> Technology > Knowledge Management
 

Knowledge Management

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.
Results 1 - 25 of 978Sort Results By: Published Date | Title | Company Name
By: Sage     Published Date: Aug 31, 2015
An Essential Guide to Protecting Your Sales, Profits and Brand.
Tags : sage, emv payments, credit card processing, processing terminals, data security standards
     Sage
By: Sage     Published Date: Aug 31, 2015
In this report, we will examine all facets of mobile payment processing, beginning with a very brief history of mobile payments and forecasts for the future. We will then explore the benefits of mobility for small and mid-sized businesses, the ease of processing mobile payments, the equipment required and the issues small and mid-sized businesses should take into consideration when taking your business mobile.
Tags : sage, mobile payments, business mobile, mobility, wireless
     Sage
By: Intralinks     Published Date: Aug 28, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations.
Tags : it management, knowledge management, data management
     Intralinks
By: Intralinks     Published Date: Aug 28, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes.
Tags : it management, knowledge management, data management
     Intralinks
By: Mimecast     Published Date: Aug 19, 2015
A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails
     Mimecast
By: Entrust     Published Date: Aug 18, 2015
This is a whitepaper about the business value of extended validation.
Tags : extended validation, certificate, internet, browser, ssl
     Entrust
By: Hostway Services, Inc.     Published Date: Aug 14, 2015
This is a webinar about how to increase your profits selling Hostway products and solutions.
Tags : reselling, profits, managing, customers, solutions
     Hostway Services, Inc.
By: AlienVault     Published Date: Aug 13, 2015
Demonstrating compliance with PCI DSS is far from a trivial exercise. Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
Tags : compliance, pci, dss, technical, security
     AlienVault
By: Hostway Services, Inc.     Published Date: Aug 13, 2015
This is a whitepaper outlining what designers and developers should look for in a potential reselling partner.
Tags : hosting, developer, reselling, services, service
     Hostway Services, Inc.
By: Arcserve     Published Date: Aug 12, 2015
Read this white paper to learn why high capacity storage mediums like magnetic tape are seeing a resurgence in value to IT.
Tags : tape backup, high capacity storage, magnetic tape, cloud, durability
     Arcserve
By: Venafi     Published Date: Jul 27, 2015
According to Gartner, by 2017, more than ?50% of network attacks will use encrypted SSL/TLS. Most organizations cannot decrypt and inspect SSL communications to detect these threats, which creates security blind spots.
Tags : ssl traffic, venafi, tls, security blind spots, it security
     Venafi
By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy
     XO Communications
By: Cherwell Software     Published Date: Jul 14, 2015
Watch these informative videos to learn what parts of ITIL best suit your organization.
Tags : knowledge management
     Cherwell Software
By: IBM     Published Date: Jul 07, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs. It also charts our four capabilities and the modular services aligned to them.
Tags : ibm, developer, app, platform, it manager
     IBM
By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails
     Mimecast
By: F5 Networks Inc     Published Date: Jun 24, 2015
Enterprises are moving to a software-defined, private cloud data center model for agility, operational efficiency, and a self-service approach to deploying applications and associated services. They are utilizing a two-tier hybrid services architecture to get the benefits of specialized hardware for front door network services and scalable software for application, stack-specific services. Read this whitepaper to learn how to integrate the necessary services with the orchestration and automation systems of a software-defined data center.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jun 24, 2015
To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: OnBase by Hyland     Published Date: Jun 10, 2015
When selecting enterprise content management (ECM) solutions, many IT departments face internal pressure to keep costs down and decrease the time it takes to see results, while giving end-users exactly what they want. Discover how involving IT in the buying process allows you to select an ECM solution that remains successful throughout its lifetime.
Tags : enterprise content management, ecm, costs, ecm solution, it management
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 10, 2015
Discover how the real savings associated with document capture start when automatically capturing and validating data from your organization’s scanned documents to eliminate costly process steps and free up staff time.
Tags : document capture, data validation, scanning, enterprise content management, ecm
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 10, 2015
The role of enterprise content management (ECM) as a centralized document repository is well established. However, the value of ECM increases exponentially when it is leveraged as an information hub between line-of-business (LOB) systems to facilitate key processes, keep data in sync and maximize investments in existing applications.
Tags : enterprise content management, ecm, enterprise information hub, line of business systems, it management
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 09, 2015
This white paper shows you how ECM evolves your document management strategy so that you can: • Make your content work for your organization • Streamline processes with seamless integrations • Remove manual processes surrounding your organization’s content
Tags : document management, enterprise content management, ecm, business applications, content integration
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 09, 2015
You’ve determined how ECM can help your organization automate manual tasks, improve workflows and eliminate paper-based processes. Next is developing an ECM solution based on your business needs.
Tags : enterprise content management, ecm, automation, workflow, paperless
     OnBase by Hyland
By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : phishing, next-generation malware, security, email, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : cyberthreat, security, malware, defense, it management
     ThreatTrack Security
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search