Pulse 2014







February 23 - 26
MGM Grand - Las Vegas, Nevada.

#ibmpulse

Continue Your Pulse Education

What you learn in Vegas doesn't need to stay in Vegas. As a way to continue your learning, we've pulled together a collection of resources separated by stream to help you follow up on some of what you discovered during Pulse.

Click on the graphics below to find additional white papers, videos, and links that relate to what was covered during Pulse 2014.

Reinventing Your Business with IBM Cloud

Optimizing IT & Service Management

Building a Smarter Infrastructure


Building a Smarter Infrastructure

Customer videos

“During a recent merger we were able to eliminate 4 million square feet and seat the 10,000 people required for that transaction in our existing footprint.”

“One of the quantifiable benefits of this implementation is to reduce drastically the number of emergency work orders completed in our plants .. we wanted to target emergency work orders to a maximum of 5% in our plant and this will be possible with a centralized system where we can control and share information and also take decisions."

White papers


Managing and Securing the Mobile Infrastructure

Leveraging Security Intelligence


Leveraging Security Intelligence

IBM Security: Intelligence, integration, expertise

To help address the growing need for enterprise security in today’s hyper-connected business environment, IBM has created the Security Systems division with a strategy based on intelligence, integration and expertise, designed to move beyond traditional defenses.

IBM helps organizations address difficult security challenges

IBM enables organizations to embrace innovation with a sense of confidence by helping them to focus their security controls around users, transactions and assets and using security intelligence to identify and respond to the security threats that matter the most.

IBM X-Force Threat Intelligence Quarterly - Q1 2014

Explore the latest Security trends from malware delivery to mobile device risks-based on 2013 year-end data and ongoing research.

A new standard for security leaders: Insights from the 2013 IBM Chief Information Security Officer Assessment

Get the latest on a new standard for security leaders. The 2013 Assessment is based on interviews with security leaders on leading business practices, technologies and measurement.

Download this assessment to learn about leading business practices, technologies – including Cloud and Mobile, and Business Measurement.


Building a Smarter Infrastructure Resources

Customer videos

“During a recent merger we were able to eliminate 4 million square feet and seat the 10,000 people required for that transaction in our existing footprint.”

“One of the quantifiable benefits of this implementation is to reduce drastically the number of emergency work orders completed in our plants .. we wanted to target emergency work orders to a maximum of 5% in our plant and this will be possible with a centralized system where we can control and share information and also take decisions."

White papers


Leveraging Security Intelligence Resources

IBM Security: Intelligence, integration, expertise

To help address the growing need for enterprise security in today’s hyper-connected business environment, IBM has created the Security Systems division with a strategy based on intelligence, integration and expertise, designed to move beyond traditional defenses.

IBM helps organizations address difficult security challenges

IBM enables organizations to embrace innovation with a sense of confidence by helping them to focus their security controls around users, transactions and assets and using security intelligence to identify and respond to the security threats that matter the most.

IBM X-Force Threat Intelligence Quarterly - Q1 2014

Explore the latest Security trends from malware delivery to mobile device risks-based on 2013 year-end data and ongoing research.

A new standard for security leaders: Insights from the 2013 IBM Chief Information Security Officer Assessment

Get the latest on a new standard for security leaders. The 2013 Assessment is based on interviews with security leaders on leading business practices, technologies and measurement.

Download this assessment to learn about leading business practices, technologies – including Cloud and Mobile, and Business Measurement.



Augmented reality mobile apps mentioned by David Pogue

Nearest Tube

TwittARound

Word Lens


General Session and Keynote Presentations

  • -Day 1 General Session: Cloud as a Growth Engine for Business

    It’s a Bold New World out there. Are you making the bold moves required to get the competitive edge you need in this dynamic business environment? The Day 1 Opening General Session presented ways to gain insights into the bold thinking, bold decisions and bold moves that you need to get and stay ahead—and how IBM can help you get there. Discover how to create bold opportunities, realize bold outcomes, and achieve bold dreams.

