RSS feed Get our RSS feed

News by Topic

concerns

Results 126 - 150 of 328Sort Results By: Published Date | Title | Company Name
By: HP     Published Date: Jan 19, 2012
Our networks are under great strain today - more data, video, audio, new applications, mobility, virtualization and so much more. In this program, leading experts from Gartner and HP address your most pressing questions and concerns, including what challenges are weighing most on the public sector?
Tags : technology, networking, puiblic sector organizations, solutions
     HP
By: HP & Intel     Published Date: Sep 18, 2012
Many organizations are considering Virtual Desktop Infrastructure (VDI), which centralizes the execution of users' desktops in the data center, to address growing data loss and endpoint security concerns.
Tags : data protection, desktop virtualization, idv, intelligent desktop virtualization, vdi, virtual desktop infrastructure, backup and recovery, security
     HP & Intel
By: HP - Enterprise     Published Date: Nov 19, 2008
Fortify Software conducted a candid interview with Avi Rubin, Professor at Johns Hopkins University and specialist in the field of eVoting security risks. He discusses the concerns around software security as well as the voting solutions surrounding software independence.
Tags : application security, security risks, voting, fortify, fortify software, avi rubin, security
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Tags : mobile apps, applications, security threats, mobile computing, security vulnerabilities
     HP - Enterprise
By: HP and Intel ®     Published Date: May 06, 2013
This paper examines historical concerns about Linux virtualization, and assesses why, when, and how enterprises can safely virtualize their critical Linux workloads. We also review a Linux virtualization solution that meets enterprise needs -- the powerful combination of Red Hat Enterprise Virtualization and HP ProLiant Servers.
Tags : linux, virtualization, data center, research, enterprise
     HP and Intel ®
By: HPE     Published Date: Oct 07, 2014
So far, most data centers have virtualized their least-critical workloads as a matter of basic cost containment. Virtualizing mission-critical applications is still forthcoming for the majority,though, largely due to infrastructural concerns. Complicating matters is the shift in IT purchasing decisions from IT to business management. Integrated Computing Platforms (ICPs), private cloud computing, and public cloud services all leverage virtualization to achieve a number of IT and business goals, including increased ROI, reduced OpEx, and business process improvement. Now more than ever, it makes sense to explore the benefits of ICPs. Find expert data center considerations here.
Tags : virtualization, data center, cloud, infrastructure, integrated, optimization, solution
     HPE
By: IBM     Published Date: Nov 09, 2012
Applications represent three of the top four software concerns of IT executives. Organizations should consider the varying nature of their application workloads in order to make smarter choices. This Forrester paper looks into the impact of System Z.
Tags : ibm, system z, total economic impact, roi, benefits, agility
     IBM
By: IBM     Published Date: Feb 14, 2014
"Welcome to the age of Social CRM, a different way of thinking about customer relationship management that focuses on using social media to enhance customer engagement. How prepared are companies to make this shift? Despite widespread adoption of social media, for most, Social CRM is still in its early stages, execution is patchy and concerns about ROI remain. To fully exploit the power of social media to connect with customers, organizations need to move beyond isolated projects to integrated programs and, ultimately, a Social CRM strategy."
Tags : ibm, marketing, social media, crm, social crm, customer service, customer interaction, customer relationship
     IBM
By: IBM     Published Date: May 09, 2014
Agile methods have become increasingly popular because they empower organizations to more quickly address emerging opportunities, to better ensure accurate fulfillment of functional requirements and to significantly enhance team productivity. Many organizations, however, are hesitant to employ agile methods for their safety-critical systems—since they have serious concerns about compromising those systems and thereby exposing themselves to completely unacceptable consequences.IBM Rational Chief Evangelist Bruce Powel Douglass explains how best practices for project management can assist organizations in experiencing all the benefits of agile development while continuing to maintain rigorous standards essential for successful delivery of safety-critical systems.
Tags : ibm, agile development, product development, agile methods, safety critical systems development, project management, productivity
     IBM
By: IBM     Published Date: Aug 06, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : ibm, banking, mobility, risk, mitigation, security
     IBM
By: IBM     Published Date: Aug 08, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : security, mobile risk mitigation, mobile baking, detect fraud
     IBM
By: IBM     Published Date: Nov 04, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : mobility, mobile risk, security, mitigation, marketing research, trust and security, mobile marketing, data management/analytics
     IBM
By: IBM     Published Date: Oct 13, 2015
How open source web platforms can open your organization to attack. This paper reviews security concerns with content management systems (CMS), CMS attack metrics, and how organizations can protect websites built on a CMS platform
Tags : ibm, content management system, cms, platform
     IBM
By: IBM     Published Date: Jan 06, 2016
In light of such popularity, many organizations are turning their attention to mobile recruiting. So, how do job seekers use mobile devices in their job searches? Using data from the global IBM WorkTrendsTM survey, the IBM Smarter Workforce Institute (SWI) analyzed why and how potential job seekers use mobile in their job searches and what concerns and expectations they have. The results provide organizations with clear insights into how they can attract talent via mobile technologies.
Tags : ibm, mobile recruitment, recruitment, mobile devices, smarter workforce institute, attracting talent
     IBM
By: IBM     Published Date: Jan 20, 2016
To build an engaged workforce, it is more important than ever to understand and act upon employee ideas, needs and concerns.
Tags : ibm, employee, workforce
     IBM
By: IBM     Published Date: Mar 28, 2016
A successful business case is one that enables your organisation’s business leaders to make the right decision about a Talent Analytics investment. In this report we highlight the key aspects you need to think about as you create your own business case for Talent Analytics, starting with getting a clear handle on why it is a worthwhile investment for your organisation, but also addressing considerations such as budget and resourcing concerns, how you can measure the success of your initiative and demonstrate ROI, and the major risks you need to bear in mind over the lifetime of the initiative.
Tags : ibm, mwd advisors, talent analytics
     IBM
By: IBM     Published Date: Apr 04, 2016
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : ibm, mobile, mobility, mobile risk mitigation, security
     IBM
By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security
     IBM
By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : ibm, mobile, hybrid, buyer's guide, mobile applications, mobile application platforms
     IBM
By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : ibm, data, security, virtualization
     IBM
By: IBM     Published Date: Jul 20, 2016
A successful business case is one that enables your organisation’s business leaders to make the right decisionabout a Talent Analytics investment. In this report we highlight the key aspects you need to think about as you create your own business case for Talent Analytics, starting with getting a clear handle on why it is a worthwhile investment for your organisation, but also addressing considerations such as budget and resourcing concerns, how you can measure the success of your initiative and demonstrate ROI, and the major risks you need to bear in mind over the lifetime of the initiative.
Tags : ibm, mwd advisors, talent analytics
     IBM
By: IBM     Published Date: Jan 19, 2017
The outcome of any big data analytics project, however, is only as good as the quality of the data being used. As big data analytics solutions have matured and as organizations have developed greater expertise with big data technologies he quality and trustworthiness of the data sources themselves are emerging as key concerns. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : ibm, analytics, ecm, data, big data, information governance
     IBM
By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics