business approach

Results 276 - 300 of 458Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 10, 2009
In today's business climate, IT organizations need to demonstrate their ability to add value. This white paper from Macehiter Ward-Dutton - an IT advisory firm that specializes in issues of IT-business alignment
Tags : 
the new face of it service management, ibm, aligning business, neil ward-dutton, it architecture, integration, management, organisation and culture, soa, itsm, itil, application integration, business integration, business intelligence, business process management, productivity, project management
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
What do the new ITIL® standards mean for a small business? This view into ITIL best practices in service management shows how you can maximize the business value of your technology. With an adaptable approach, aligning IT operations with business goals to achieve desired results for customers.
Tags : 
itilv3, ibm, value, itil, best practice, cobit, coit, etom, soa, ccta, best practices, service oriented architecture, productivity
    
IBM
Published By: NexGen     Published Date: Feb 09, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now! - See more at: http://www.findwhitep
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
NexGen
Published By: PC Mall     Published Date: Mar 27, 2012
BPM is a discipline and a methodological approach, which changes IT's conversation with the business to an interactive, continuously iterative approach to building solutions. BPM is now at the stage of maturity where it can be a tool for enterprise.
Tags : 
bpm, maturity, methodology, method, businsess procses management, building, business, interactive, enterprise applications
    
PC Mall
Published By: IBM Software     Published Date: Nov 04, 2010
Read this Harvard Business Review article to learn how smart organizations are improving decision-making by identifying and prioritizing decisions; examining factors involved in each decision; designing roles, processes, systems and behaviors to improve decisions; and institutionalizing the new approach through training, refined data analysis, and outcome assessment.
Tags : 
ibm cognos, harvard business review, data analysis, decision management, business analytics, analytical applications
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach.
Tags : 
ibm ouncelab, application security tools, best practices, database management, network security, security management, application security, security, security administration, network security appliance, database development, database security, data warehousing
    
IBM Software
Published By: IBM Corporation     Published Date: May 21, 2012
The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing.
Tags : 
deployment, information technology, smarter computing, integrated systems, platform systems, infrastructure systems
    
IBM Corporation
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.
Tags : 
liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai, business integration, service provider, it systems, it functions, productivity, partner management, core competency, integration platform, change management, edi vendors, data infrastructure, data mapping
    
Liaison Technologies
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
However, risk-averse enterprise IT professionals are understandably cautious about simply moving their entire IT portfolio of resources and services into a 100-percent cloud architecture. As with most technology-adoption curves, enterprises have not embraced an all-or-nothing paradigm, instead preferring a pragmatic, evolution, not revolution approach of cautious incrementalism. This helps them account for their existing investments, custom work, business requirements, and risk posture. Not everything will move to the cloud at least not in the foreseeable future. Thats why so many IT professionals advocate a so-called hybrid approach. But what do we mean by hybrid and how do we optimally balance the various components of a hybrid cloud architecture?
Tags : 
hybrid cloud, pragmatic view, architectures, it professionals, it portfolio, cloud computing
    
Navisite- A Time Warner Cable Company
Published By: IBM     Published Date: Oct 01, 2012
The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing.
Tags : 
deployment, information technology, integrated systems, ibm puresystems, infrastructure, virtualization
    
IBM
Published By: Adobe     Published Date: Apr 17, 2014
Discover new opportunities for maturing your data practicesand building your business results. Youll learn how to move beyond mere web analytics to build a more comprehensive marketing analytics approach that includes mobile, social, and offline channels. And youll see how your current analytics capabilities compare to those of similar organizations and where you have opportunities for improvement.
Tags : 
adobe, analytics, marketing, data collection, data automation, marketing automation, web analytics, marketing analytics, data exploration, automation technology, data practices, marketing solutions, analytical applications
    
Adobe
Published By: SAP     Published Date: Jul 17, 2012
Our Business Model is uniquely focused on generating business value, while our innovative service offerings help you put new ideas to work quickly. We use our knowledge and experience to deliver value and help your business run better to give you direct access to the experts and problem solvers that are best equipped to meet your needs by providing a comprehensive approach to quality improvement and risk reduction.
Tags : 
sap, services, value, innovation, business model, mobile computing, it service management, infrastructure management, project management, mobile data systems, database development, software outsourcing, service management
    
