document

Results 926 - 950 of 993Sort Results By: Published Date | Title | Company Name

Free Document Management White Paper

Published By: Accusytem     Published Date: Apr 13, 2011
Banks that have successfully implemented document imaging applications, developed comprehensive polices and diligently follow consistent procedures reap the benefits of efficiencies in loan portfolio management (even more efficiencies if the bank does enterprise-wide imaging), increased productivity, diminished loan policy and document exceptions and streamlined audit and examination processes.
Tags : 
document imaging, banking software system, bank imaging, document management, bank document management
    
Accusytem

Measurable success

Published By: proMX     Published Date: May 08, 2011
This document gives a brief overview on challenges and solutions concerning full resource management.
Tags : 
crm, procect management, microsoft dynamics crm, customer relationship management, ressource management
    
proMX

Fortifying the Pillars of IT Governance for Microsoft SharePoint Server 2010 Deployments

Published By: AvePoint     Published Date: May 11, 2011
This document is intended to aid IT administrators and other stakeholders responsible for managing Microsoft SharePoint deployments, in planning and implementing a comprehensive, reliable and efficient governance strategy
Tags : 
governance, sharepoint, infrastructure management, compliance, document management, migration, auditing, administration, business management, corporate governance, content delivery, corporate portals, information management
    
AvePoint

Compelling Storage Virtualization Software

Published By: DataCore Software     Published Date: Jun 20, 2011
This ESG Lab Validation documents the results of hands on testing of DataCore SANsymphony-V R8 Storage Virtualization Software.
Tags : 
storage virtualization, sansymphony-v, datacore software, virtual desktop, thin provisioning
    
DataCore Software

B2B Content Marketing: 2014 Benchmarks, Budgets, and Trends-North America

Published By: Brightcove     Published Date: Sep 17, 2014
OVERVIEW: THE STATE OF B2B CONTENT MARKETING IN NORTH AMERICA
Tags : 
content marketing, content marketing tactics, documented content strategy, b2b trends
    
Brightcove

Delivering Videoconferencing to the Enterprise

Published By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : 
aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition, video-enabled, video-aided
    
Aberdeen Group

Measuring-ROI-on-a-Document-Management-System

Published By: ITAZ Technologies     Published Date: Aug 17, 2011
This white paper discusses the quantitative and qualitative benefits offered by electronic document management systems.
Tags : 
document management, roi, return on investment, paperless office, small business, small office, software, document management system
    
ITAZ Technologies

A single, secure solution for document-sharing, web meetings, social business and more

Published By: Central Desktop     Published Date: Aug 05, 2011
Central Desktop is the ideal collaboration software for technology companies looking for a secure, powerful solution that will reduce costs, enhance team collaboration and improve project management. It helps IT directors and teams keep documentation up-to-date, share files, manage versions, and keep internal business units from using unapproved, non secure services for sharing documents online and internally. >>>Register to learn more
Tags : 
social collaboration, online collaboration, collaboration software, team collaboration, sharepoint alternative, project collaboration, online team collaboration, online project management, it collaboration, it project management, microsoft sharepoint, internet security, network security appliance, security management, single sign on, analytical applications, business intelligence, configuration management, data integration, collaboration
    
Central Desktop

Requirements Gathering for Electronic Document Management

Published By: CloudDocs by eGistics, Inc.     Published Date: Sep 30, 2011
This paper identifies important criteria for gathering user requirements for an EDMS project.
Tags : 
    
CloudDocs by eGistics, Inc.

Free White Paper: Complete BPMS Buyer's Kit

Published By: iDatix     Published Date: Oct 06, 2011
In order to effectively purchase a document management solution, one must evaluate numerous products and vendors to determine the solution most appropriate for their business.
Tags : 
bpm, ecm, document management, business intelligence, content management system, business technology
    
iDatix

PCI Compliant Data Centers

Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage

Download The 3 Keys To Avoid Project Failure

Published By: AtTask     Published Date: Feb 11, 2012
It really doesn't matter if you are leading an army into battle or a product into market, sometimes the best solutions seem counter-intuitive. The same is true with project management. This document will safeguard your success.
Tags : 
project management mistakes, project management failures, it project failures, project failure statistics, project failure reasons, project failure examples, reasons for project failure, project failure rates, project failure case study, project estimation techniques, knowledge management, employee performance, itil, productivity, project management, software compliance, service management, desktop management
    
