business approach

Results 376 - 400 of 488Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 02, 2015
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud prevention technology, fraud loss reduction, operating costs
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, it dependence, managing it risk, ibm solutions
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data
    
IBM
Published By: IBM     Published Date: Aug 29, 2016
How to utilize the cloud for your B2B (Business-to-Business) needs and remain focused on the core of your business. Simplify your approach and drive collaboration with your customers and suppliers.
Tags : 
ibm, b2b, cloud, integration, b2b integraton, business to business
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Tags : 
ibm, security, data, privacy, forrester, forrester research
    
IBM
Published By: Group M_IBM Q2'19     Published Date: May 21, 2019
The future of business process management lies in Robotic Process Automation. This report covers the benefits of the technology and other business process optimization approaches that Best-in-Class organizations take to improve efficiency.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Aug 26, 2019
Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives. Read this report to gain a better understanding of: ? Who is most accountable to external parties following a data breach ? The importance for business executives to have visibility into data security metrics ? How to overcome challenges to equip business executives with data security information ? When executive level security tools can improve business executives ability to proactively manage data risk
Tags : 
    
Group M_IBM Q3'19
Published By: IBM     Published Date: Oct 16, 2017
When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I be most concerned with? The point is, not all data deserves equal protection. A more effective approach is to understand: • Which data is most critical (also known as “crown jewels”)? • Where does that data reside? • How is it exposed to security risks? • What potential impact would a security breach to this data have on your organization? • What are the appropriate steps to take based on the data’s criticality?
Tags : 
ibm, data, it security, data analytics
    
IBM
Published By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : 
blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset
    
BlackBerry
Published By: Eaton Corp.     Published Date: Jun 01, 2009
If IT and Facilities could work collaboratively, organizations can operate more efficiently and effectively while still meeting their business objectives.  That's why Eaton® is partnering with organizations that develop IT management systems to create an integrated approach to energy management.  This white paper describes how a joint monitoring and management solution links IT assets, the data center infrastructure and Facilities assets into a holistic perspective aligned with business processes.
Tags : 
white paper, facilities, collaborate, single pane, joint monitoring, management solution, it assets, data center. solutions
    
Eaton Corp.
Published By: SAS     Published Date: Aug 28, 2018
Data integration (DI) may be an old technology, but it is far from extinct. Today, rather than being done on a batch basis with internal data, DI has evolved to a point where it needs to be implicit in everyday business operations. Big data – of many types, and from vast sources like the Internet of Things – joins with the rapid growth of emerging technologies to extend beyond the reach of traditional data management software. To stay relevant, data integration needs to work with both indigenous and exogenous sources while operating at different latencies, from real time to streaming. This paper examines how data integration has gotten to this point, how it’s continuing to evolve and how SAS can help organizations keep their approach to DI current.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
Some organizations focus on the scary aspects of failing to comply with the EU General Data Protection Regulation. But there are many long-term benefits of following through with plans for sustainable GDPR compliance – such as gaining a competitive edge, or developing new products or services. To learn how organizations have approached compliance efforts, SAS conducted a global survey among 183 cross-industry businesspeople involved with GDPR. Based on the results, this e-book delves into the biggest opportunities and challenges faced. Read the e-book to: • Get advice from industry experts. • Find out what steps peers have taken. • Learn how an integrated approach from SAS can continue to guide your journey.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 20, 2019
What’s on the chief data and analytics officer’s agenda? Defining and driving the data and analytics strategy for the entire organization. Ensuring information reliability. Empowering data-driven decisions across all lines of business. Wringing every last bit of value out of the data. And that’s just Monday. The challenges are many, but so are the opportunities. This e-book is full of resources to help you launch successful data analytics projects, improve data prep and go beyond conventional data governance. Read on to help your organization become truly data-driven with best practices from TDWI, see what an open approach to analytics did for Cox Automotive and Cleveland Clinic, and find out how the latest advances in AI are revolutionizing operations at Volvo Trucks and Mack Trucks.
Tags : 
    
SAS
Published By: IBM     Published Date: Jul 06, 2012
Today's businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing.
Tags : 
ibm, technology, software, technology, migration factory, storage
    
IBM
Published By: IBM     Published Date: Apr 04, 2013
Today’s businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in “patterns of expertise” to address complex business and operational tasks for smarter computing.
Tags : 
businesses, ready to approach it, ibm puresystems, efficient, flexible, computing models, infrastructure
    
