Statoil Pumps up Production Levels through Information Sharing and 'Smart' Practices
By: IBM Line of Business View more from IBM Line of Business >>
Download this next:
CW Innovation Awards: Bharat Petroleum refines operations with a digital nerve centre
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Bharat Petroleum's massive IoT project will enable the company to respond quickly to equipment failure or hazardous incidents, and provides a single view of the company's entire value chain.
These are also closely related to: "Statoil Pumps up Production Levels through Information Sharing and 'Smart' Practices"
-
Efficient Raw Material Use: A Key Environmental Focus
By:
Type: Video
The Raw Material Use Material ESG Issue (MEI) focuses on a company's efficient utilization of raw material inputs (excluding energy and petroleum-based products) in production, along with the effective management of associated risks. The Growing Importance of Raw Material Use: A Key Component in Decarbonization - The demand for raw materials is set to nearly double by 2050 due to population growth, rising living standards, and the low-carbon transition that will see widespread and increasing use of low-carbon technology. While physical scarcity serves as the upper limit of raw materials availability, accessibility issues related to the unequal spread of raw materials across countries and high cumulative demand for raw material inputs are becoming more prevalent. Although global market trade in commodities can overcome availability issues for raw materials that cannot be sourced locally, it also introduces a slew of factors that heighten environmental, social and corporate governance (ESG) risks. Subpar sovereign governance practices (bribery and corruption) and geopolitical tension (trade disputes, export bans or conflict) provide another dimension of risk, particularly where raw materials are supplied by only a few commodity-producing nations. Transparent and responsible production of raw material inputs is essential to de-risk investments.
-
CW APAC, April 2021: Trend Watch: IoT in India
By: TechTarget ComputerWeekly.com
Type: Ezine
A solid IT infrastructure has become more essential for business than ever before. In this handbook, focused on the internet of things in India, Computer Weekly looks at the country’s potential as an IoT hotspot.
Find more content like what you just read:
-
Data breaches in 2023: Analyst findings
By: Cato Networks
Type: Webcast
To dig into the findings of IBM’s “Cost of a Data Breach Report 2023,” and to explore the capabilities of AI security, tune into this webcast.
-
CW Innovation Awards: Sime Darby ups ante in service management
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Sime Darby Industrial's inService Suite has returned more than 100,000 hours to the company in a digitisation initiative that has improved efficiency and customer engagement.
-
IBM Verify Identity Protection
By: TD Synnex
Type: Product Overview
Secure your identity infrastructure with IBM Verify Identity Protection. Eliminate blind spots, detect threats, and simplify cloud migration. Gain full visibility into access activity across your entire identity fabric. Read the full product overview to learn how to better protect against identity-based attacks.
-
MicroScope – March 2023: Steering the storage market
By: MicroScope
Type: Ezine
In this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.
-
What will a quantum datacentre look like?
By: TechTarget ComputerWeekly.com
Type: Infographic
IBM has updated its quantum computing roadmap to reflect how quantum processors, central processing units (CPUs) and graphics processing units (GPUs) will be woven into a compute fabric capable of solving computationally complex problems. Understand why this impacts both hardware installation and software.
-
-
Migrate and Modernize With IBM and AWS
By: IBM & AWS
Type: White Paper
Ready to start your migrationand modernization journey? Learn more about how IBM works with AWS to support your migration and modernization efforts.
-
CW Nordics - May-July 2019: Facing up to fintech
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue of CW Nordics, we take a look at how one of the Nordic region's big, traditional banks is going about meeting the challenges posed by new digital entrants into the finance sector. And it is another large traditional player, but this time in the IT world, which Nordea is turning to for support– none other than Big Blue.
-
Computer Weekly 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
-
Streamline hybrid cloud connectivity with IBM's Mesh solution
By: Aliado
Type: Product Overview
Hybrid Cloud Mesh from IBM simplifies connecting apps and data across public, private, and edge environments. It enables secure, high-performing, and resilient connectivity with a single view of your application landscape. Learn more in the full product overview.
-
Streamlining enterprise backup management for CIO apps
By: Cobalt Iron
Type: Case Study
IBM's CIO organization streamlined enterprise backup management with a centralized cloud-based solution using IBM and Cobalt Iron technologies. This provided a unified user experience, simplified backup and restore processes, and enabled application owners to protect petabytes of critical data. Read this full case study now to learn more.
-
Secure your data in cloud and SaaS applications
By: TD Synnex
Type: Product Overview
Secure your data in cloud and SaaS apps with IBM Guardium DSPM. Automate discovery and classification of sensitive data, monitor for threats, and minimize compliance risks. Download this product overview to learn more.
-
A guide to where mainframes fit in the cloud
By: TechTarget ComputerWeekly.com
Type: eBook
Far from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.
-
IBM Cloud: No shift, Sherlock
By: TechTarget ComputerWeekly.com
Type: eGuide
OpenShift is a key ingredient in the latest shift in IBM's long-running cloud strategy. We look at what it means...
-
Streamline Data Subject Access Requests in 3 Clicks
By: TD Synnex
Type: Product Overview
Streamline data subject access requests (DSARs) with IBM Discover and Classify in just 3 clicks. Automate the entire DSAR process, from intake to fulfillment, to meet privacy obligations and build trust. Read the full product overview to learn how.
-
How to Stay Ahead of Emerging Threats
By: Endace
Type: Product Overview
As cybercriminals develop more sophisticated attacks, you must develop stronger defenses. IBM Security and Endace have partnered to help you do so. Dig into this overview to learn how, by combining IBM QRadar with EndaceProbe Analytics Platforms, you can speed and strengthen your security incident response.
-
How to apply lean manufacturing to data management
By: HighByte
Type: eBook
The volume, velocity and variety of raw industrial data are ever increasing, making it difficult to work with. Fortunately, manufacturers already have the framework they need to streamline data production and preparation. Read on to learn how you can enable your organization with lean data.
-
How to Keep Your CIO from Ripping Out Your IBM i
By:
Type: Replay
Over the last year, industries have seen drastic changes to their markets and how they do business, with many forced to reconsider their IBM® i on IBM® Power Systems™. Their applications often end up in a CIO’s crosshairs in a push for greater IT efficiency or competitive superiority, and it’s usually because he or she is unfamiliar with the platform’s benefits. Your IBM i has become so reliable and subtle in its job that it’s basically invisible, or both. In this presentation we will give you the tools you need to help you avert a crippling business decision by demonstrating how IBM i can remain an essential part of a competitive IT ecosystem.
-
How to Keep Your CIO from Ripping Out Your IBM i
By:
Type: Replay
Over the last year, industries have seen drastic changes to their markets and how they do business, with many forced to reconsider their IBM® i on IBM® Power Systems™. Their applications often end up in a CIO’s crosshairs in a push for greater IT efficiency or competitive superiority, and it’s usually because he or she is unfamiliar with the platform’s benefits. Your IBM i has become so reliable and subtle in its job that it’s basically invisible, or both. In this presentation we will give you the tools you need to help you avert a crippling business decision by demonstrating how IBM i can remain an essential part of a competitive IT ecosystem.
-
How to Keep Your CIO from Ripping Out Your IBM i
By:
Type: Replay
Over the last year, industries have seen drastic changes to their markets and how they do business, with many forced to reconsider their IBM® i on IBM® Power Systems™. Their applications often end up in a CIO’s crosshairs in a push for greater IT efficiency or competitive superiority, and it’s usually because he or she is unfamiliar with the platform’s benefits. Your IBM i has become so reliable and subtle in its job that it’s basically invisible, or both. In this presentation we will give you the tools you need to help you avert a crippling business decision by demonstrating how IBM i can remain an essential part of a competitive IT ecosystem.
-
How to Keep Your CIO from Ripping Out Your IBM i
By:
Type: Replay
Over the last year, industries have seen drastic changes to their markets and how they do business, with many forced to reconsider their IBM® i on IBM® Power Systems™. Their applications often end up in a CIO’s crosshairs in a push for greater IT efficiency or competitive superiority, and it’s usually because he or she is unfamiliar with the platform’s benefits. Your IBM i has become so reliable and subtle in its job that it’s basically invisible, or both. In this presentation we will give you the tools you need to help you avert a crippling business decision by demonstrating how IBM i can remain an essential part of a competitive IT ecosystem.
-
How to Keep Your CIO from Ripping Out Your IBM i
By:
Type: Replay
Over the last year, industries have seen drastic changes to their markets and how they do business, with many forced to reconsider their IBM® i on IBM® Power Systems™. Their applications often end up in a CIO’s crosshairs in a push for greater IT efficiency or competitive superiority, and it’s usually because he or she is unfamiliar with the platform’s benefits. Your IBM i has become so reliable and subtle in its job that it’s basically invisible, or both. In this presentation we will give you the tools you need to help you avert a crippling business decision by demonstrating how IBM i can remain an essential part of a competitive IT ecosystem.
-
How to Keep Your CIO from Ripping Out Your IBM i
By:
Type: Replay
Over the last year, industries have seen drastic changes to their markets and how they do business, with many forced to reconsider their IBM® i on IBM® Power Systems™. Their applications often end up in a CIO’s crosshairs in a push for greater IT efficiency or competitive superiority, and it’s usually because he or she is unfamiliar with the platform’s benefits. Your IBM i has become so reliable and subtle in its job that it’s basically invisible, or both. In this presentation we will give you the tools you need to help you avert a crippling business decision by demonstrating how IBM i can remain an essential part of a competitive IT ecosystem.