AtTask

For regulated industries: Learning within a multi-tenant SaaS architecture

Published By: Success Factors     Published Date: Feb 06, 2014
Organizations in regulated industries struggle with adopting SaaS-based learning solutions because of specific documentation, record-keeping, and IT requirements that must be followed, and the need to comply with a range of Good Practice (GxP) requirements. With a cloud solution that supports GxP requirements, companies in regulated industries can address compliance challenges and deliver a validated environment with a cloud-based LMS.
Tags : 
good practice, gxp, learning management system, lms, cloud-based lms, saas-based learning solutions, human resources, e-learning, employee onboarding, human resource technology
    
Success Factors

How to Achieve 100% Electronic AR Invoicing: Realistic Steps to Quit Paper

Published By: Esker     Published Date: Apr 12, 2012
This paper illustrates that solutions exist today, both as traditional software and Software as a Service, with a proven track record of success in helping companies make the transition to 100% electronic AR invoicing.
Tags : 
order to cash, procure to pay, fax software, fax service, fax server, document automation, accounts payable, accounts receivable, ocr software, workflow, enterprise applications, ssl, sla
    
Esker

Accounts Payable Buyers Guide - 15 Questions to Ask

Published By: Esker     Published Date: Apr 12, 2012
This buyer's guide provides you with the key topics and the most important questions to ask an AP solution provider so that you can select the most appropriate AP solution to meet both your business and process needs.
Tags : 
order to cash, procure to pay, fax software, fax service, fax server, document automation, accounts payable, accounts receivable, ocr software, workflow, enterprise applications
    
Esker

AR Automation: 20 Must-Ask Questions

Published By: Esker     Published Date: Apr 12, 2012
Get answers to the 20 most important questions to ask an AR automation solution provider by exploring Esker's AR Buyer's Guide.
Tags : 
order to cash, procure to pay, fax software, fax service, fax server, document automation, accounts payable, accounts receivable, ocr software, workflow, enterprise applications
    
Esker

Paper-Free AP: Automated Processing of Vendor Invoices

Published By: Esker     Published Date: Apr 12, 2012
Think about the process in your company for a minute. How much time and money is wasted waiting for an invoice to arrive, then walking the document around to be coded, approved, and finally paid? Discover how a touchless invoice processing can help.
Tags : 
order to cash, procure to pay, fax software, fax service, fax server, document automation, accounts payable, accounts receivable, ocr software, workflow, enterprise applications
    
Esker

Strategy Guide to Application Modernization in Government

Published By: HP and Intel® Xeon® processors     Published Date: Dec 20, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier - mainly about application modernization in government.
Tags : 
application modernization, modernization, government, data management, business technology
    
HP and Intel® Xeon® processors

Data and Identity Security

Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
    
CDW Symantec

Protecting Unstructured Data on File Servers, NetApp, EMC and SharePoint

Published By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : 
security, data security, file share security, sharepoint, file servers, netapp, data management, data center
    
Quest Software

IT Governance, Risk and Compliance with ServiceNow

Published By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : 
it governance, risk, compliance, servicenow, webinar, software development, it management, knowledge management, platforms, data management, business technology
    
ServiceNow

Webinar: Tiering Storage for Savings, Performance and Availability

Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear, emc, buying, data, social media, manage, voicemail, presentation, residents, issues, disk, data management
    
CDW

Proteção contra técnicas de evasão avançadas

Published By: McAfee     Published Date: Aug 15, 2014
Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.
Tags : 
    
McAfee

eFax Corporate Overview

Published By: eFax     Published Date: Aug 06, 2013
eFax Corporate is part of publicly-traded j2 Global™ Inc. (NASDAQ: JCOM). Founded in 1995, j2 Global provides outsourced, value-added messaging and communications services to individuals and businesses around the world. The Company offers fax, voicemail and document management solutions, Web-initiated conference calling and unified-messaging and communications services.
Tags : 
efax, value-added messaging, communications services, management solutions, unified-messaging
    
eFax

All-Flash Enterprise Storage: Defining the Foundation for 3rd Platform Application Availability

Published By: NetApp     Published Date: Dec 08, 2014
This white paper focuses on the increasing importance of high availability as enterprises continue to build out a 3rd Platform–based computing infrastructure. As more mission-critical applications requiring extremely high availability are deployed on virtual infrastructure, enterprises must respond using the right storage solutions. The document identifies critical features in the storage infrastructure necessary to meet these requirements for availability and explores how one vendor, NetApp, meets them with its EF-Series AFA solutions portfolio.
Tags : 
all-flash, enterprise storage, platform-based, ef-series, afa solutions, it management
    
NetApp
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.