framework

Results 326 - 350 of 571Sort Results By: Published Date | Title | Company Name
Published By: Fitbit     Published Date: Jan 28, 2019
There are many causes, but patient behaviors can play a large role in many chronic diseases. The 3-4-50 Framework, developed by the UK-based Oxford Health Alliance, states that tobacco use, poor diet and a sedentary lifestyle contribute to cancer, cardiovascular disease, chronic lower-respiratory disease and diabetes. Those four conditions cause 50 percent of deaths, many of them premature.
Tags : 
    
Fitbit
Published By: IBM     Published Date: Apr 18, 2014
This IDC paper discusses the critical role of hardware infrastructure in business analytics deployments, citing best practices, the IDC's decision framework, and four client case studies - Wellpoint, Vestas, AXTEL, and Miami-Dade County. IDC's recommendation is that "infrastructure cannot — and should not — be an afterthought". Hardware infrastructure and software requirements must be determined in parallel to maximize the success of business analytics projects.
Tags : 
ibm, business analytics, deployment, hardware, infrastructure, business analytics solutions, workload
    
IBM
Published By: IBM     Published Date: Oct 07, 2014
This IDC paper discusses the critical role of hardware infrastructure in business analytics deployments, citing best practices, the IDC's decision framework, and four client case studies - Wellpoint, Vestas, AXTEL, and Miami-Dade County. IDC's recommendation is that "infrastructure cannot — and should not — be an afterthought". Hardware infrastructure and software requirements must be determined in parallel to maximize the success of business analytics projects.
Tags : 
ibm, idc, hardware infrastructure, business analytics deployments, software, software requirements, business analytics projects, infrastructure management
    
IBM
Published By: WNS     Published Date: Jun 21, 2017
'Innovatively growing a consumer base, especially non-users' can be a challenging task for a CPG organization, looking for growth strategies in a world of discerning loyalty and fragmented markets. WNS designed a personalized consumer analysis framework that enabled a CPG major to successfully target non-user target segments, and enabled a two-fold growth in consumer base and revenue from sales.
Tags : 
consumer survey, data set, u&a studies, analysis, non-users, price optimization, brand affinity, cpg
    
WNS
Published By: Microsoft     Published Date: Nov 08, 2013
Find out why developers increasingly choose .NET to create new applications faster and more efficiently and why it offers the clearest path from the client/server world to the emerging device/cloud world.
Tags : 
microsoft, develop better applications, technology guide, business applications, application patterns, devices, web applications, native applications
    
Microsoft
Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected
    
McAfee
Published By: OpenText     Published Date: Apr 16, 2014
Learn how to provide a framework for developing a business case for new or continued justification of BPM projects and see how this can help accelerate the startup time and enable more organizations to realize success from BPM.
Tags : 
opentext, bpm, business process management, it projects, produce results, framework, startup time, potential of bpm
    
OpenText
Published By: OpenText     Published Date: Apr 16, 2014
Learn how to provide a framework for developing a business case for new or continued justification of BPM projects and see how this can help accelerate the startup time and enable more organizations to realize success from BPM.
Tags : 
opentext, bpm, business process management, it projects, produce results, framework, startup time, potential of bpm
    
OpenText
Published By: IBM     Published Date: Oct 01, 2012
This paper discusses issues surrounding multi-sourcing of services and the right framework for decision making
Tags : 
it infrastructure, it industrialization, ibm, business solutions
    
IBM
Published By: VMware     Published Date: Aug 23, 2011
Learn how to accelerate application deployment and transition to cloud computing by virtualizing apps and implementing a lightweight dev framework.
Tags : 
application server, data management, application monitoring and management, web server load balancing, enterprise messaging, vmware virtualization, server virtualization, desktop virtualization
    
VMware
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
Group M_IBM Q418
Published By: SAS     Published Date: Aug 03, 2016
The financial crisis that began in 2007 highlighted the major shortcomings of the regulatory framework around minimum capital requirements and liquidity requirements. In response, the Basel Committee on Banking Supervision made substantial revisions to its guidelines - specifically, by including more demanding capital and liquidity requirements now commonly referred to as Basel III framework. National banking authorities around the world are adopting the new Basel III framework as a way to eliminate systemic liquidity risk and promote greater transparency of risk management practices.
Tags : 
optimization, finance, financial crisis, liquidity requirements, banking, framework, risk management
    
SAS
Published By: Pega     Published Date: Sep 11, 2015
In this new report, Pegasystems is recognized as a leader in the growing market for flexible case management solutions. Pega leads the market in delivering applications that meet rising expectations for: -Built-in change governance procedures -Open APIs -Ability to federate case management -Flexible data structures -Focus on business outcomes
Tags : 
    
Pega
Published By: MobileIron     Published Date: Aug 03, 2015
This is an article about how enterprise mobility management (EMM) suites help organizations integrate mobile devices into their security frameworks and systems and information technology life cycles.
Tags : 
enterprise mobility management, mobile devices, security framework, mobile devices, data encryption
    
MobileIron
Published By: K2     Published Date: Apr 27, 2015
Download this white paper to learn how K2, a comprehensive business process application solution, gives you a better BPM through each step of the BPM lifecycle.
Tags : 
strategy and execution, business operations, traditional organizational hierarchy, collaborative efforts, end-to-end processes
    
K2
Published By: K2     Published Date: Jan 07, 2016
Is it time to reframe BPM through a modern lens? This is what a recent Forrester report claims, after conducting an online survey of over 3,300 businesses. While 33 percent of companies are already implementing or using a BPM solution and an additional 30 percent are interested in using BPM, only 17 percent of companies made a formal request to use BPM in the last year.
Tags : 
bpm, business process management, forrester report, bpm solutions
    
K2
Published By: Gigaom     Published Date: Oct 07, 2019
While interest in Machine Learning/Artificial Intelligence/ (ML/AI) has never been higher, the number of companies deploying it is only a subset, and successful implementations a smaller proportion still. The problem isn’t the technology; that part is working great. But the mere presence and provision of tools, algorithms, and frameworks aren’t enough. What’s missing is the attitude, appreciation, and approach necessary to drive adoption and working solutions. To learn more, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and panelists Jen Stirrup, Lillian Pierson, and special guest from Cloudera Fast Forward Labs, Alice Albrecht. Our panel members are seasoned veterans in the database and analytics consulting world, each with a track record of successful implementations. They’ll explain how to go beyond the fascination phase of new technology towards the battened down methodologies necessary to build bulletproof solutions th
Tags : 
    
Gigaom
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Many organizations are now moving parts of their IT infrastructure to the Cloud. However, managing these resources within a comprehensive management framework is still essential. And the management approach for these hybrid environments needs to take a step forward and start to focus on service level management, not the care and feeding of discrete components. This whitepaper provides the information needed on implementing Business Service Management (BSM) in hybrid environments.
Tags : 
it infrastructure, cloud, business service management, hybrid environments
    
HP - Enterprise
Published By: McAfee     Published Date: Oct 28, 2014
Compliance and financial risk used to be the driving concerns for security and risk management. Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
Published By: Talend     Published Date: Nov 02, 2018
The rise of data privacy regulations and the increasing risk of data theft have made data protection an essential part of any data-driven strategy. This executive summary gives you a quick overview of the risks and regulations related to data privacy, and a framework for addressing both without compromising on customer experience.
Tags : 
    
Talend
Published By: 6th Sense Analytics     Published Date: Sep 18, 2007
This whitepaper outlines a way for organizations to build a modern framework for managing distributed teams that overcomes the structural challenges of working across far-flung locations, and ensures projects come in as expected—on time, on budget and on target with business goals. This framework reuses your existing development infrastructure to restore visibility and empowered decision making within your globally distributed software development projects.
Tags : 
offshore, offshoring, outsource, outsourcing, cost, costs, cost savings, spend management
    
6th Sense Analytics
Published By: Nexgate     Published Date: Jun 17, 2015
This report will outline a framework for assigning roles and responsibilities to manage social media risk.
Tags : 
proofpoint, nexgate, social media risk, social media, risk management, compliance
    
Nexgate
Published By: Cranfield University     Published Date: Apr 01, 2015
Marketing value metrics enable marketers to measure the impact of marketing activity against organisational goals more effectively and empowers marketing teams and their leaders to justify and defend their plans to their CEOs and CFOs. The model presented in this free chapter has been developed by Professor Stan Maklan, Dr Stan Maklan and Peter Mouncey from the renowned Cranfield School of Management and provide a metrics-based framework for developing and implementing marketing strategies that are measurable and accountable.
Tags : 
marketing value metrics, marketing metrics model, business goals and marketing, measuring marketing effectiveness
    
Cranfield University
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.