-
How to Keep Your CIO from Ripping Out Your IBM i
By:
Type: Replay
Over the last year, industries have seen drastic changes to their markets and how they do business, with many forced to reconsider their IBM® i on IBM® Power Systems™. Their applications often end up in a CIO’s crosshairs in a push for greater IT efficiency or competitive superiority, and it’s usually because he or she is unfamiliar with the platform’s benefits. Your IBM i has become so reliable and subtle in its job that it’s basically invisible, or both. In this presentation we will give you the tools you need to help you avert a crippling business decision by demonstrating how IBM i can remain an essential part of a competitive IT ecosystem.
-
How to Keep Your CIO from Ripping Out Your IBM i
By:
Type: Replay
Over the last year, industries have seen drastic changes to their markets and how they do business, with many forced to reconsider their IBM® i on IBM® Power Systems™. Their applications often end up in a CIO’s crosshairs in a push for greater IT efficiency or competitive superiority, and it’s usually because he or she is unfamiliar with the platform’s benefits. Your IBM i has become so reliable and subtle in its job that it’s basically invisible, or both. In this presentation we will give you the tools you need to help you avert a crippling business decision by demonstrating how IBM i can remain an essential part of a competitive IT ecosystem.
-
Computing, IBM and Ensono Panel: IBM i - How prepared are you to modernise?
By: Ensono
Type: Replay
Three decades of continuous use mean that many enterprises working with IBM i have highly tailored and tightly bound business critical apps that are at the heart of operational workflows. There are challenges on the horizon in modernisation and optimisation, cost management with the ever decreasing IT budget that has also been impacted by this year’s pandemic with high IT spend to enable remote working and business continuity. A panel of industry experts from Ensono, IBM and Computing discuss the way forward with IBM i and sharing insights from an exclusive research study into the current challenges and advantages faced by organisations around modernising their IBM i systems.
-
Building an Intelligent, Modern, Sustainable Enterprise
By: IBM
Type: Analyst Report
In this visual whitepaper, Frost & Sullivan looks at the optimal way to modernize, mitigate, build, and manage SAP in the cloud, using Amazon Web Services (AWS) and IBM Consulting. Read the report to understand how this partner-supported solution aligns with key business priorities.
-
Customer Service-How IBM's Agents & Mobile Workers Deliver Intelligent Service
By:
Type: Replay
IBM, a 105-year-old company, transformed its customer support channel for over 22,000 agents. To evolve its business and drive new levels of engagement, IBM partnered with Salesforce to support its service transformation, create a consistent agent experience, and drive greater value to customers globally. Join us for an in-depth look at how IBM reinvented its 50+ year old ticketing system, now powered by AI, and how it uses Watson and Salesforce to deliver outstanding customer service. Also, learn about its breakthrough initiatives using Community Cloud to build a digital front door for its customers and Field Service Lightning to manage complex remote deployments around the world. Finally, plan how you can launch your own transformation with lessons learned and best practices from IBM.
-
9 IBM Cloud Paks for app modernization and cloud efforts
By: TechTarget ComputerWeekly.com
Type: eGuide
It takes time, money and labour to modernize applications and workflows to use cloud environments. IBM brings a new dimension to cloud adoption with highly integrated solution stacks that can provide a range of typical workflows for business users. In this e-guide, learn how IBM Cloud Paks can help ease some challenges of application modernization.
-
The Future of Augmented Reality and AI
By:
Type: Talk
This all-star panel will unveil how industry leaders are shaping augmented reality and artificial intelligence to enable breakthrough business performance. IBM, NuEyes Tech, and AVATAR Partners will share the latest including IBM Watson AI, AR infused with AI and MR smart glasses.
-
The Future of Augmented Reality and AI
By:
Type: Talk
This all-star panel will unveil how industry leaders are shaping augmented reality and artificial intelligence to enable breakthrough business performance. IBM, NuEyes Tech, and AVATAR Partners will share the latest including IBM Watson AI, AR infused with AI and MR smart glasses.
-
The Future of Augmented Reality and AI
By:
Type: Talk
This all-star panel will unveil how industry leaders are shaping augmented reality and artificial intelligence to enable breakthrough business performance. IBM, NuEyes Tech, and AVATAR Partners will share the latest including IBM Watson AI, AR infused with AI and MR smart glasses.
-
Cyber Notes Cast - The Highlights of the IBM Cost of a Data Breach 2022 report
By:
Type: Talk
Companies of all sizes and industries should be concerned about the impacts of a data breach, since, according to the IBM Cost of a Data Breach 2022 report, its average cost is $4.35 million, and 83% of companies had more than one breach. With this in mind, we prepared this Cyber Notes Cast exploring the main information collected by this document. To facilitate your reading, we divided our text into topics. These are: - What Is the IBM Cost of a Data Breach Report? - IBM Cost of a Data Breach 2022 report: What’s New - Main Data Collected in the IBM Cost of a Data Breach 2022 Report - Topics with Detailed Results - Suggested Security Recommendations in the Report - About senhasegura Enjoy this Cyber Notes Cast!
