ibe

Results 476 - 500 of 1118Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 31, 2016
"Colorado-based, Elevations Credit Union has transformed their organizational performance, reducing the average time to fund a home equity loan by 61% and increasing the number of loans that each underwriter handles by 71%. By modeling, analyzing, and improving their existing processes, Elevations has been able to drive out inefficiencies and increase their revenues by delighting their customers. IBM Blueworks Live is the tool that’s been at the heart of Elevations gaining visibility and insight into their existing processes, and helping them drive cross-enterprise engagement and viral cultural change. Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige
Tags : 
ibm, middleware, ibm blueworks live, process improvement, organizational performance, cloud
    
IBM
Published By: Plantronics     Published Date: Sep 27, 2013
The future of work is mobile. Liberated by the internet and new mobile solutions, more and more businesses are embracing flexible working arrangements in which employees work from wherever they want. Smart businesses utilising flexible working know that it’s no longer about the hours you work—it’s about results. These businesses are freeing themselves and their employees from the burden of counting hours and minutes worked, and are now focusing on output.
Tags : 
mobile, internet, mobile solutions, technology, flexible working, remote access
    
Plantronics
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
General Cable operates 28 manufacturing locations in 8 countries and is a leader in the development, design, manufacture, marketing and distribution of copper, aluminum and fiber optic wire and cable products. Their products are widely used in communications, energy, industrial and speciality markets. General Cable has nearly 300 suppliers of raw material for their US operations.
Tags : 
supply chain, scm, supply chain connect, business management, erp, manufacturing, manufacture, edi
    
Supply Chain Connect
Published By: Appistry     Published Date: Oct 11, 2007
This white paper describes how software-based, real-time grid environments -- i.e. application fabrics -- are successfully meeting the requirements of today's most demanding applications, delivering scalability, manageability and affordability.
Tags : 
application, application performance, application performance management, application fabric, application fabrics, grid computing, appistry
    
Appistry
Published By: IBM     Published Date: Feb 13, 2007
This paper describes IBM's experience with and the benefits achieved from basic network convergence and IP telephony, the convergence of applications, and the ability to transform the enterprise business model.
Tags : 
networking, convergence, ip telephony, network management, network convergence, business integration, application integration, ibm
    
IBM
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Box     Published Date: Jun 22, 2018
• There are many opportunities for businesses to introduce the concept of paper-free or less intensive paper processes to their organizations. AIIM 2016 Industry Watch research found that “58% of respondents described their inbound handling of content as ad-hoc”. This is not surprising given paper is still fairly dominant in many businesses due to human desire to keep paper in hand for reading, note taking, and still today, signatures. • In this study we take a look the challenges businesses face in relation to: o Digital Transformation of their business operations o Capturing and managing multi-channel inbound content, including paper o Steps taken to automate the information capture process o Use of analytics to enhance the identification and classification of capture information o A look ahead at the next 5 years to understand where businesses are focusing their efforts and funding
Tags : 
    
Box
Published By: SAS     Published Date: Aug 27, 2010
This report describes a research project that investigated how organizations are attempting to improve specific decisions.
Tags : 
sas, data management, decision making, tom davenport, decision making, iia, international institute of analytics
    
SAS
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : 
trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security
    
Trend Micro Inc.
Published By: rPath     Published Date: Dec 10, 2010
This paper describes how rPath's centralized hub becomes the control infrastructure for managing IT system construction and change. This hub becomes the basis for managing and reusing standardized system components.
Tags : 
rpath, application delivery automation, integration, lifecycle management, enterprise appliances
    
rPath
Published By: Infacta     Published Date: Jan 22, 2007
Online consumers demand relevance, so list builders must focus on building large, highly-relevant lists rather than just gathering a bunch of email addresses. In this article, the author will discuss list size, registration methods, data collection and permission requirements.
Tags : 
subscriber list, subscription list, email marketing
    
Infacta
Published By: Boomtrain     Published Date: Mar 29, 2016
Learn how to get more value out of your traffic by turning nameless visitors into loyal, engaged subscribers.
Tags : 
audience development, user engagement, audience engagement, audience retention, user retention, content personalization, email personalization, web personalization
    
Boomtrain
Published By: Yesler     Published Date: Oct 29, 2014
Today’s B2B buyers are on the hunt for information. Your job as a marketer is to provide them with the content they are looking for - but first you have to know who they are and what they need to know. Get to know your buyers better by building composite profiles that describe their pain points, motivations, definitions of success, preferred communication channels, and more.
Tags : 
buyer personas, b2b buyers, content marketing, communication channels, content maps, b2b marketing, buyer journey, market research
    
Yesler
Published By: TeamQuest     Published Date: Sep 09, 2013
This paper describes the fundamental steps for performing capacity planning.
Tags : 
teamquest, capacity planning, cost effective, fundamental
    
TeamQuest
Published By: TeamQuest     Published Date: Apr 09, 2014
The goal of capacity planning is to provide satisfactory service levels to users in a cost-effective manner. This paper describes the fundamental steps for performing capacity planning. Real life examples are provided using TeamQuest® Performance Software.
Tags : 
teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance
    
TeamQuest
Published By: IBM     Published Date: Jun 23, 2015
Watch this webinar to hear the VP of Enterprise Data Management for Sutter Health, Vijay Venkatesan describe the challenges and successes that Sutter Health faced in driving their enterprise wide data strategy.
Tags : 
ibm, customer data, customer insight, data management, medical records, medical intelligence
    
IBM
Published By: Euler Hermes     Published Date: Jun 11, 2019
Like it or not, dealing with risk is part and parcel of what it takes to grow a business. Many serial entrepreneurs who notch up multiple success stories will describe themselves as risk-takers. One of the UK’s most famous examples, Sir Richard Branson, published a book called “ Screw It, Let’s Do It,” reflecting his willingness to take a chance even if the odds were stacked against him.
Tags : 
    
Euler Hermes
Published By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : 
compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis
    
Intellitactics
Published By: Lenovo     Published Date: Sep 11, 2012
Discover why IT Managers are recommending Lenovo's ThinkPad Carbon as an essential tool for a busy workforce that's always on the go.
Tags : 
macbook air, apple, ibm, lenovo, carbon fiber, infographic, laptop, mobile computer
    
Lenovo
Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
    
Webroot
Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global
Published By: HP     Published Date: Jul 22, 2014
HP offers an approach to the modern data center that addresses systemic limitations in storage by offering Tier-1 solutions designed to deliver the highest levels of flexibility, scalability, performance, and quality—including purpose-built, all-flash arrays that are flash-optimized without being flash-limited. This white paper describes how, through the incorporation of total quality management throughout each process and stage of development, HP delivers solutions that exceed customer quality expectations, using HP 3PAR StoreServ Storage as an example.
Tags : 
3par, storeserv, storage, data, solutions, flash
    
HP
Published By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes how HP LeftHand SANs can help you deploy VMware Infrastructure 3 (VI3) software more effectively through volume snapshots, SmartClone volumes, volume migration, and high-availability features. With HP LeftHand SAN and VI3, organizations can reclaim valuable data center space and reduce their power and cooling requirements.
Tags : 
san, storage area networks, vmware, software, migration
    
HP Virtualization
Published By: HP     Published Date: Jun 02, 2008
VMware describes their partnership with HP storage and how the HP StorageWorks EVA4400 is a great fit for many small and medium businesses that want the advantages of virtualization.
Tags : 
hp eva 4000, hp eva 4400, storage, storage virtualization, virtualization, virtual storage
    
HP
Published By: HP     Published Date: Oct 22, 2008
HP is pleased to introduce disk encryption for the HP StorageWorks XP24000 and HP StorageWorks XP20000 Disk Arrays. This white paper describes the encryption feature including the background of what the challenge is that the product addresses, what the feature consists of and how it is ordered.
Tags : 
disaster proof, 4aa2-2629enw, xp24000, xp20000, disk arrays, encryption, storageworks
    
HP
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.