IBM
Published By: Esker     Published Date: Jun 29, 2017
Getting paid is a top priority for every business. However‚ with the wide variety of invoice formats used along with disputes about pricing or items delivered‚ the process of billing and collections can be a complicated affair. Learn how you can leverage Accounts Receivable (AR) Automation tools to achieve more on-time payments by reading the Institute of Finance & Management’s (IOFM) white paper‚ 8 Steps to a Customer-Centric Approach in Collections. A happy customer today is a customer that will pay! Download the IOFM white paper and discover how to move your business to the top of your customers’ payment lists.
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: Fonality     Published Date: Feb 25, 2013
So,what exactly is a contact center? The term can evoke images of rows of attendants handling calls to sell or service a product.
Tags : 
fonality, contact center, small business, free e-book, customer telephone calls
    
Fonality
Published By: IBM     Published Date: Sep 27, 2013
Today’s businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in “patterns of expertise” to address complex business and operational tasks for smarter computing.
Tags : 
ibm, information technology, systems, integrated systems, expert integrated systems, ibm puresystems, platform system, infastructure system
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases. There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
cisco, byod, wifi, wireless, wlan, productivity, productivity
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
The data center infrastructure is central to the overall IT architecture. It is where most business-critical applications are hosted and various types of services are provided to the business. Proper planning of the data center infrastructure design is critical, and performance, resiliency, and scalability need to be carefully considered. Another important aspect of the data center design is the flexibility to quickly deploy and support new services. Designing a flexible architecture that can support new applications in a short time frame can result in a significant competitive advantage. The basic data center network design is based on a proven layered approach that has been tested and improved over the past several years in some of the largest data center implementations in the world. The layered approach is the foundation of a data center design that seeks to improve scalability, performance, flexibility, resiliency, and maintenance.
Tags : 
    
Cisco
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
Today’s complex, rapidly changing IT environments require dynamic continuity programs. Your peers are reassessing both the service provider model and the internal alternative for business continuity. It’s time to learn the ins and outs of enterprise-class cloud-based continuity. Examine how traditional IT operations can be recovered to the cloud. Explore the requirements of the disaster-recovery-as-a-service model. Understand the key issues to evaluate when considering a cloud-oriented approach to disaster recovery.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity
    
HP Enterprise Services
Published By: HP Enterprise System     Published Date: Apr 03, 2014
SAP HANA is a powerful, in-memory computing platform that streamlines business suite applications, analytics, planning, predictive analysis, and sentiment analysis on a single platform, so businesses can operate in real time. The design approach for enterprise-level solutions involving SAP HANA, and the best practices surrounding them, isn’t intrinsically different from the approach to any other enterprise-level solution for technology implementations. This paper is written to address those elements of good solution design and apply them to the SAP landscape, with particular focus on the SAP HANA element.
Tags : 
sap hana, as a service solution, solutions, cost effective, operational management, accelerate value
    
HP Enterprise System
Published By: Adobe     Published Date: Jan 25, 2018
Are you ready to tackle Business Process Management (BPM) for your enterprise? Do you want to improve efficiency, enhance agility, and also be more profitable? If so, you’re in the right place. BPM is an approach toward managing how an organization operates so it better meets the needs of clients. BPM enables organizations to be more efficient and more capable of change. BPM is exactly what your organization needs to meet the challenges of the modern business climate.
Tags : 
    
Adobe
Published By: Polycom     Published Date: Aug 16, 2017
"Your business has decided to deploy video conferencing and it’s up to you as the IT leader to figure out the right approach. This guide will explain some of the most important considerations when deploying video conferencing and discuss how you need to take into account both the needs of your users and the IT team. "
Tags : 
polycom, video conferencing, skype
    
Polycom
Published By: Polycom     Published Date: Aug 16, 2017
"For decade, the predominant model for deploying voice technology was on premises. However, over the past five years, the opinion of cloud-based voice services, such as Office 365, has changed dramatically. Just five years ago, the majority of businesses either felt that cloud unified communication was not viable or were taking a wait and see approach. Today the majority of respondents are planning a minor or major cloud UC purchase. For Microsoft customers, Skype for Business in Office 365 provides an excellent alternative to a traditional premises-based deployment. Download the paper for Five Do’s and Don’ts When Moving from a Premises-Based PBX to Office 365. "
Tags : 
polycom, office 365, cloud, voice, voip
    
Polycom
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library