.
Tags : 
     IBM
By: IBM     Published Date: Jan 30, 2017
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : ibm, talent analytics, cognitive computing, analytics, engagement
     IBM
By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
     IBM
By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
     IBM
By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
     IBM
By: IBM     Published Date: May 26, 2017
This white paper is intended for: • Potential users such as analysts and investigators who want information about i2 Analyst’s Notebook Premium and the benefits it provides • System administrators who wish to gain a high-level understanding of the product and the system prerequisites that are needed to install and run the application • Users who wish to learn how to exploit the maximum value of i2 Analyst’s Notebook Premium This document provides an overview of the i2 Analyst’s Notebook Premium product.
Tags : ibm, ibm i2, ibm i2 analyst, notebook premium
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics