ibm

Results 1 - 25 of 3683Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Jun 07, 2017
The 2017 CEI results indicate that brands have significant room for improvement in terms of satisfying customer expectations: On a scale from 0 to 100, the average CEI score is 33. Download this white paper to find out more.
Tags : 
customer experience, customer analytics, customer behavioural analytics, customer experience management
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 07, 2017
This Total Economic Impact (TEI) analysis has been prepared exclusively for you based on your inputs. The analysis provides a high-level estimate of the impact of implementing IBM customer behavior analytics solutions.
Tags : 
customer experience, customer analytics, customer behavioural analytics, customer experience management
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 07, 2017
Read this white paper to discover the 5 best practices for understanding customer journeys.
Tags : 
customer experience, customer journey, satisfaction, customer experience management
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 07, 2017
The analytics tools you’ve come to rely on probably haven’t kept pace with this rapid change, and may now be less effective. Systems may not be nimble enough to follow customer journeys across channels and time. Different platforms in different departments can’t talk to each other, so reporting is slowed. And it’s difficult to take proactive steps when your view of the total customer experience is a little blurry. Download this white paper to find out more.
Tags : 
customer experience, analytics, analytics tools, customer analytics, customer experience management
    
IBM APAC
Published By: IBM     Published Date: Jul 26, 2017
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base. High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-centric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
customer analytics, data matching, big data, competitive advantage, customer loyalty
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
A rewarding customer experience is the central aim for luxury gift company 1-800-Flowers.com: a fast, intuitive shopping process helps keep consumers loyal to its brands. Working with IBM, the company has built a master data management (MDM) system that helps deliver a more seamless experience to shoppers across multiple brands and channels.
Tags : 
1 800 flowers, ibm, e-commerce, case study, master data management
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : 
mdm, big data, automation, organization
    
IBM
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
    
IBM
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: IBM     Published Date: May 26, 2017
This white paper is intended for: • Potential users such as analysts and investigators who want information about i2 Analyst’s Notebook Premium and the benefits it provides • System administrators who wish to gain a high-level understanding of the product and the system prerequisites that are needed to install and run the application • Users who wish to learn how to exploit the maximum value of i2 Analyst’s Notebook Premium This document provides an overview of the i2 Analyst’s Notebook Premium product.
Tags : 
ibm, ibm i2, ibm i2 analyst, notebook premium
    
IBM
Published By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : 
security. ibm, ibm i2, cyber-intelligence, fraud, malware
    
IBM
Published By: IBM     Published Date: Jul 06, 2017
In order to exploit the diversity of data available and modernize their data architecture, many organizations explore a Hadoop-based data environment for its flexibility and scalability in managing big data. Download this white paper for an investigation into the impact of Hadoop on the data, people, and performance of today's companies.
Tags : 
hadoop, flexibility, scalability, data architecture
    
IBM
Published By: IBM     Published Date: Jul 06, 2017
Companies today increasingly look for ways to house multiple disparate forms of data under the same roof, maintaining original integrity and attributes. Enter the Hadoop-based data lake. While a traditional on-premise data lake might address the immediate needs for scalability and flexibility, research suggests that it may fall short in supporting key aspects of the user experience. This Knowledge Brief investigate the impact of a data lake maintained in a cloud or hybrid infrastucture.
Tags : 
data lake, user experience, knowledge brief, cloud infrastructure
    
IBM
Published By: IBM     Published Date: Jul 06, 2017
Known by its iconic yellow elephant, Apache Hadoop is purpose-built to help companies manage and extract insight from complex and diverse data environments. The scalability and flexibility of Hadoop might be appealing to the typical CIO but Aberdeen's research shows a variety of enticing business-friendly benefits.
Tags : 
data management, yellow elephant, business benefits, information management
    
IBM
Published By: IBM     Published Date: Apr 21, 2017
"When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing. Speakers include Liz Miller, Senior Vice President of Marketing for the CMO Council; Jody Sarno, Dedicated Client Partner, Communications Industry for IBM; Chris Crayner, Ch
Tags : 
ibm, senior marketing decision makers, audience targeting, digital experiences, branding
    
IBM
Published By: IBM     Published Date: Apr 21, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
customer experience, branding, customer interaction, technological influence, customer engagement
    
IBM
Published By: IBM     Published Date: Jul 14, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
digital interaction, experience design, interactive experience, cross functional collaboration, customer experience, integrated data
    
IBM
Published By: IBM     Published Date: Jul 14, 2017
Today’s CMO is responsible for selling experiences, not just products. Two-thirds of our respondents regard developing deeper, richer customer experiences as their top marketing priority. Learn how Torchbearer CMOs are meeting these expectations and expanding their roles by putting the entire customer journey first.
Tags : 
cloud computing, mobile solutions, convergence, technology advances, predictive analysis, business value
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, enterprise data, windows, linux, telecommunications, healthcare, consumer banking
    
IBM
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system
    
Bell Micro
Published By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : 
bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system
    
Bell Micro
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture
    
Bell Micro
Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv
    
Bell Micro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: