business approach

Results 301 - 325 of 482Sort Results By: Published Date | Title | Company Name
Published By: IBM Software     Published Date: Nov 04, 2010
Read this Harvard Business Review article to learn how smart organizations are improving decision-making by identifying and prioritizing decisions; examining factors involved in each decision; designing roles, processes, systems and behaviors to improve decisions; and institutionalizing the new approach through training, refined data analysis, and outcome assessment.
Tags : 
ibm cognos, harvard business review, data analysis, decision management
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach.
Tags : 
ibm ouncelab, application security tools, best practices, database management, network security, security management, application security, security
    
IBM Software
Published By: IBM Corporation     Published Date: May 21, 2012
The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing.
Tags : 
deployment, information technology, smarter computing, integrated systems, platform systems, infrastructure systems
    
IBM Corporation
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.
Tags : 
liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai
    
Liaison Technologies
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
However, risk-averse enterprise IT professionals are understandably cautious about simply moving their entire IT portfolio of resources and services into a 100-percent cloud architecture. As with most technology-adoption curves, enterprises have not embraced an “all-or-nothing” paradigm, instead preferring a pragmatic, “evolution, not revolution” approach of cautious incrementalism. This helps them account for their existing investments, custom work, business requirements, and risk posture. Not everything will move to the cloud – at least not in the foreseeable future. That’s why so many IT professionals advocate a so-called “hybrid” approach. But what do we mean by “hybrid” and how do we optimally balance the various components of a hybrid cloud architecture?
Tags : 
hybrid cloud, pragmatic view, architectures, it professionals, it portfolio
    
Navisite- A Time Warner Cable Company
Published By: IBM     Published Date: Oct 01, 2012
The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing.
Tags : 
deployment, information technology, integrated systems, ibm puresystems
    
IBM
Published By: Adobe     Published Date: Apr 17, 2014
Discover new opportunities for maturing your data practices—and building your business results. You’ll learn how to move beyond mere web analytics to build a more comprehensive marketing analytics approach that includes mobile, social, and offline channels. And you’ll see how your current analytics capabilities compare to those of similar organizations and where you have opportunities for improvement.
Tags : 
adobe, analytics, marketing, data collection, data automation, marketing automation, web analytics, marketing analytics
    
Adobe
Published By: SAP     Published Date: Jul 17, 2012
Our Business Model is uniquely focused on generating business value, while our innovative service offerings help you put new ideas to work quickly. We use our knowledge and experience to deliver value and help your business run better to give you direct access to the experts and problem solvers that are best equipped to meet your needs by providing a comprehensive approach to quality improvement and risk reduction.
Tags : 
sap, services, value, innovation, business model, mobile computing, it service management, infrastructure management
    
SAP
Published By: SAP     Published Date: Jul 17, 2012
Although IDC is expecting worldwide spending on business analytics software to be $33 billion in 2012, technology is only part of the story. The growing demand for faster response and deeper business insight is forcing companies to adopt a more pervasive approach to business intelligence (BI) that supports evidence-based decision making. Higher BI and analytics competency and pervasiveness are achieved when organizational culture, business processes, and technologies are designed and implemented with the goal of improving or automating all strategic, operational, and tactical decision making capabilities of all stakeholders. Access this paper to learn essential best practices for creating a solid BI and analytics strategy.
Tags : 
sap, best practices, business intelligence, analytics strategy, technology
    
SAP
Published By: IBM     Published Date: Jun 20, 2013
The global financial crisis of 2008 still reverberates today. Sluggish economic growth, stricter regulatory requirements and rapidly changing consumer behavior are placing unprecedented demands on the banking industry. In recent years, banks – particularly those with substantial retail operations – have relied on the lethargy of their customers to maintain their business. Customer loyalty has been based more on proximity of local branches and convenience of ATM networks than the quality of customer care or products and services priced and tailored to a bank’s best customers. In response to the financial crisis, banks have focused on wringing complexity and costs from their systems – exacerbated by mergers and acquisitions – while dealing with new and tighter regulations. Yet, their traditional “one-size-fits-all” mass-marketing approach to customers has remained constant.
Tags : 
customer-centric, increase revenue, relationships, operations
    
IBM
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape
    
Cyveillance
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware
    
Box
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.
Tags : 
endpoint security, security policy, mobile devices
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands— while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.
Tags : 
security, virtualization, cloud computing, trend micro
    
CDW-Trend Micro
Published By: gyro     Published Date: Sep 10, 2015
In this article, learn why these business leaders are moving to a more innate approach to decision-making, trusting their instinct and relying on “soft” factors to help guide them.
Tags : 
emotion, technology, decision-making, instinct, company culture, reputation, level of trust
    
gyro
Published By: gyro     Published Date: Sep 10, 2015
In this article, learn why these business leaders are moving to a more innate approach to decision-making, trusting their instinct and relying on “soft” factors to help guide them.
Tags : 
buyers, emotion, company culture, reputation, soft factors, hard factors
    
gyro
Published By: gyro     Published Date: Sep 10, 2015
Showing a softer side of manufacturing is winning over executives, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the standard manufacturing marketing approach would indicate that hard elements are more compelling, this new research suggests that the opposite is true: A significant majority of business leaders are moving to a more innate approach to decision-making, trusting their gut and relying on “soft” factors, such as company culture, reputation and level of trust, to help them make decisions.
Tags : 
decision-making, company culture, reputation, emotion, strategy, buyers
    
gyro
Published By: LogicNow     Published Date: Mar 10, 2016
Cyber crime is one of the most innovative businesses in existence today – and make no mistake, it is a business. This guide looks at how cyber crime has evolved and continues to evolve - and the necessity now of taking a user-focused approach to network security. If you’re in the business of helping your customers businesses stay secure – or if you’re thinking about it
Tags : 
logicnow, web protection, cyber crime, cyber security
    
LogicNow
Published By: AWS     Published Date: Oct 31, 2018
In this panel discussion, AWS will join APN IoT Competency Partners, Bsquare (device management software and services), Eseye (global cellular connectivity), and Intel (edge-to-cloud IoT platform spanning sensors, processors, IoT gateways), and cloud infrastructure, for a conversation about the challenges and opportunities of device management. Find out how enterprises can accelerate time to business value with an integrated and fully-managed approach to their connected devices.
Tags : 
aws, iot, device, management, aws
    
AWS
Published By: Red Hat     Published Date: Nov 08, 2017
Industry-leading organizations are now exploiting interoperable business process management (BPM) and mobile application platforms (MAPs) so that process-oriented mobile applications can help transform the way they do business. This paper examines the phenomena driving this trend, and the common approaches to digital transformation that contribute to the enterprise in motion. Read this analyst paper from 451 Research to learn more.
Tags : 
business process management, mobile application platforms, digital transformation, customer experience, adaptive business operations
    
Red Hat
Published By: Stratavia     Published Date: May 21, 2008
This white paper provides an overview of current challenges in the modern data center, the impact those challenges have on the business, and Stratavia’s approach to solving those problems.
Tags : 
data center automation, stratavia, automation, dca, rba, run book automation, operational maturity, operational efficiency
    
Stratavia
Published By: Sitecore     Published Date: Mar 03, 2016
Studies show mobile consumers look at their phones an average of 1,500 times each week and spend 177 minutes on their phone each day. With every swipe, tap, and zoom, iCustomers are learning to expect that every business look, feel, and act just like their favorite mobile app. What’s a marketer to do? Access this eBook, written by Brian Solis, globally recognized as one of the most prominent thought leaders in business innovation, to delve into mobile consumer behavior and how it requires a different approach.
Tags : 
    
Sitecore
Published By: IEX     Published Date: May 27, 2008
Customers and business leaders alike demand a great deal of contact centers which cannot easily be met using the simplistic approaches used to develop early, isolated contact centers. In order to provide a top-shelf customer experience, contact centers must adopt sophisticated processes which can evaluate and route calls quickly and effectively to the right agent, and which schedule agents based on their abilities as well as predicted call demand.
Tags : 
call center management, customer service, workforce management, contact management, iex, contact center, call center
    
IEX
Published By: Oco, Inc.     Published Date: Nov 12, 2008
Many companies have business intelligence (BI) tools and infrastructure that serve their business’ needs; however, certain functional departments, business units, or key business initiatives often don’t yet have the BI tools that they need in place.  There is a new approach to BI to address those pressing business needs that leverages the existing BI infrastructure and can deliver value to the business in weeks rather than months and at a fraction of the cost of a traditional BI solution. Learn how Complementary BI leverages Software-as-a-Service (SaaS) BI solutions to address targeted business needs in a way that complements in-house BI systems, leading to a win-win situation for business users and IT analytical tools to business users.
Tags : 
oco, business intelligence, software-as-a-service, roi
    
Oco, Inc.
Published By: YouSendIt     Published Date: Oct 26, 2011
Mail server management is a balancing act between server performance and user satisfaction. In this white paper from Osterman Research, find out how to improve mail server performance and boost user productivity by integrating a secure, cloud-based file sharing solution into your Microsoft Exchange migration. In addition, learn why integration plays a key role, and how choosing a solution that works seamlessly with Outlook can support how users want to communicate, while reducing the burden on IT. The Osterman white paper is offered courtesy of YouSendIt, the first business content collaboration service to offer an integrated approach for sending, sharing and signing documents online. Download the white paper.
Tags : 
yousendit, technology, email, exchange, windows. osterman research
    
YouSendIt
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library