dynamic it

Results 351 - 375 of 467Sort Results By: Published Date | Title | Company Name
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Threat intellegence can even up the battle between attackers and defenders. This 31 page report from Securosis defines Threat Intellegence and discusses how you can leverage threat intelligence to shorten the window between compromise and detection.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Gleanster Research     Published Date: Oct 20, 2013
This research study from Gleanster "From Batch-and-Blast to Lead Nurturing: How Top Performers overcame legacy practices to embrace the new dynamics of B2B marketing." outlines how Top Performing organizations made the switch to marketing automation.
Tags : 
    
Gleanster Research
Published By: IBM     Published Date: Nov 12, 2013
Customers are more demanding, the competitive landscape is more dynamic, and the very structure of companies is evolving rapidly. What can executives and business leaders do to stay ahead of the curve? Read this eBook to find out how software as a service (SaaS) can transform your business into a more competitive, customer-centric organization.
Tags : 
software as a service, saas, executive, saas solutions, business process innovation, analytics
    
IBM
Published By: IBM     Published Date: Aug 14, 2014
IBM® Mobile Web Push allows marketers to influence and inform their mobile audience in innovative ways. Web push notifications are dynamically triggered for display on mobile websites based on the actions of your visitors. This personalization is possible without the complications of existing content management, advertisement servers or IT involvement.
Tags : 
ibm, mobile, web push, free notifications, marketing
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Driving the right interaction at the right time. This paper examines the need to uncover and understand the dynamic roles and changing needs of individuals, the importance of synchronizing interactions with these changing needs, and how predictive analytics can drive customer intimacy by facilitating 1:1 interactions.
Tags : 
predictive analytics, customer interaction, crm, business analytics, marketing attributes
    
IBM
Published By: IBM     Published Date: Nov 05, 2014
IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, ibm threat protection, security, it security, protection system, threat protection system, prevention, detection
    
IBM
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization has changed the data center dynamic from static to fluid. While workloads used to be confined to the hardware on which they were installed, workloads today flow from host to host based on administrator-defined rules, as well as in reaction to changes in the host environment. The fluidic nature of the new data center has brought challenges to resource allocation; find out how your organization can stay ahead of the curve. Read the White Paper"
Tags : 
best practices, cpu, memory, storage, vsphere, virtual
    
Dell
Published By: IBM     Published Date: Feb 11, 2015
BM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, threat protection system, automated response capabilities, it security practices
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.
Tags : 
security solutions, layered protection, protect data, advanced analytics, ibm
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : 
cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility
    
IBM
Published By: IBM     Published Date: Dec 11, 2015
Social Technologies have the potential to transform businesses. By enabling new levels of speed and agility, they can drive innovation and shift the dynamics of how people interact with each other.
Tags : 
    
IBM
Published By: IBM     Published Date: Mar 31, 2016
"Cloud, Mobile and Social are today's communication and engagement models for customers, employees and partners. And to support these models, your infrastructure needs to be simple, flexible, stable, scalable and highly secure. While the changing market dynamics provide growth opportunities for businesses, capitalizing on them requires organizations to build new capabilities that: Enable continuous delivery of new features Shorten product innovation time to market Bring the business value chain closer to customers, partners and employees
Tags : 
ibm, websphere application server, java ee 7, it transformation, cloud, middleware
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Web conferencing is emblematic of the dynamic blend of content and collaboration in the digital workplace. Conferencing markets converge as audio, video and Web mix with persistent spaces to enable faster decisions and remote teamwork. Read this Gartner review to see how IBM is recognized as a leader in the web conferencing market.
Tags : 
ibm, enterprise social solutions, enterprise applications, web conferencing, collaboration, digital workplace, gartner, magic quadrant
    
IBM
Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty
    
IBM
Published By: IBM     Published Date: Dec 15, 2016
Watch to learn: - How to tackle the challenge of multi-speed IT with WebSphere Application Server's unique approach to delivering application infrastructure based on Java EE 7 - How to provide continuous availability for running modern apps that require on-demand dynamic scalability and high operational resiliency - How the lighweight and modular architecture of WebSphere Liberty provides an ideal foundation to develop and deploy microservices - How to deliver flexibility to develop, deploy and consume application infrastructure - on-premises or on the cloud, including emerging virtualization technologies such as Docker - How to manage and monitor thousands of applications and servers with a single management interface for ease of problem determination
Tags : 
ibm, middleware, it transformation, websphere application server
    
IBM
Published By: IBM     Published Date: Apr 03, 2017
Businesses today certainly do not suffer from a lack of data. Every day, they capture and consume massive amounts of information that they use to make strategic and tactical decisions. Yet organizations often lack two critical capabilities when it comes to making the right decisions for the business: the ability to make accurate predictions about the future, and to then use those predicted insights in conjunction with organizational goals to identify the best possible actions they should take. The combination of predictive analytics and decision optimization provides organizations with the ability to turn insight into action. Predictive analytics offers insights into likely scenarios by analyzing trends, patterns and relationships in data. Decision optimization prescribes best-action recommendations given an organization’s business goals and business dynamics, taking into account any tradeoffs or consequences associated with those actions.
Tags : 
predictive analytics, analytics, data analytics, financial marketing, market analytics, data resources, data optimization
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on-premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
ibm, encryption, hybrid-cloud, data protection
    
IBM
Published By: Seagate Technology     Published Date: Apr 14, 2015
Surveillance is an incredibly dynamic industry that continues to grow at an exponential rate. According to IHS, the industry experienced 12 percent growth last year, and is projected to expand even more this year. Are you keeping up with the trends that are fueling this momentum? More importantly, are you capitalizing on the trends that can give you a profitable competitive advantage? This article will show you what to watch out for and provide some insight you can implement that will help you and your customers do just that.
Tags : 
video surveillance, ip network cameras, city surveillance, utilities, panoramic network cameras
    
Seagate Technology
Published By: Microsoft Dynamics     Published Date: Apr 13, 2007
Read how demand planning software packages can help manufacturers to establish baseline sales forecasts, incorporating multiple inputs; perform sophisticated analysis that improves their use of human and capital resources; and better understand their markets and customers.
Tags : 
microsoft dynamics, microsoft, microsoft white papers, microsoft, dynamics
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
This white paper addresses business and technical decision-makers for ambitious companies in which product distribution and transportation play key roles in daily operations and profitability. It describes how the comprehensive, integrated management solution represented by Supply Chain Execution for Microsoft Dynamics AX can help build an integrated logistics solution.
Tags : 
scm, supply chain, radio frequency, rfid, inventory, transportation management, asset management, warehouse
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
The CPG manufacturing industry is large and thriving; however, margins are slim and competition is furious. There are hundreds of product categories, and to compete, firms must constantly innovate. How can the small-to-medium CPG manufacturer survive in the face of the same external pressures and fewer resources?
Tags : 
retailer, consumer goods, manufacturing, manufacturer, scm, supply chain, supply chain management, microsoft
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
By providing integrated, adaptable functionality within one scalable platform, Microsoft Dynamics AX helps midsize retailers improve their agility with an all-in-one solution based on an open technology platform. And it provides the ability for retailers to connect and interact with customers, partners, and employees around the world.
Tags : 
retailer, enterprise resource, erm, erp, financial, enterprise software, merchandising, accounting
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
This paper introduces various supply chain concepts and explains their importance. It describes initiatives being undertaken by the largest retailers and reviews what small and mid-size firms need to do to compete.
Tags : 
retailer, enterprise resource, erm, erp, sales software, sales management, scm, supply chain
    
Microsoft Dynamics
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search