IBM ActivitiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: IBM Activities returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Business Activity Monitoring (BAM)
 •   Enterprise Information Integration/ Metadata Management
 •   Service Oriented Architecture (SOA)
 •   Business Planning
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies

Related Searches
 •   Automate IBM
 •   Calls IBM Activities
 •   Code IBM Activities
 •   Framework IBM Activities
 •   IBM Activities Canadian
 •   IBM Activities System Software
 •   IBM Activities Time
 •   IBM Production
 •   IBM Wisconsin
 •   Method IBM Activities
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Computer Weekly - 8 May 2012: The changing face of retail IT by ComputerWeekly.com

May 08, 2012 - (Free Research)
In this week’s Computer Weekly, we look at the IT challenges facing retailers, as consumers turn increasingly to web and mobile shopping channels. Oracle president Mark Hurd talks about how the supplier intends to simplify IT infrastructures. And new government CIO Andy Nelson discusses how he plans to transform Whitehall IT. Read the issue now. 
(EZINE)

3 undeniable use cases for automated IAM controls by IBM

January 03, 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

Delivering Value through Best Practice for Systems Engineering by IBM

February 25, 2010 - (Free Research)
View this webcast to learn how to ensure that stakeholder requirements are met effectively and efficiently; how to achieve early verification through systems model execution; how to ensure effective hand-off to design and implementation activities and much more. 
(WEBCAST)

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 03, 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

IBM Intelligent Investigation Manager by IBM

March 13, 2013 - (Free Research)
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases. 
(WEBCAST) READ ABSTRACT |

Benefits and methods of implementing BPM on System z by IBM

March 01, 2008 - (Free Research)
This white paper is intended to inform the reader of what business process management (BPM) is about, the benefits that can be obtained from its implementation, how to place BPM into operation and why IBM WebSphere® Process Server should be deployed on the IBM System z™ mainframe. 
(WHITE PAPER) READ ABSTRACT |

Examining IBM Innovation at Both Ends of the Storage Spectrum- Part 1: Tape by The 451 Group (E-mail this company)

October 08, 2012 - (Free Research)
Find proof that tape isn't dead by checking out this research conducted by The 451 Group, a leading global analyst and data company. This October, 2012 white paper contains the findings of The 451 Group's recent visit to IBM's research facility in Zurich and presents 451 Research's opinion of IBM's innovations and activities in the tape space. 
(WHITE PAPER) READ ABSTRACT |

IBM Real-time Compression Solutions for VMware Environments by IBM

July 15, 2011 - (Free Research)
IBM Real-time Compression provide real-time, random access data compression, enabling organizations to get more out of their existing VMware infrastructure without compromise.Click here to learn more on how IBM's Real-time Compression solutions reduce the total I/O activity required from your storage system, reducing CPU and disk utilization. 
(WHITE PAPER) READ ABSTRACT |

BlackBerry® Client for IBM® Lotus® Connections or BlackBerry® Client for IBM® Lotus® Quickr™ by BlackBerry

May 12, 2010 - (Free Research)
Help mobile workers access the information and expertise needed to remain productive while on the go.  
(DEMO)

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 07, 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

X-Force Mid-Year Trend Report by IBM

January 11, 2012 - (Free Research)
This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript:  Deploying Database Activity Monitoring by IBM

March 11, 2011 - (Free Research)
Database Activity Monitoring tools offer an unparalleled ability to protect sensitive assets without interfering with business processes. This presentation transcript of the video “Deploying Database Activity Monitoring,”  will teach you how to determine the best use cases for DAM, what you need to protect and how to select a deployment model. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Tube Lines Takes Stock of Its Assets with IBM Maximo Asset Management by IBM

December 08, 2010 - (Free Research)
Integrating asset maintenance activity and equipment history in IBM Maximo with financial and planning systems is helping Tube Lines meet its financial targets, plan for long-range capital investments and improve the rail infrastructure. Read this case study now to learn more. 
(CASE STUDY) READ ABSTRACT |

Empowering the Business to Sense and Respond: Delivering Business Event Processing with IBM WebSphere Business Events by IBM

July 25, 2008 - (Free Research)
This paper addresses one of the critical IBM technologies for supporting agility and alignment, Business Event Processing (BEP). 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command by PowerTech

October 16, 2009 - (Free Research)
When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Support PCI Security Compliance with Enhanced Solutions from IBM by IBM

February 13, 2009 - (Free Research)
This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance. 
(WHITE PAPER) READ ABSTRACT |

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

Robot/SCHEDULE Enterprise by Help/Systems

September 17, 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

IBM PureSystems Cut Costs and Increase Agility by Simplifying the IT Life Cycle by IBM

January 11, 2013 - (Free Research)
View this white paper to learn how IBM PureSystems platforms can help you create a simpler IT life cycle. 
(WHITE PAPER) READ ABSTRACT |

Court Case Management from IBM by IBM

March 28, 2011 - (Free Research)
Read this paper to learn how advanced case management solutions from IBM can help assist organizations in a wide array of case management scenarios. 
(WHITE PAPER) READ ABSTRACT |

Managing the Entire Database Security & Compliance Lifecycle with IBM InfoSphere Guardium by IBM

September 27, 2010 - (Free Research)
Read this paper to find out what solutions optimize operational efficiency with a scalable, multi-tier architecture that automates and centralizes compliance controls across your entire application and database infrastructure. 
(WHITE PAPER) READ ABSTRACT |

DataSheet: Rational Quality Manager by IBM

December 14, 2010 - (Free Research)
IBM Rational Quality Manager offers two views on the individual user’s dashboard: A work-item list that shows a tester what work has been assigned to him or her, and a team event log that updates automatically as activities occur/progress. Together these views help ensure that everyone is on the same page. 
(DATA SHEET) READ ABSTRACT |

SOA Governance: An IBM White Paper by IBM

October 06, 2009 - (Free Research)
As SOA becomes a new way of implementing applications, organizations need a way to manage the assets (especially reusable services) developed as part of their SOA activities, to permit the use of these assets to be maximized and insure the results the enterprise envisions. Read on to learn more. 
(WHITE PAPER)

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts