> Technology > Knowledge Management
 

Knowledge Management

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.
Results 1 - 25 of 953Sort Results By: Published Date | Title | Company Name
By: Cherwell Software     Published Date: Jun 29, 2015
Watch these informative videos to learn what parts of ITIL best suit your organization.
Tags : knowledge management, service level management, incident management, itil, itil framework
     Cherwell Software
By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails
     Mimecast
By: Lucidworks     Published Date: Jun 24, 2015
Using content, context, and the crowd to build better search applications.
Tags : search platform, search query, search technologies, big data, high-volume data
     Lucidworks
By: F5 Networks Inc     Published Date: Jun 24, 2015
Enterprises are moving to a software-defined, private cloud data center model for agility, operational efficiency, and a self-service approach to deploying applications and associated services. They are utilizing a two-tier hybrid services architecture to get the benefits of specialized hardware for front door network services and scalable software for application, stack-specific services. Read this whitepaper to learn how to integrate the necessary services with the orchestration and automation systems of a software-defined data center.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jun 24, 2015
To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: IBM     Published Date: Jun 22, 2015
According to Forrester Research, we have entered the era of Continuous Delivery. Clients are shifting from agile transformation to DevOps, while modern application delivery leaders are embracing DevOps to accelerate delivery of innovation.
Tags : financial services, best practices, continuous delivery, ibm, it management
     IBM
By: IBM     Published Date: Jun 22, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : ibm, compliance requirements, quality management tools, quality management, best practices
     IBM
By: OnBase by Hyland     Published Date: Jun 10, 2015
When selecting enterprise content management (ECM) solutions, many IT departments face internal pressure to keep costs down and decrease the time it takes to see results, while giving end-users exactly what they want. Discover how involving IT in the buying process allows you to select an ECM solution that remains successful throughout its lifetime.
Tags : enterprise content management, ecm, costs, ecm solution, it management
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 10, 2015
Discover how the real savings associated with document capture start when automatically capturing and validating data from your organization’s scanned documents to eliminate costly process steps and free up staff time.
Tags : document capture, data validation, scanning, enterprise content management, ecm
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 10, 2015
The role of enterprise content management (ECM) as a centralized document repository is well established. However, the value of ECM increases exponentially when it is leveraged as an information hub between line-of-business (LOB) systems to facilitate key processes, keep data in sync and maximize investments in existing applications.
Tags : enterprise content management, ecm, enterprise information hub, line of business systems, it management
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 09, 2015
This white paper shows you how ECM evolves your document management strategy so that you can: • Make your content work for your organization • Streamline processes with seamless integrations • Remove manual processes surrounding your organization’s content
Tags : document management, enterprise content management, ecm, business applications, content integration
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 09, 2015
You’ve determined how ECM can help your organization automate manual tasks, improve workflows and eliminate paper-based processes. Next is developing an ECM solution based on your business needs.
Tags : enterprise content management, ecm, automation, workflow, paperless
     OnBase by Hyland
By: Verisign     Published Date: Jun 03, 2015
Defending an enterprise today is a more complex and challenging task than ever before. Download this white paper to learn what you need to know to protect your network and data.
Tags : point-of-scale systems, cyber crime, banking trojans, downloaders, hacktivist activity
     Verisign
By: Verisign     Published Date: Jun 03, 2015
This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services in the 1st Quarter of 2015. It represents a unique view into the attack trends unfolding online for the quarter, including attack statistics and behavioral trends.
Tags : ddos, attack mitigation, attack trends, attack statistics, behavioral trends
     Verisign
By: Arcserve     Published Date: May 29, 2015
The traditional taxonomy of data protection appliances – also known as Purpose Built Backup Appliances (PBBAs) – covers two primary categories: • Backup Appliances • Deduplication Appliances Let’s explore this taxonomy and market dynamics.
Tags : data protection appliances, purpose built backup appliances, deduplication, market dynamics, it management
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : data protection appliances, appliance adoption, arcserve, security, it management
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : backup infrastructure, legacy systems, overload infrastructure, cloud, it management
     Arcserve
By: IBM     Published Date: May 27, 2015
This white paper from a leading analyst, VDC Research, outlines some of the key opportunities and challenges facing companies that make the "things" that comprise the Internet of Things.
Tags : internet of things, product development, time to market, data analysis, it management
     IBM
By: IBM     Published Date: May 27, 2015
Tech-Clarity offers the following ten tips to help companies transform their business to take advantage of this opportunity and prepare for growth and profitability.
Tags : internet of things, product development, time to market, data analysis, it management
     IBM
By: IBM     Published Date: May 27, 2015
With continuous validation and verification practices and solutions, engineering organizations can develop today's smarter products and create the opportunities that can put them on the path to competitive advantage.
Tags : continuous verification, product development, product engineering, mobile, prototyping
     IBM
By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : phishing, next-generation malware, security, email, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : cyberthreat, security, malware, defense, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.
Tags : advanced protection, cyberthreat, security, incident response team, threatsecure
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Download this white paper to learn how to add value through malware analysis.
Tags : malware, security threat, cyberattack, cyberthreat, malware analysis
     ThreatTrack Security
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search