> Technology > Knowledge Management
 

Knowledge Management

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.
Results 1 - 25 of 966Sort Results By: Published Date | Title | Company Name
By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy
     XO Communications
By: Cherwell Software     Published Date: Jul 14, 2015
Watch these informative videos to learn what parts of ITIL best suit your organization.
Tags : knowledge management
     Cherwell Software
By: Bit9     Published Date: Jul 09, 2015
New cyber-security technology architectures are being designed for automation, integration, and orchestration, and could unify point tools to improve incident prevention, detection, and response while streamlining cyber-security operations. Bit9 + Carbon Black has embraced this new model and designs its products for out-of-the-box integration.
Tags : bit9, cyber security, security processes, cyber security architecture, it management
     Bit9
By: Bit9     Published Date: Jul 09, 2015
This eBook will outline the strategies and tactics cyber criminals use to attack corporate endpoints and servers. It will also provide you with strategies and solutions your organization can use to arm your endpoints against these attacks.
Tags : bit9, financial services, endpoint security, security solutions, endpoint software
     Bit9
By: Bit9     Published Date: Jul 09, 2015
Financial services organizations are responsible for protecting sensitive customer information regardless of how it’s transmitted, where it resides or how authorized users access it. Fail to do so, and the effects can be devastating: loss of highly confidential and sensitive information; financial penalties; and damaged trust and credibility. Endpoints such as ATMs, scanners, and peripherals (e.g. digital signing devices, tablets, mobile, and any other device that has an IP address or URL) have created increased liability and need to be tracked, monitored and managed in real-time. By establishing more effective endpoint controls and safeguards for data, organizations can significantly reduce the risks of business interruptions, non-compliance, data breaches and advanced persistent threats (APTs).
Tags : bit9, financial services, compliance solutions, data breaches, it management
     Bit9
By: IBM     Published Date: Jul 07, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs. It also charts our four capabilities and the modular services aligned to them.
Tags : ibm, developer, app, platform, it manager
     IBM
By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : lenovo, xclarity, server value, system management, automated discovery
     Lenovo
By: Lenovo     Published Date: Jul 07, 2015
Lenovo® Flex System™ — powered by Intel® Xeon® processors — is the newest blade infrastructure design with the attributes that support soft ware-defi ned infrastructure and virtualization better than any competitor. It delivers key benefits better than any competitor: • Reduces capital and operational costs with consistent hardware/software deployment and the ability to simply scale workloads with the highest VM capacity and performance. • Increases agility with simplified rapid deployment and ongoing management to add, change, or move workloads with their associated resources. • Improves efficiency and increases space, power, and cooling with the leading compute, storage, and network density. Download Now! Sponsored by Lenovo® and Intel®"
Tags : lenovo, flex system, network density, operational costs, software deployment
     Lenovo
By: Lenovo     Published Date: Jul 07, 2015
Lenovo® is known for innovative design, superior performance, and reliability. Lenovo Flex System™ — powered by Intel® Xeon® processors — is designed to be the foundation of your IT infrastructure now and into the future. To meet today’s complex and ever changing demands, Lenovo Flex System provides a high performance, integrated infrastructure platform that supports a mix of compute and networking capabilities. The Flex System architecture provides the efficiency you need now, along with the growth path necessary to protect your investment tomorrow. Read more about it when you download! Sponsored by Lenovo® and Intel®"
Tags : lenovo, chassis, flex system, integrated infrastructure platform, networking capabilities
     Lenovo
By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails
     Mimecast
By: F5 Networks Inc     Published Date: Jun 24, 2015
Enterprises are moving to a software-defined, private cloud data center model for agility, operational efficiency, and a self-service approach to deploying applications and associated services. They are utilizing a two-tier hybrid services architecture to get the benefits of specialized hardware for front door network services and scalable software for application, stack-specific services. Read this whitepaper to learn how to integrate the necessary services with the orchestration and automation systems of a software-defined data center.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jun 24, 2015
To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: Verisign     Published Date: Jun 03, 2015
Defending an enterprise today is a more complex and challenging task than ever before. Download this white paper to learn what you need to know to protect your network and data.
Tags : point-of-scale systems, cyber crime, banking trojans, downloaders, hacktivist activity
     Verisign
By: Verisign     Published Date: Jun 03, 2015
This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services in the 1st Quarter of 2015. It represents a unique view into the attack trends unfolding online for the quarter, including attack statistics and behavioral trends.
Tags : ddos, attack mitigation, attack trends, attack statistics, behavioral trends
     Verisign
By: Arcserve     Published Date: May 29, 2015
The traditional taxonomy of data protection appliances – also known as Purpose Built Backup Appliances (PBBAs) – covers two primary categories: • Backup Appliances • Deduplication Appliances Let’s explore this taxonomy and market dynamics.
Tags : data protection appliances, purpose built backup appliances, deduplication, market dynamics, it management
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : data protection appliances, appliance adoption, arcserve, security, it management
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : backup infrastructure, legacy systems, overload infrastructure, cloud, it management
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : backup infrastructure, legacy systems, overload infrastructure, cloud, it management
     Arcserve
By: IBM     Published Date: May 27, 2015
This white paper from a leading analyst, VDC Research, outlines some of the key opportunities and challenges facing companies that make the "things" that comprise the Internet of Things.
Tags : internet of things, product development, time to market, data analysis, it management
     IBM
By: IBM     Published Date: May 27, 2015
Tech-Clarity offers the following ten tips to help companies transform their business to take advantage of this opportunity and prepare for growth and profitability.
Tags : internet of things, product development, time to market, data analysis, it management
     IBM
By: IBM     Published Date: May 27, 2015
With continuous validation and verification practices and solutions, engineering organizations can develop today's smarter products and create the opportunities that can put them on the path to competitive advantage.
Tags : continuous verification, product development, product engineering, mobile, prototyping
     IBM
By: Verisign     Published Date: May 19, 2015
Download this infographic to see observations and insights about attack size and frequency derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and insights from iDefense Security Intelligence Services, from October-December 2014.
Tags : ddos attack trends, ddos protection services, security, it management, wireless
     Verisign
By: Verisign     Published Date: May 19, 2015
Download this case study to see why Verisign asserts that such adaptable and well-orchestrated DDoS attacks point to a rapidly evolving threat landscape, where asymmetries afforded to adversaries require rapid response and layered security defenses that can accommodate an ever-expanding array of attack vectors.
Tags : ddos attack, security defenses, attack vectors, it management, wireless
     Verisign
By: Verisign     Published Date: May 19, 2015
Download this white paper to see why the best approach for protecting your entire infrastructure is to supplement your organization’s security intelligence service with a cloud-based DDoS protection service. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network in today’s online-driven economy.
Tags : infrastructure protection, ddos threats, security threats, intelligence services, it management
     Verisign
By: Verisign     Published Date: May 19, 2015
Download this white paper to see why organizations need to align their security approach and adopt a novel – yet proven – approach for striking a balance between availability and security of applications in the cloud.
Tags : security solution, cloud security, applications, security threat, hybrid cloud
     Verisign
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search