-
CW ANZ: Taming the data beast
By: TechTarget ComputerWeekly.com
Type: Ezine
Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
-
Watson Can Power Your Application. What Will You Do With It?
By: IBM
Type: Webcast
View this webcast to see experts discuss and demonstrate the new IBM Watson services available on Bluemix.
-
Solving Today's Identity Challenges With An Identity Fabric
By: TD Synnex
Type: White Paper
As cloud migration accelerates, organizations face complex identity challenges. IBM Security Verify offers an identity fabric to eliminate silos, integrate legacy apps, and provide real-time risk-based authentication. Learn how to simplify identity management across your hybrid environment in this white paper.
-
Build an Android app using the MobileData cloud service
By: IBM
Type: Webcast
Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.
-
Building an Android App using MobileData Cloud
By: IBM
Type: Webcast
Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.
-
Machine LearningPersonalize your customer experiences.
By: IBM
Type: White Paper
Use machine learning to uncover deeper predictive intelligence from your customer data. You could be with IBM Z.
-
CW Innovation Awards: SIA taps blockchain for loyalty app
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
-
Securing your Journey to the Hybrid Multi-Cloud – from Patchwork to Platform
By:
Type: Replay
As organization utilize the cloud for innovation and growth, security teams are challenged with ensuring those business initiatives and missions are successful. We need to drive change and integrate security into the business at many levels, from strategy to technology and incident response. We also need to extract as much value as possible from the tools and data sources we already have in place. Join us to see how what IBM has learned from thousands of engagements and how the industry is moving towards a true, open, interoperable platform for securing hybrid multicloud environments. Please feel free to reach out to Patrick and or Chris with any questions or requests at patrick.vowles1@ibm.com and cbontem@us.ibm.com
-
Navigating cost and contractual concerns in network monitoring and managed services
By: LogicVein
Type: White Paper
Understand the cost structures, contract flexibility, and data management provisions when selecting network monitoring and managed services. Learn from real-world lessons by industry leaders to ensure your organization's infrastructure aligns with financial and operational goals. Read the full white paper to make informed decisions.
-
IBV - CEOs Guide to Generative AI - Procurement
By: IBM
Type: White Paper
Discover how generative AI is transforming procurement in IBM's "CEO's Guide to Generative AI." Learn how AI can streamline supply chains, improve decision-making, and drive cost efficiencies, helping your organization stay competitive. Unlock the full potential of AI to future-proof your procurement operations.
-
Taking control of your IBM environment with ServiceNow
By:
Type: Replay
It’s no surprise that IBM license agreements are varied, intricate, and frequently updated. Which can make finding the data to prove compliance costly and time-consuming. That’s why ServiceNow and Anglepoint are simplifying IBM license management by bringing together ServiceNow Discovery, ServiceNow SAM and the IBM publisher pack to optimize costs and utilization. Join this webinar to learn: - How ServiceNow Software Asset Management, Discovery, and IBM publisher pack work together for operational transparency - The benefits of leveraging ServiceNow for a centralized view of your IBM environment - How our partnership helps you handle license reporting with confidence and expertise It’s time to discuss optimizing IBM license compliance with two companies that really understand the challenges.
-
Leading Vendors in Identity and Access Governance: 2024 Report
By: Saviynt
Type: Analyst Report
This 2024 “KuppingerCole Leadership Compass” report explores top vendors in the identity and access governance (IAG) market. To compare vendors like IBM, Microsoft and Saviynt – and to unlock 10 recommendations for your IAG strategy – keep reading.
-
CW Innovation Awards: How Zuellig Pharma is fighting fake drugs with blockchain
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Zuellig Pharma is leveraging blockchain to help countries get up to speed with their vaccination programmes and counter the threat of counterfeit vaccines.
-
Top 5 IBM i & IBM Z Automation Best Practices
By:
Type: Replay
While improving productivity across the organization is an ongoing pursuit, when it comes to IBM i and IBM Z applications, you often find it ends up out of scope for new projects. Seen as the impossible last mile of automation, legacy application automation feels too far out of reach with the limited RPG and COBOL development expertise you have in-house. But today new tools and approaches are opening the door to adding IBM i and IBM Z applications into your automation projects so you can achieve maximum business value. Please join Andrew Simpson, Principal Solutions Specialist at Rocket Software, to learn IBM i and IBM Z automation best practices that you can use today to start targeting that last mile, including: • How to build out a smart automation strategy • Understanding the human component and how it influences your automation prioritization • Automation management