  • -Day 2 General Session: Think it. Build it. Tap into it.

    For the Day 2 General Session, we dove deeper into how the Composable Business will help drive the next era of innovation in your organization—and why the dynamic hybrid cloud is "the future." We'll also explore why evolving to dynamic hybrid environments will require Visibility, Control and Automation built upon open standards and easy-to-consume capabilities "as a service." Wherever you are in the cloud journey, discover how your colleagues and peers have created smarter, cloud-ready infrastructures... transformed business processes... and applied security analytics to their dynamic hybrid cloud environments. Also featured were senior IBM executives including Steve Mills, Deepak Advani, Brendan Hannigan and Tom Rosamilia, who shared their vision and the IBM capabilities that are enabling clients to deliver real results today.

  • -Day 3 General Session: Inspiring Bold Moves

    In this exciting session we heard from SoftLayer CEO, Lance Crosby, who had a bold vision back in 2005 when he founded the company: to become the de facto platform for delivering cloud services. Today, with some help from IBM, that vision is becoming a reality, forever changing the way technology is delivered and consumed. The new pay-as-you-go model for everything you need in IT is shattering the old computing paradigms, from software licensing models and hardware refresh cycles to budgeting operating costs. Lance also shared his perspective on the new work IBM is doing around cloud, and what he sees as a huge opportunity for clients—and why.

  • -Keynote: Reinventing your Business with IBM Cloud

    Is your head in the clouds? Is your organization? Today, cloud is everywhere. And whether it’s mobile, social or big data and analytics, the common connecting thread is cloud—a strategic enabler that belongs at the heart of every business strategy. No matter where you are in the cloud journey, and whether your objective is speeding time-to-market or using analytics to drive better decision-making, cloud can help get you there... and deliver real business outcomes. Explore how you can put cloud to work as a growth engine for your business.

  • -Keynote: Building a Smarter Infrastructure

    How bold is your approach to creating a Smarter Infrastructure? Are you making the right moves? Sensors, GPS, analytics, mobile capabilities: today’s most progressive organizations are transforming the way they manage their assets and facilities to deliver solid business results. Is your business one of them? The Smarter Infrastructure Keynote explored these new technologies and explored the Bold Moves it will take to improve results in your organization. Find our about the latest advancements in enterprise asset management, integrated workplace management, and more.

  • -Keynote: Intelligent Security in a Post-Perimeter World

    So let’s say you’ve made some Bold Moves in protecting the security of the enterprise. But are your moves bold enough to keep out the hackers? In the world of IT security, attackers are highly organized and using increasingly sophisticated methods to gain entry to your most sensitive data. At the same time, cloud and mobile are eliminating the concept of the “perimeter.” Learn how today's CISO is building a more secure enterprises using analytics, asset-based protection and activity monitoring to protect the crown jewels of the organization. You’ll also learn how you can make your attackers’ bold moves go… POOF!

  • -Keynote: Optimizing IT and Service Management

    What does the face of service management look like in your organization? And what will it look like in the future? If there’s one area of IT that clearly is being forced to make Bold Moves… it’s Service Management. Join us to explore the latest advancements in IT optimization and service management. In this session, IBM executives, industry experts and leading IT organizations discussed the evolution of core technologies across the product and service innovation lifecycle, and how IT organizations are seeking to reinvent themselves—and succeeding.

  • -Keynote: Managing and Securing the Mobile Enterprise

    Have you put your business in motion? Today, everything is in motion. Mobile is everywhere. It’s beyond ubiquitous… it’s the primary mode of transaction. And a mobile enterprise is no longer an option—it’s a mandate. Do you need a bold approach to help you build a comprehensive mobile platform? Find out how your colleagues are using mobile, cloud, social and other technologies to explore new computing and business models. And learn how we can help you become a mobile-first enterprise, no matter where you are in your journey. Discover how you can Be First. Put Mobile First.