> Technology > Knowledge Management
 

Knowledge Management

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.
Results 1 - 25 of 923Sort Results By: Published Date | Title | Company Name
By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : phishing, next-generation malware, security, email, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : cyberthreat, security, malware, defense, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.
Tags : advanced protection, cyberthreat, security, incident response team, threatsecure
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Download this white paper to learn how to add value through malware analysis.
Tags : malware, security threat, cyberattack, cyberthreat, malware analysis
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : security challenges, mid-market security, cyber-extortion, cyberthreat, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar to learn how to win the battle against Advanced Persistent Threats.
Tags : persistent threats, cyberattacks, security, data breach, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : advanced threats, advanced targeted attacks, security, cybersecurity, it management
     ThreatTrack Security
By: Pluralsight     Published Date: May 18, 2015
There are five key areas for which you must apply a certain level of attention if you plan on retaining your tech staff: 1. The work environment 2. Education 3. Hardware/software programs 4. Perks of hard work 5. Recognition
Tags : work environment, education, motivation, technology, production
     Pluralsight
By: Pluralsight     Published Date: May 18, 2015
Finding technical talent can be a daunting and challenging task. It used to be that you could find it in obvious places, but the growing demand for these candidates at almost any skill level has made it feel like there is a shortage. And if you do manage to find qualified people, they’re often already engaged and happy where they are.
Tags : talent, technology, consultants, motivation, pluralsight
     Pluralsight
By: Seagate Technology     Published Date: May 15, 2015
An inside look at how IT Executives and System Integrators are managing video surveillance data.
Tags : system integrators, enterprise it, video surveillance, knowledge management
     Seagate Technology
By: Tenable Network Security     Published Date: May 12, 2015
Download and read author Steve Piper's concise, yet detailed new eBook, Definitive Guide to Continuous Network Monitoring, to learn: -Why there is a growing interest in continuous network monitoring -How continuous network monitoring works, and -What’s required to implement continuous network monitoring
Tags : continuous network monitoring, security state, compliance, contextual analytics, vulnerability management
     Tenable Network Security
By: IBM     Published Date: May 07, 2015
In this On Demand session learn about using cloud-based social collaboration tools to streamline key areas of your business, increasing time to invest in new product development. Hear how one manufacturer turned to an IBM Business Partner to implement IBM SmartCloud Connections.
Tags : cloud technologies, social collaboration tools, ibm, it management, wireless
     IBM
By: Tyco Integrated Security     Published Date: May 05, 2015
52 percent of all businesses are likely to be victimized within the next three years. Download this white paper top learn how accessible, easy-to-use solutions can help lower security costs and give you peace of mind.
Tags : small businesses, affordability, security, accessibility, wireless
     Tyco Integrated Security
By: Red Hat     Published Date: May 05, 2015
New Gartner research predicts that 75% of IT organizations will have a bimodal capability by 2017. Bimodal is a critical capability that combines the solid conventional capabilities of IT alongside a capability to respond to the level of uncertainty and the need for agility required for a digital transformation. According to Gartner, half of IT organizations that have a bimodal capability will make a mess. Learn more about Gartner's predictions for common mistakes that CIOs will make and how to avoid them.
Tags : red hat, gartner, bimodal it, cio, it architecture
     Red Hat
By: Red Hat     Published Date: May 05, 2015
In today’s challenging economic environment, IT planners are continuously seeking innovative ways to enhance service levels and contain costs. Forward-looking organizations are revamping IT infrastructure and deploying virtualization solutions and private cloud services to improve business agility and reduce equipment and operating expenses.
Tags : red hat, rhel, virtualization solutions, it operating expences, business agility
     Red Hat
By: Red Hat     Published Date: May 05, 2015
IT organizations are under intense pressure to improve service levels and contain expenses in today’s challenging economic climate. Forward-looking organizations are upgrading IT infrastructure and implementing virtualization and cloud computing solutions to improve business agility and drive down costs. Many enterprises are adopting a dual platform approach, retaining Microsoft Windows for office productivity and collaboration applications, and deploying Red Hat® Enterprise Linux® for infrastructure and datacenter modernization initiatives. By adopting standards-based Red Hat Enterprise Linux, businesses can enjoy high performance, reliability, and security, with a lower overall TCO.
Tags : red hat, platform strategies, modern datacenter, virtualization, cloud computing solutions
     Red Hat
By: Red Hat     Published Date: May 05, 2015
It's time to manage all your VMware machines through 1 tool. Red Hat® CloudForms gives you visibility and control throughout your whole infrastructure—from individual VMware machines to your entire cloud and virtualization infrastructure. Download the technology brief to learn more.
Tags : redhat, cloud management, vmware environments, virtualization infrastructure, visibility
     Red Hat
By: Tyco Integrated Security     Published Date: May 05, 2015
Maximizing your security resources can be one rewarding way to extend your resources and visibility into your business.
Tags : security resources, security technology, video surveillance, security resources, knowledge management
     Tyco Integrated Security
By: Tyco Integrated Security     Published Date: May 05, 2015
This white paper outlines the behaviors to recognize and the proactive security measures you can take to protect your employees and customers.
Tags : workplace violence, crime, assault, protection, security equipment
     Tyco Integrated Security
By: Cisco     Published Date: May 04, 2015
Download this infographic to discover the top three tips when choosing an NGFW (Next Generation Firewall) to protect your business from attacks. The three tips we will review are: • Strong security • Low total cost of ownership • Ease of management and reporting
Tags : next generation firewall, ngfw, security, acquisition, management
     Cisco
By: Dell     Published Date: May 04, 2015
Replacing an aging desktop fleet is an important investment in your business. Faster and more reliable systems that offer the latest technology provide your employees an opportunity to be more productive with less waiting while they work. New desktops also benefit your IT staff, with significantly lower power costs and support for out-of-band management to reduce costly desk side visits.
Tags : performance, repair, aging desktops, desktop replacement, employee productivity
     Dell
By: Sightline Systems     Published Date: Apr 29, 2015
The purpose of this article is to provide the performance analyst with a systematic approach to performance evaluation and point out some common mistakes that can be avoided.
Tags : performance evaluation, performance analyst, performance metrics, evaluation technique, it management
     Sightline Systems
By: Oracle Primavera     Published Date: Apr 17, 2015
Learn how top performers select and execute transformative projects due to the centralized information and automated processes that Project Portfolio Management (PPM) solutions provide.
Tags : ppm, oracle, transformative projects, project portfolio management, it management
     Oracle Primavera
By: IBM     Published Date: Apr 09, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.
Tags : data security, ibm, ibm infosphere, privacy strategy, big data security
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search