SAP
Published By: SAP     Published Date: Jul 17, 2012
Although IDC is expecting worldwide spending on business analytics software to be $33 billion in 2012, technology is only part of the story. The growing demand for faster response and deeper business insight is forcing companies to adopt a more pervasive approach to business intelligence (BI) that supports evidence-based decision making. Higher BI and analytics competency and pervasiveness are achieved when organizational culture, business processes, and technologies are designed and implemented with the goal of improving or automating all strategic, operational, and tactical decision making capabilities of all stakeholders. Access this paper to learn essential best practices for creating a solid BI and analytics strategy.
Tags : 
sap, best practices, business intelligence, analytics strategy, technology, business management
    
SAP
Published By: IBM     Published Date: Jun 20, 2013
The global financial crisis of 2008 still reverberates today. Sluggish economic growth, stricter regulatory requirements and rapidly changing consumer behavior are placing unprecedented demands on the banking industry. In recent years, banks particularly those with substantial retail operations have relied on the lethargy of their customers to maintain their business. Customer loyalty has been based more on proximity of local branches and convenience of ATM networks than the quality of customer care or products and services priced and tailored to a banks best customers. In response to the financial crisis, banks have focused on wringing complexity and costs from their systems exacerbated by mergers and acquisitions while dealing with new and tighter regulations. Yet, their traditional one-size-fits-all mass-marketing approach to customers has remained constant.
Tags : 
customer-centric, increase revenue, relationships, operations
    
IBM
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business including its information and intellectual property, physical infrastructure, employees, and reputation has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: Review the current threatscape and why it requires this new approach Offer a clarifying definition of what cyber threat Intelligence is Describe how to communicate its value to the business and Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
Box
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.
Tags : 
endpoint security, security policy, mobile devices, networking, security, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.
Tags : 
security, virtualization, cloud computing, trend micro, it management, wireless
    
CDW-Trend Micro
Published By: gyro     Published Date: Sep 10, 2015
In this article, learn why these business leaders are moving to a more innate approach to decision-making, trusting their instinct and relying on soft factors to help guide them.
Tags : 
emotion, technology, decision-making, instinct, company culture, reputation, level of trust
    
gyro
Published By: gyro     Published Date: Sep 10, 2015
In this article, learn why these business leaders are moving to a more innate approach to decision-making, trusting their instinct and relying on soft factors to help guide them.
Tags : 
buyers, emotion, company culture, reputation, soft factors, hard factors
    
gyro
Published By: gyro     Published Date: Sep 10, 2015
Showing a softer side of manufacturing is winning over executives, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the standard manufacturing marketing approach would indicate that hard elements are more compelling, this new research suggests that the opposite is true: A significant majority of business leaders are moving to a more innate approach to decision-making, trusting their gut and relying on soft factors, such as company culture, reputation and level of trust, to help them make decisions.
Tags : 
decision-making, company culture, reputation, emotion, strategy, buyers
    
gyro
Published By: LogicNow     Published Date: Mar 10, 2016
Cyber crime is one of the most innovative businesses in existence today and make no mistake, it is a business. This guide looks at how cyber crime has evolved and continues to evolve - and the necessity now of taking a user-focused approach to network security. If youre in the business of helping your customers businesses stay secure or if youre thinking about it
Tags : 
logicnow, web protection, cyber crime, cyber security, security, best practices, enterprise software, risk management
    
LogicNow
Published By: AWS     Published Date: Oct 31, 2018
In this panel discussion, AWS will join APN IoT Competency Partners, Bsquare (device management software and services), Eseye (global cellular connectivity), and Intel (edge-to-cloud IoT platform spanning sensors, processors, IoT gateways), and cloud infrastructure, for a conversation about the challenges and opportunities of device management. Find out how enterprises can accelerate time to business value with an integrated and fully-managed approach to their connected devices.
Tags : 
aws, iot, device, management, aws
    
AWS
Published By: Red Hat     Published Date: Nov 08, 2017
Industry-leading organizations are now exploiting interoperable business process management (BPM) and mobile application platforms (MAPs) so that process-oriented mobile applications can help transform the way they do business. This paper examines the phenomena driving this trend, and the common approaches to digital transformation that contribute to the enterprise in motion. Read this analyst paper from 451 Research to learn more.
Tags : 
business process management, mobile application platforms, digital transformation, customer experience, adaptive business operations
    
Red Hat
Published By: Stratavia     Published Date: May 21, 2008
This white paper provides an overview of current challenges in the modern data center, the impact those challenges have on the business, and Stratavia’s approach to solving those problems.
Tags : 
data center automation, stratavia, automation, dca, rba, run book automation, operational maturity, operational efficiency, process automation, data center standardization, decision automation, database automation, server provisioning, process automation, networking, distributed computing, infrastructure, internetworking hardware, local area networking, network management
    
Stratavia
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.