> Technology > Knowledge Management
 

Knowledge Management

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.
Results 1 - 25 of 891Sort Results By: Published Date | Title | Company Name
By: CrownPeak     Published Date: Apr 17, 2015
Websites today are required to meet comprehensive safety, security and confidentiality measures. However, dangerous cyber attacks like Distributed Denial of Service (DDoS) can temporarily, or worse, permanently, affect the accessibility and availability of a website. So how does a website protect itself from these malicious attacks to ensure safety, scalability and security for its users? They must build services and applications which are resilient to these security threats.
Tags : amazon web services, aws, ddos attacks, resilient architecture, crownpeak
     CrownPeak
By: Oracle Primavera     Published Date: Apr 17, 2015
Learn how top performers select and execute transformative projects due to the centralized information and automated processes that Project Portfolio Management (PPM) solutions provide.
Tags : ppm, oracle, transformative projects, project portfolio management, it management
     Oracle Primavera
By: Appcito     Published Date: Apr 09, 2015
Traditionally, rollout of a new software version has been a critical and painful process. In the past, new versions were implemented along with a maintenance period (i.e., service downtime), resulting in loss of business for that period. This downtime was generally acceptable when there were only a few releases a year. But now—in a more fast-paced world of hosted software-as-aservice (SaaS) solutions, increased responsiveness and daily or even more frequent releases—down times are no longer acceptable or a?ordable. Continuous Delivery is a practice used in the software industry to automate and improve the process of software delivery. It is all about adopting practices to release high-quality software fast through automation of the build, test and deployment processes.
Tags : saas solutions, responsiveness, cloud delivery, continuous delivery, high-quality software
     Appcito
By: IBM     Published Date: Apr 09, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.
Tags : data security, ibm, ibm infosphere, privacy strategy, big data security
     IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security
     IBM
By: IBM     Published Date: Apr 09, 2015
As The Business Becomes Digital, Security Must Become Data-Centric S&R leaders of enterprises undergoing a digital transformation will soon realize that in order to adequately ensure customer protection and enable a digital workforce, S&R pros must abandon traditional perimeter-based security and put the focus on the data by embracing Forrester’s Zero Trust Model.
Tags : data security, ibm, customer protection, digital workforce, zero trust model
     IBM
By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : data security, ibm, risk management, network security, security threat
     IBM
By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : data security, ibm, converged network security, security risk, it management
     IBM
By: IBM     Published Date: Apr 09, 2015
Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.
Tags : magic quadrant, ibm, intrusion prevention systems, security, security risk
     IBM
By: IBM     Published Date: Apr 06, 2015
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : data discovery, data classification, security, risk, ibm
     IBM
By: IBM     Published Date: Apr 06, 2015
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : big data, analytics, unstructured content, enterprise information, ibm
     IBM
By: IBM     Published Date: Apr 06, 2015
With a data explosion upon us that shows no slowing in sight, information governance is no longer an option for corporations. IBM StoredIQ is an important first step toward getting data under control, lowering storage costs and mitigating risk.
Tags : information governance, ibm storediq, risk, storage, data management
     IBM
By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications, knowledge management
     Okta
By: OpenText     Published Date: Apr 02, 2015
Enterprises of nearly all sizes and industries are undergoing significant changes in how, when, and where their employees work, largely due to both new technologies and the realities of global commerce and collaboration. Business leaders are pushing their IT departments to come up with new solutions to help their employees be more productive, while IT leaders strive to ensure that corporate systems are secure, available and delivering a superior user experience. Read this executive brief to learn more about remote access solutions.
Tags : remote access, unix, linux, user experience, wireless
     OpenText
By: OpenText     Published Date: Apr 02, 2015
The most advanced UNIX desktop virtualization solution available, Exceed VA TurboX empowers a global workforce though remote application access and provides an optimal user experience that improves performance and productivity. Read this product overview to learn more about OpenText Exceed VA TurboX 10.5.
Tags : opentext exceed va turbox, remote access, productivity, resources, it management
     OpenText
By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : acceptable use, communications systems, text messaging, acceptable use policy, confidentiality
     SpectorSoft
By: IBM     Published Date: Apr 01, 2015
In this On Demand session learn about using cloud-based social collaboration tools to streamline key areas of your business, increasing time to invest in new product development. Hear how one manufacturer turned to an IBM Business Partner to implement IBM SmartCloud Connections.
Tags : cloud technologies, social collaboration tools, ibm, it management, wireless
     IBM
By: Bit9     Published Date: Mar 31, 2015
As countless retail organizations have fallen victim to POS-driven information security breaches targeting consumer payment card data, pressure on retail executives to take further action to protect POS devices has risen dramatically. Download the SANS Institute’s latest report on Point of Sale Security today!
Tags : pos, bit9, it security breaches, pos security, bit9
     Bit9
By: Bit9     Published Date: Mar 31, 2015
Today’s PCI compliance landscape is one of continuing change and scrutiny. Given the number of recent high-profile breaches in the retail space, the pressures will only increase.
Tags : pci assessments, pci compliance, bit9, data security standards, it management
     Bit9
By: Bit9     Published Date: Mar 31, 2015
Bit9’s approach to compliance is simple. Organizations should include relevant stakeholders in building Compliance Control Policies to meet regulatory standards while supporting business goals. Control Policies dictate which assets are covered by each Standard and what actions users can execute for each asset. By grouping similar classes of assets and users, policies can be logical to users, enforcement is automatic and audits are simplified.
Tags : it auditor, security controls, risk compliance, bit9, compliance control policies
     Bit9
By: Bit9     Published Date: Mar 31, 2015
This eGuide will update you on the latest HIPAA changes impacting information security, and outlines practical steps you can take, starting today, to not only meet HIPAA’s compliance requirements but to also make tangible improvements to your information security program as a whole.
Tags : phi security, hipaa compliace, information security programs, bit9, hipaa risk
     Bit9
By: Bit9     Published Date: Mar 31, 2015
POS devices have become a constant target for criminal hackers. Protecting your point-of-sale systems as well as cardholder data is becoming the most crucial element to securing your organization. This eBook will help you understand the history of POS technology and the advanced threats currently facing your environment.
Tags : pos, pos security, pos systems, pos technology, bit9
     Bit9
By: CDW     Published Date: Mar 31, 2015
Organizations face a challenging deadline as the end of support for Windows Server 2003 nears, but they also have an opportunity for data center transformation. Download this infographic to learn more.
Tags : windows server 2003, microsoft, server migration, workloads, applications
     CDW
By: CDW     Published Date: Mar 31, 2015
The new IT conundrum is to decide to rent infrastructure or build out your data center. The data explosion of the past decade has left many enterprises awash in a mixed and disjointed storage environment. With different storage technologies for primary, backup and analytic storage pools and SSD options that can confound rather than help, many in IT are struggling to improve the efficiency, performance and cost structures of what has become a big part of IT's spend. Watch this webinar to learn more.
Tags : storage, cloud, infrastructure, data center, storage technologies
     CDW
By: CDW     Published Date: Mar 31, 2015
Founded in 1929, the Rutgers Business School offers undergraduate and graduate degrees with programs in accounting, business administration, finance, information technology, pharmaceuticals and supply chain management. By leveraging cloud services, the burgeoning school can deliver rapid virtualization and easy single sign-on without cutting corners. Read this case study to learn more.
Tags : storage, cloud, infrastructure, data center, storage technologies
     CDW
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search