data exchange

Results 26 - 50 of 83Sort Results By: Published Date | Title | Company Name

Delivering Secure Messaging Services for Enterprise Process and Collaboration

Published By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : 
certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance, email security, security management
    
DataMotion

eBook: Recruiting Metrics

Published By: Workable     Published Date: Oct 09, 2019
In every organization, the recruiting process generates data: how long it took to fill one role, how many candidates progressed to the final hiring stage or how many comments hiring teams exchanged until they made a hire. Through tracking metrics, you can get tangible evidence of how successful your recruiting process is, rather than relying on intuition. In this guide, we put together everything you need to know to start making the most out of your recruiting data. You’ll find: A list of common recruiting metrics to track. A detailed look into five of the most important KPIs. How to collect data and track metrics consistently over time.
Tags : 
    
Workable

EDI Basics

Published By: OpenText     Published Date: Mar 02, 2017
Whether you’re new to Electronic Data Exchange (EDI) or looking to enhance your understanding, EDI Basics is for you. This ebook explains fundamental EDI concepts in simple language to help you move away from old, manual processes to an automated supply chain.
Tags : 
edi solutions, b2b integration, edi benefits, implementation
    
OpenText

Email Insider Threat Prevention

Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod
    
BAE Systems

Engineering Supply Chain Data Exchange

Published By: ITI     Published Date: Aug 21, 2009
Today 3D CAD models are driving the world's product development processes. Finite Element Analysis, Rapid Prototyping, NC programming, Data Exchange, and other downstream applications rely to a growing extent on the direct use of CAD models to streamline processes saving time and money.
Tags : 
supply chain, scm, supply chain management, computer aided design, cad models, cad model, product development, product testing
    
ITI

Exchange 2007 Data Protection and Disaster Recovery

Published By: Dell Software     Published Date: Apr 25, 2008
In Quest’s new white paper, learn how to implement a solid data protection, recovery, compliance and e-discovery strategy for your critical e-mail data.
Tags : 
disaster recovery, data protection, exchange recovery, exchange e-discovery, comprehensive data protection, continuous data protection, brick level recovery, email archiving
    
Dell Software

Filling the Gaps in Office 365

Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro

Free eBook - 5 Signs You Need a New HIE Solution

Published By: NextGen     Published Date: Jan 29, 2015
Congratulations! You're on the right path toward a more flexible, powerful HIE solution (and greater peace of mind). The thought of moving to a new HIE solution can be tough. But as one of our new replacement clients, Rob Hack, Executive Director at HealtheConnections, recently said "The risk of doing nothing was far greater than the risk of making a switch." Hear some real client examples in our next communications.
Tags : 
mirth, data, healthcare, practitioners, insurers, billing/scheduling, systems, health
    
NextGen

Free eBook: 6 Interoperability Myths to Dispel Right Now!

Published By: NextGen     Published Date: Jan 29, 2015
Recognize these six misconceptions that can harm your success. Don’t be “fuzzy” about interoperability and sharing data. Misinformation abounds. Get the straight scoop and the right start to your interoperability plan. Robust interoperability is critical to sustain and grow your organization. It’s the top priority of the Office of the National Coordinator of Health Information Technology (ONC). It should be a high priority for you too.
Tags : 
mirth, interoperability, hit, data, sharing, himss, healthcare, practitioners
    
NextGen

Free Trial: Replay 4 for Instant Backup of HR Email and Content from Windows application servers

Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
AppAssure Software

Get the 2013 Gartner Magic Quadrant for General-Purpose Disk Arrays

Published By: Nimble Storage     Published Date: Oct 28, 2013
Improvements in scalability, availability, performance, and functionality of midrange storage systems have blurred the boundaries between network-attached, midrange, and high-end storage systems. This Magic Quadrant will help IT leaders understand storage vendors' strategies and market strengths.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage

Handling EDI Exceptions with Order Processing Automation: A Guide for Customer Service Processionals

Published By: Esker     Published Date: Dec 19, 2016
Electronic Data Interchange, commonly referred to as EDI, is a process that allows data to be exchanged between businesses in a standard electronic format. Sales order processing is an area of business where EDI is used extensively. However, up to one-third of EDI orders can contain exceptions — this is where problems surface. Traditional handling methods cause a host of challenges for customer service professionals and the business as a whole. This eBook aims to expose these issues, while showing how order processing automation can work with existing EDI environments to streamline exception handling and fix any potential problems before they mess up your ERP system and bottom line. Learn more about EDI Exceptions, download now!
Tags : 
    
Esker

Healthcare Overcomes Difficulties With the Advantages of Hybrid Packet-Optical Networks.

Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena

High Availability for Windows Services

Published By: Neverfail Group     Published Date: Aug 21, 2009
This white paper discusses Windows high availability, with a focus on business drivers and benefits. Cost and real-world benefits are considered the two most important elements in choosing the right high availability solution.
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance
    
Neverfail Group

How Adaptive Signage Boosts Store Performance?

Published By: Intel     Published Date: Sep 10, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel

How Adaptive Signage Boosts Store Performance?

Published By: Intel     Published Date: Sep 14, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel

How Flash-Optimized Nimble Storage is Engineered for Efficiency

Published By: Nimble Storage     Published Date: Oct 28, 2013
Storage plays a critical role in the datacenter. To keep up with the performance, capacity, availability, and efficiency needs of today’s enterprise, storage is undergoing a transformation by leveraging flash, high-capacity disks, and integrated data management. This paper discusses how Nimble Storage’s flash-optimized architecture is engineered to accelerate applications, scale performance and capacity, protect data, and make IT more productive and empowered.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage

How to Simplify SSL Certificate Management

Published By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : 
ssl certificates, communication, webmail, technical support, technology, data, security, knowledge management
    
Symantec Corporation

Improve Your Ability to Send, Receive, Track, and Collaborate on Large Files

Published By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt

Improve Your Ability to Send, Receive, Track, and Collaborate on Large Files

Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt, Inc.

Is Your Outsourcing Secure?

Published By: Utimaco     Published Date: Aug 18, 2008
Better safe than sorry! When outsourcing, keeping an eye on data security right from the planning stage can save your company from nasty surprises. Readers should learn how to protect their confidential data when they exchange information with external partners.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco

Microsoft Exchange Best Practices

Published By: Pillar Data Systems     Published Date: Apr 20, 2010
The most critical component of an Exchange deployment is the storage subsystem where the data is held. Download this white paper to learn best practices in storage sizing and deployment.
Tags : 
pillar data systems, microsoft exchange best practices, storage size, exchange deployment, virtualization, storage configuration, data priority, storage virtualization
    
Pillar Data Systems

Middle East broadcaster chooses Equinix to help grow its content-on-demand business

Published By: Equinix     Published Date: Jul 07, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content, content management system
    
Equinix

Middle East broadcaster chooses Equinix to help grow its content-on-demand business (German)

Published By: Equinix     Published Date: Jul 11, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content, content management system
    
Equinix

Migrating To Sharepoint 2010? - Ten Things I've Learned the Hard Way (So You Don't Have To)

Published By: Idera     Published Date: Jun 21, 2011
SharePoint 2007 was big, and SharePoint 2010 shows every sign of being even bigger. However, there is one stumbling block on the way to SharePoint 2010 nirvana... upgrading. In this white paper, find out ten of the common difficulties you may encounter when upgrading content to SharePoint 2010 and some solutions.
Tags : 
idera, sharepoint, migration, upgrade, monitor, customization, metadata, populating
    
Idera
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.