Sort results by: Published date | Company name
Showing items 1-25

Case Study: Cadence Design Systems Finds Customer-Critical Bugs with UndoDB for Linux [ Source: Undo Software ]

September 2014- Developers of complex C++ code for memory-intensive software applications need greater insight into their code during debug. The situation intensifies when it's a customer-critical bug and the data needed can't leave the customer's site. This case study describes how Cadence Design Systems, a leading company in the electronic design automation (EDA) segment, utilized UndoDB for internal debug of complex Linux applications and collaborated to utilize UndoDB for onsite customer-critical bugs.

Executive Guide to Agile BPM - A Readiness Assessment [ Source: Fujitsu America Inc. ]

August 2014- For years, business process management (BPM) solutions have focused primarily on long-running, routine, and seldom-changing processes. BPM has successfully guided system integration and provided business intelligence and monitoring for a wide variety of predictable, repetitive tasks and activities.

But in this era of information-driven enterprises, routine automation is no longer enough. BPM must become smarter and nimbler. You need it to address your non-routine, ad-hoc processes such as customer service management or incident ...

Case Study: Business Process Discovery and Improvement at Leading U.S. Bank [ Source: Fujitsu America Inc. ]

August 2014- At the close of 2008, after the tumultuous financial crisis afflicting Wall Street, a leading U.S. bank had completed U.S. government sponsored acquisitions of a prominent investment bank and a large mortgage lender. Through these acquisitions the bank had become a much larger organization with many areas of redundancy, including what they had determined to be a bloated technology infrastructure and headcount levels.

In order to improve efficiency, reduce headcounts and manual ...

WHITE PAPER: Enabling Process Intelligence Through Process Mining & Analytics [ Source: Fujitsu America Inc. ]

August 2014- Are you searching for methods to readily identify bottlenecks or inefficiencies in your critical business processes?? Do you find it is difficult and costly to conduct process investigation in order to visualize the process flows?

To be successful in today's increasingly transparent and competitive business world, organizations need to provide visibility into business processes while optimizing their use of internal resources to improve business performance. Accomplishing these goals requires powerful data collection and ...

Case Study: A Multinational Energy Company Utilizes Automated Process Discovery Technology to Improve its Plant Operations [ Source: Fujitsu America Inc. ]

August 2014- Gaining true visibility into the critical business processes of an organization is not an easy task. Identifying the root causes of the process bottlenecks and inefficiencies can be extremely difficult and costly.

Gartner Report: Top Actions for Healthcare Delivery Organization CIOs: Get Realistic About HIPAA Security [ Source: Absolute Software ]

August 2014- HDO CIOs in all countries should leverage increasing public attention to privacy breaches to move accountability for information security and privacy up as close to the board as possible. In the U.S., news stemming from the HITECH changes for HIPAA is creating special opportunities.

HIPAA Violations Incur Multi-Million Dollar Penalties [ Source: Absolute Software ]

August 2014- HIPAA regulations have undergone major changes in the last few years, giving both the federal and state Governments new powers and enhanced resources to pursue HIPAA violations. Read about some recent breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.

Case Study: Rhode Island Blood Center [ Source: Absolute Software ]

August 2014- Rhode Island Blood Center had no asset tracking on their latptops and began to worry about what would happen if a laptop, and the confidnetial donor information it contained, went missing or was stolen. They needed the ability to remotely track the whereabouts of these laptops and secure the confidential data contained within them. This is more important that ever with the increasingly enforced penalties for data breaches by HIPAA. Find out how Rhode Island ...

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce [ Source: Absolute Software ]

August 2014- The Intelligrated IT Department was concerned about potential laptop theft, and needed a solution that would allow them to track and secure laptops in the field. After researching available options, they chose Absolute Computrace.

Daily Federal Compliance & Continuous Cybersecurity Monitoring [ Source: Thundercat Technology / SolarWinds ]

August 2014- Each U.S. federal agency must implement information security safeguards, audit these safeguards annually, and make an accounting to the Office of Management and Budget (OMB). However, agencies face a number of challenges in implementing and monitoring these safeguards such as constantly-changing IT systems and a lack of specialized tools.

The good news is that even seemingly small measures can have a significant impact. In this white paper, we discuss:

• ...

Magic Quadrant for Master Data Management of Customer Data Solutions [ Source: IBM ]

August 2014- This Gartner's Magic Quadrant offer insight into the part of the packaged MDM solution market that focuses on how organizations master and share a "single version" of customer data.

Big Data Integration and Governance Considerations for Healthcare [ Source: IBM ]

August 2014- This white paper discusses how IBM InfoSphere can support the integration and governance of Big Data in healthcare. The white paper reviews three case studies including predictive analytics with Electronic Medical Records, time series data in a neonatal intensive care unit and predictive pathways for disease.

