Showing documents 71 to 80 of 130  Previous  Next

Results per page: 5 | 10 | 20

cover image

Unlock Big Value in Big Data with Analytics
IBM Z Software

Point-of-View, published 31 May 2013, last updated 3 Jun 2013

Big data expands and evolves analytics that were not previously possible because of lack of available information, technology limitation, or prohibitive cost. Companies that extend analytics to big data can:
- Gain more complete answers and create new perspectives by relating and analyzing all sources of data
- Make better business decisions by anticipating business outcomes and uncovering hidden patterns and relationships across all sources of data
- Uncover new opportunities and enable new business models by differentiating customer service or reducing operating costs ... [more]

cover image

IBM SmartCloud: Building a Cloud Enabled Data Center

Redguide, published 13 Feb 2013, last updated 21 May 2013

Organizations are looking for ways to get more out of their already strained IT infrastructure as they face new technological and economic pressures. They are also trying to satisfy a broad set of users (internal and external to the enterprise) who demand improvements in their quality of service (QoS), regardless of increases in the number of users and applications. Cloud computing offers attractive opportunities to reduce costs, accelerate development, and increase the flexibility of the IT infrastructure, applications, and services. Infrastructure as a service (IaaS) is the typical ... [more]

cover image

Realizing Efficient Enterprise Security Intelligence by Using IBM Security Intelligence Solutions

Redguide, published 9 May 2013

No matter how large or small an organization, the demands for security intelligence are growing. Organizations of all sizes face tremendous challenges to keep their assets secure. Most organizations use heterogeneous IT technologies and software solutions that produce a wide variety of disparate data. Such technologies and solutions include compliance and vulnerability scans, IDS/IPS alerts, asset data, access logs, and more. They monitor and track network performance, monitor and track application security, and collect and manage event logs in an attempt to meet overall IT objectives. Also, ... [more]

cover image

The Interconnecting of Everything

Point-of-View, published 19 Apr 2013

The Internet of Things has transformed the way corporations and consumers interact with each other and the environment around them. Internet-of-Things technologies have impacted solution domains such as Smart Grid, Supply Chain Management, Smart Cities, and Smart Home. The Internet of Things is a computing paradigm that will change business models, technology investments, consumer experiences, and everyday life. The Internet of Things is the Internet of the future, powering billions of integrated devices and processes across industries and global locations.
- The Internet of ... [more]

cover image

Applying Lean, Six Sigma, BPM, and SOA to Drive Business Results
Smarter Process

Redguide, published 18 Apr 2013, last updated 18 Apr 2013

Lean Six Sigma unites tools and techniques from Lean and Six Sigma methodologies to produce real results. It uncovers process waste, reduces non-value adding activity, and increases organizational capability. The benefits might even be felt in IT where waste is being removed from application development processes, significantly reducing costs and freeing resources and budgets for needed investments and backlogged projects. Business process management (BPM) technologies and service-oriented architectures (SOAs) combine with Lean Six Sigma to accelerate improvements and results. As the world ... [more]

cover image

Real-time Fraud Detection Analytics on IBM System z

Redbooks, published 3 Apr 2013, last updated 11 Apr 2013

Payment fraud can be defined as an intentional deception or misrepresentation that is designed to result in an unauthorized benefit. Fraud schemes are becoming more complex and difficult to identify. It is estimated that industries lose nearly $1 trillion USD annually because of fraud. The ideal solution is where you avoid making fraudulent payments without slowing down legitimate payments. This solution requires that you adopt a comprehensive fraud business architecture that applies predictive analytics. This IBM® Redbooks® publication begins with the business process flows of several ... [more]

cover image

Connecting Your Business to the Multichannel Customer with freedomone and IBM Worklight

Redguide, published 28 Feb 2013

Many businesses are facing communication challenges that are caused by the explosive growth of digital channels available to their customers. The choice of channels that is available to customers ranges from mobile devices to social networks. A cohesive business strategy to engage customers in moments of opportunity must include technology assets that enable the company to communicate interactively and contextually with today’s multichannel customer. freedomone is an integrated communication platform that connects your business to the multichannel customer. It integrates with your ... [more]

cover image

Accelerating Collaboration and Productivity by Taking Advantage of Social Business

Point-of-View, published 24 Jan 2013, last updated 24 Jan 2013

Companies are constantly challenged by how they can become more adaptive and agile, more creative and innovative, and more efficient and resilient. They seek collective intelligence both from their employees and from their consumers. They want the ability to exchange knowledge and to collect and evaluate feedback and ideas. At the same time, they want to improve communication, productivity, and employee and customer satisfaction. While employees are demanding social tools in the workplace for better collaboration and communication, companies are at a crossroads about whether implementing ... [more]

cover image

Building a Resilient Planet
Smarter Cities

Point-of-View, published 17 Jan 2013, last updated 22 Jan 2013

In the next decades, regions around the world will face increasing changes from two types of threats: acute threats and chronic threats. Acute threats are natural and man-made catastrophes such as hurricanes and earthquakes. Chronic threats are the causes of shortages of basic resources such as water, food, and energy. A resilient planet is one that can deal with such changes. Public and private sectors depend on information technology (IT) in critical situations that affect geographic regions and resources:
- They need more robust and resilient IT to support rapid recovery ... [more]

cover image

Smarter Bank Data Centers with Expert Integrated Systems
Industry Solutions

Point-of-View, published 14 Dec 2012, last updated 27 Dec 2012

Today, banks are operating in a highly volatile climate. Increasing regulation, continuous pressure on cost, changing business models, mergers and acquisitions, and remaining competitive require a flexible, efficient, and smart IT operation:
- Banks need IT as an accelerator of business growth, not as an inhibitor.
- Bank data centers can and must be made smarter.
- Banks need expert integrated systems.
This IBM® Redbooks® Point-of-View publication analyzes what makes a data center successful and explains how IBM expert integrated systems help to accomplish the ... [more]

 Previous  Next

The above is a list of IBM Redguides on IT Business Perspectives, showing most recently published first. IBM Redguides focus on the business view of technology that solves business issues, provides business value, or enables competitive advantage by applying existing technologies or exploring a roadmap for emerging technologies. These publications are available for download in PDF format.

Follow IBM Redbooks

Follow IBM Redbooks