- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- The Failure of Cloud Information Governance
- Gartner Magic Quadrant for Secure Email Gateways, 2014
- The Human Factor: How Attacks Exploit People as the Weakest Link in Security
- Using Anomalies in Crash Reports to Detect Unknown Threats
August 2010- In an era of increasing regulation for the financial and healthcare industry, companies are under increasing pressure to provide security for their data and to comply with regulations. They are adding complexity to already complex IT organizations and in doing so they are spending more money for diminishing returns. If your organization is in this situation, cloud computing will likely offer you the best solution to securing your data and to feel secure in knowing ...
August 2010- While the value of virtualization for large businesses has been well documented, this whitepaper from IBM explains how mid-sized business can benefit from virtualization with some new technologies and improved affordability. The paper explains virtualization in the context of mid-sized businesses and shows how they can reduce costs, improve services and simplify management. With specific examples of IBM solutions – and the cost savings you can expect – along with detailed explanations of the benefits of a ...
October 2009- Enterprise search platforms continue gaining acceptance within corporate environments. The ability to leverage a single application to search an increasing number of information sources and content types is spearheading successful deployment of enterprise search technologies. However, an ever-increasing pool of information has diluted the user’s ability to quickly find relevant information. Moreover, as more types of content are introduced into an enterprise (blogs, wikis, tweets), retrieval and rendering of these results become increasingly more ...
IDC Financial Insight’s Analyst Connection discusses how an increase in innovation throughout financial services organizations will drive future success in 2010 and beyond. One key area of focus for financial institutions is the exploration of workforce management. Employees remain a key but often underutilized resource for all financial institutions.
Utilizing workforce management tools and technologies allows institutions to optimize the untapped opportunity their employees represent, not only to reduce cost and increase profitability, ...
April 2010- Many organizations spend as much as 70% of their IT budget merely maintaining the status quo. Dynamic Infrastructure can help them achieve more business value with fewer IT resources. This paper covers how virtualization is a key building block of dynamic infrastructure, as well as solutions that empower virtualization strategies.
February 2010- The over-the-counter (OTC) derivatives industry is in flux as regulators and other industry participants try to create a market structure that reduces the systemic risks associated with this product. The changes will be manifested in many ways, affecting such broad areas as liquidity and balance sheet management, but also lines of business and individual functions, particularly as these pertain to technology and operations. Missing from the current OTC derivatives life cycle of trading and processing ...
September 2008- Organizations make significant investments in B2B software and connectivity to automate business transactions, with the primary objective being to drive efficiencies with large trading partners. Still, there is much room for improvement. As it stands now, many businesses adhere to the 80/20 rule, electronically linking with only 20 percent of their partners. This smaller percentage represents as much as 80 percent of their transaction volumes and/or revenues. Companies often fail to maximize the potential of these ...
November 2006- In today’s globally-sourced economy, the term “competitive edge” has taken on all new meaning. It's not about one company edging out another in a well-defined playing field. It's about working with suppliers and business partners at the edge of the enterprise to compete as a business network. Sterling Commerce says it can help you achieve this new brand of competitive edge by extending your SAP environment with best-of-class B2B and multi-enterprise collaboration. According ...
January 2009- This EMC Perspective will help you to build an efficient, green data center that will yield financial and environmental benefits. Data center power and cooling, and virtualization are two key strategies to reap these benefits. We will discuss power and cooling optimization, as well as virtualization and other related data center technologies that are required to develop and operate an efficient, green data center.
December 2009- Services are helping organizations accelerate next-generation data protection. A perfect storm of expanding data volumes, rising cost pressures, demand recovery and compliance objectives, and infrastructure complexity is focusing new attention on data protection.
January 2010- Private cloud is a new way to organize and manage information technology resources and services -- and a new and better way for a business to consume them and put them to work. Instead of fulfilling predefined and limited roles, IT resources form a flexible pool that business people and processes can draw upon precisely when and as needed. What does that mean for a business? In a word -- agility.
February 2010- Andrew File System is a distributed file system that enables co-operating hosts (clients and servers) to efficiently share file system resources across both local area and wide area networks. It is based on a distributed file system originally developed at the Information Technology Center at Carnegie-Mellon University that was called the Andrew File System. According to TCS, AFS scales better than NFS. It performs well in small and very large installations, provides excellent performance on ...
February 2010- In today’s challenging and globalized business, drastic IT technology growth has enabled organizations to do business around the globe in a virtual boundary less environment. Enterprise Architecture, along with SOA, re-models a global organization views as a set of business process and services that has wide scalability and adaptability in terms of re-use of the business processes and services. With this SOA approach, Enterprise Architecture can transform a global organization to achieve high agility ...
November 2009- CORE products significantly compliment other business solutions already utilized by companies, allowing for further automation of major business processes and building of a more efficient IT infrastructure. The extensive use of .NET technology makes development, further customization, and deployment of CORE products simpler and easier, and ensures better performance even with large volumes of data. Integration with Microsoft products, including CRM and ERP solutions, is smooth and transparent, ensuring consistency and security of transferred data, ...
November 2009- The present technical white paper outlines the role of AAA services for 3GPP and non-3GPP system access in LTE technology. This paper is intended for the users studying the core networks aspects of LTE systems and SAE gateway.
October 2009- Despite the advances of technologies that help businesses to manage their information, many have multiple silos of information that are challenging to manage. This article discusses how managers can take an integrated approach to managing disparate information effectively by tying their digital storage and line-of-business applications into a centralized enterprise content management system.
March 2009- Customer support has long been a business mainstay. Yet, the business impact of support is seldom measured — despite the influence of support on higher revenue; customer satisfaction and loyalty; and increased productivity. This ServiceXRG White Paper explores the importance of quantifying the impact of support on your business.
August 2009- This white paper details the recommendations that can be followed by an airline or service providers to enable the airline's mobile check-in facility. It also provides some case studies from the industry where mobile check-in solutions have been implemented. Since almost all airlines are looking to reduce costs, provide increased customer service and satisfaction, and an overall "more for less" experience, a mobile check-in solution is increasingly catching the attention of airlines and consumers alike.
September 2009- This article discusses how enterprise content management and business process management software can leverage an institution's existing technology investments, resulting in greater efficiency and enhanced service that is affordable. Student admissions, student services, financial services, and other document-intensive business areas are discussed.
September 2009- OPC tunneling software allows the secure transfer of process data, even across multiple firewalls, Network Address Translators (NAT) and WAN networks. By not securely transmitting process data, companies expose process control networks to potential cyber attacks which can disrupt production, compromise safety, and cause significant financial losses for companies. This paper addresses the issues and challenges of using DCOM when deploying OPC technology and presents an alternative solution that addresses the industrial end-user requirements.
February 2009- To not securely transmit process data exposes process control networks to potential cyber attacks which can disrupt production, compromise safety and cause significant financial losses for companies. This paper expands on the issues and challenges of using DCOM when deploying OPC technology and presents an alternative solution that addresses the industrial end-user requirements.
October 2008- To achieve the business results needed, IT operations must work smarter. This paper explores the problems IT operations can encounter in coordinating the activities of multiple application and infrastructure specialist teams, and it proposes an approach - consolidated operations -designed to get incidents to the right person with the right information fast so problems can be resolved quickly, with no duplication of effort and at an appropriate level of expertise.
July 2009- This case study examines the system integration solution provided by Integration Objects for Saudi Aramco's Abqaiq Plants. Saudi Aramco was having difficulties with a complex IT architecture that was cumbersome and a challenge to maintain. The company found its solution from Integration Objects, which was able to provide a simpler IT architecture that was also more secure and ultimately helped Saudi Aramco optimize operations.
July 2009- This white paper examines the system integration solution provided by Integration Objects for Saudi Aramco's Abqaiq Plants. Saudi Aramco was having difficulties with a complex IT architecture that was cumbersome and a challenge to maintain. The company found its solution from Integration Objects, which was able to provide a simpler IT architecture that was also more secure and ultimately helped Saudi Aramco optimize operations.
April 2009- Bailouts, mergers, failures, and acquisitions. These are familiar words that were all too frequently the lead stories in the financial services industry in 2008. What will it take to restore corporates' trust in the financial services industry? Recent headlines have not only increased the pressures in the marketplace but have also created new opportunities for regional and community banks to capture market share away from the big boys.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services