Supercharge Salesforce.com Initiatives with a 360 View of the Customer [ Source: IBM ]

August 2014- Salesforce.com is an industry leading cloud CRM solution which helps organizations streamline and effectively manage sales processes, customers and opportunities. The effectiveness of these initiatives can be improved dramatically by providing Salesforce with a 3600 view of the Customer to overcome the limitation of fragmented data that Salesforce currently relies on. This paper discusses how InfoSphere capabilities can be used to create comprehensive and accurate 3600 views of your customers from internal and external sources. This ...

The MDM advantage: Creating insight from big data [ Source: IBM ]

August 2014- To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM InfoSphere Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions ...

Enhance the 360 Degree View of Your Customer [ Source: IBM ]

August 2014- Gaining a more complete, trusted view of customers is a strategic goal of most organizations. The challenge is that information about customers is typically managed and stored in many different applications, management systems and data silos. And this challenge is often compounded by a lack of consistency from one application to the next.

The combination of IBM InfoSphere Data Explorer and IBM InfoSphere Master Data Management addresses these challenges by creating a single, ...

Choosing a Partner for Enterprise Cloud Production Workloads [ Source: IBM ]

August 2014- The right managed clouds can effectively support production workloads while simultaneously helping companies seize new business opportunities.

Under Cover of Cloud: CAI Global Cloud Study [ Source: IBM ]

August 2014- 20% of organizations have discovered a secret source of competitive differentiation. It allows them to serve customers in new ways, reimagine their business models, surface valuable insights from their data and tap expertise across the enterprise. The secret: Cloud computing.

3 Must-Haves for Rugged Devices [ Source: Dell/Microsoft ]

August 2014- A rugged device is just one piece of a mobile solution for highly demanding environmental work environments. Support, security, and manageability will keep employees in the field, on the road, and in the harshest conditions. Download this whitepaper to learn more about how to find the right combination of rugged mobile notebooks and services to meet the demands of your end users.

A Modern Approach to the Data Del Uge [ Source: Red Hat ]

August 2014- From physical to virtual to cloud, I.T. organizations have adopted increasingly complex technologies as their enterprises demand greater agility. It's left to I.T. leaders and their organizations to manage this complexity, keeping operating costs low while delivering on ever-increasing SLA expectations. With the rapid growth in unstructured data volumes, I.T. organizations are turning their attention to storage to eliminate costs and inefficiencies while increasing performance, security, and reliability.

Scale-out File Sync and Share [ Source: Red Hat ]

August 2014- File sync and share capabilities are now considered essential by an increasingly mobile and productive work force. While consumer-grade, cloud-based file sync and share solutions often provide a convenient data storage medium, they are outside of corporate control and data policies, and represent a serious concern for enterprise IT departments. To address these shortcomings, ownCloud, Red Hat, and HP have worked together to provide a cost-effective and scalable file sync and share solution that is ...

Fight Cyber Crime with Splunk, Cisco, and Red Hat [ Source: Red Hat ]

August 2014- The cost of cyber crime across the globe has already grown to $100 billion annually, not counting the intangible damage to enterprise and government security. In addition to the data loss and security breach, there is immeasurable, and sometimes irrevocable, damage to the brand.

Analyzing machine data from firewalls and perimeter devices in real time to thwart - and predict - threats is the only defense for most institutions. However, the amount of data ...

IBM Cloud Computing Vision for Federal Solutions [ Source: IBM ]

August 2014- The Federal Government faces significant challenges in the face of budget constraints limiting important investments in new technology. This paper addresses how cloud computing services offer value in solving many of these challenges.

Extending Government Security Intelligence with Big Data Analytics and Exploration [ Source: IBM ]

August 2014- The asymmetric nature of today's cyberthreats means that federal organizations face dangers from multiple fronts. A pioneer in big data analytic methodologies, IBM delivers a complete solution framework that enables government agencies to confront an evolving cyberthreat landscape.

5 Steps to Application-Aware Data Protection [ Source: CommVault ]

August 2014- Many IT organizations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create ...

CommVault Is A Leader Among Enterprise Backup And Recovery Software Providers [ Source: CommVault ]

August 2014- CommVault's primary strategy centers on providing a single platform for backup, recovery, continuity, archive, and other data management and protection strategies. Areas of strength for CommVault include its deduplication capabilities, cloud-target integrations, hypervisor and application capabilities. Through innovative offerings and the implementation of advanced strategies, CommVault has quickly become an industry leader in a myriad of fields. Download this Forrester Research Report today to find out more about CommVault's current offering, strategy, and market presence.

Zen and the Art of Identity Federation [ Source: Radiant Logic ]

August 2014- Has your identity infrastructure hit choppy waters? Set Sail for stronger authentication, richer authorization, and smarter security for all your identity initiatives. RadiantOne delivers a global view of identity on top of your previous identity investments, for faster deployments, lower integration costs, and all the flexibility you need to navigate changing business requirements

Next 25