document

Results 226 - 250 of 1013Sort Results By: Published Date | Title | Company Name

Come Superare le Sfide Storage su scala Petabyte per i Big Data e Analytics

Published By: Infinidat EMEA     Published Date: Oct 10, 2019
I Big Data e gli analytics workloads sono la nuova frontiera per le aziende. I dati vengono raccolti da fonti che non esistevano 10 anni fa. Tutti i dati dei telefoni cellulari, i dati generati dalle macchine e i dati relativi all’interazione con i siti vengono raccolti e analizzati. Inoltre, con i budget IT sempre più sotto pressione, l’impatto ambientale dei Big Data non fa che aumentare e pone grandi sfi de per i sistemi storage. Questo documento fornisce informazioni sulle problematiche che le applicazioni dei Big Data pongono sullo storage e su come scegliere le più corrette infrastrutture per ottimizzare e consolidare le applicazioni dei Big Data e degli analytics, senza prosciugare le fi nanze.
Tags : 
    
Infinidat EMEA

Como satisfazer as demandas de mercado para a entrega de aplicativos novos e inovadores

Published By: CA Technologies     Published Date: Aug 10, 2015
No atual cenáriode negócios, variável e ultra-competitivo, acabaram os dias em que as empresas gastavam meses, ou mesmo anos, criando, testando e implementando um aplicativo, serviço ou novas ferramentas para o mercado. Os clientes, usuários de tecnologia e o mercado como um todo, são mais ágeis do que nunca, e suas exigências de uma nova funcionalidade inovadora têm crescido em consequência disso. Em outras palavras, os clientes não se contentam em esperar pelo próximo grande lançamento e não estão dispostos a lidar com falhas e deficiências quando ele chega. Neste documento você aprenderá como uma solução de Release Automation pode ajudar sua organização a simplificar e acelerar seus processos de entrega de aplicativos.
Tags : 
    
CA Technologies

Compelling Storage Virtualization Software

Published By: DataCore Software     Published Date: Jun 20, 2011
This ESG Lab Validation documents the results of hands on testing of DataCore SANsymphony-V R8 Storage Virtualization Software.
Tags : 
storage virtualization, sansymphony-v, datacore software, virtual desktop, thin provisioning
    
DataCore Software

Compliancy & Document Management: The Critical Connection

Published By: Computhink     Published Date: Jan 31, 2008
Download this informative webcast by Doug Brennecke, VP Sales at Computhink, featuring Tom von Gunden, chief editor of enterprise content management news and solutions site ECM Connection.
Tags : 
document management, compliance, content management, computhink, video, content management system
    
Computhink

Comprehensive Cybersecurity Defences for Content Delivery

Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network

Confidential Collaboration: Keeping safe, legal and compliant

Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map, compliance, internet security, intrusion prevention, security management, data protection, secure content management, business technology
    
Intralinks

Configuration Management and Documentation to Meet Federal IT Compliance Mandates

Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance, compliant, regulatory compliance, audit, auditing, cmdb, gisra, ecora
    
Ecora Software

Connecting Physical and Virtual Networks with VMware NSX and Juniper Platforms

Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

Consolidating Microsoft SQL Server with HP PolyServe: The User View

Published By: HP     Published Date: Jul 25, 2008
This paper discusses how HP's PolyServe Software for Microsoft SQL Server combats SQL Server sprawl and compares HP PolyServe to alternative approaches. Download the complete document here.
Tags : 
sql, sql server, migration, infrastructure, server migration, polyserve, network management, servers, windows server
    
HP

Content is the New Perimeter: The Security and Regulatory for Information Rights Management

Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security, business technology
    
Intralinks

Content Marketing Software: An Introduction

Published By: Kapost     Published Date: Feb 20, 2014
Just about everyone claims to be doing content marketing, but far fewer organizations have a thought-out plan. According to Content Marketing Institute, only 44% of B2B marketers and 39% of B2C marketers have a documented content strategy. But as organizations scale content operations, workflows, distribution, and promotion, many are seeking tools to centralize, manage, and improve the process. That’s where content marketing software comes in. This software can help organize, automate, and visualize your efforts to create original content, as well as curate the content of others.
Tags : 
    
Kapost

Content Sharing 2.0: The Road Ahead

Published By: Box     Published Date: Jun 07, 2012
Read how Box let companies rapidly implement a cost-effective and secure content storage and sharing system that can easily expand to accommodate any size and number of files.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, networking, storage, virtualization, cloud computing
    
Box

Content Will Always Be King - Frost & Sullivan Whitepaper

Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, networking, it management, knowledge management, enterprise applications
    
Adlib Software

Contrasting Approaches for Handling Document Review

Published By: Thomson Reuters     Published Date: Jul 30, 2018
How confident is your law firm in its document review process? Learn more about cost-effective and defensible document review and the benefits of partnering with a managed review provider instead of contract attorneys. According to a recent study of Alternative Legal Service Providers (ALSPs), the use of ALSPs such as managed review providers for doc review is expected to grow by more than 50% in the next five years. The top reasons cited for using such providers aligned with the benefits listed here: to control costs and meet peak demand without increasing permanent headcount.
Tags : 
document, review, law, thomson, reuters
    
Thomson Reuters

Controlling Information Extracted from a Database

Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere, information management
    
Avalere

Convert XSD/DTD/WSDL or sample XML document to COPYBOOK with XML Thunder Lite

Published By: Canam Software Labs, Inc.     Published Date: Jan 24, 2011
How to convert your XML sample or XML schema (XSD) to COBOL data structure/COPYBOOK.
Tags : 
convert xsd xml wsdl to copybook, cobol data binding
    
Canam Software Labs, Inc.

Cortes & Hay Title Insurance Agency Case Study

Published By: Computhink     Published Date: Dec 10, 2007
To properly serve their customers, Cortes & Hay must create files of documents that need to be distributed to appropriate parties. The documents that comprise a title insurance binder come from two places. There are documents generated internally, and documents that come from external sources.
Tags : 
document management, title insurance, paperless, cortes & hay, insurance, documents, electronic document management, best practices, computhink, viewwise, viewise, information management, records management
    
Computhink

Cómo convertir la red en un activo de negocio estratégico con Pureview

Published By: Extreme Networks     Published Date: Feb 12, 2015
En este documento, le mostraremos casos de uso concretos de cómo una solución de business intelligence puede ser muy útil para gestionar eficientemente las operaciones de TI
Tags : 
solución de business intelligence, extreme networks, operaciones de ti, networking, it management, enterprise applications
    
Extreme Networks

Create Efficiency: Know the Trends that Damage Document Management Workflow

Published By: Brother     Published Date: Nov 23, 2015
Download this whitepaper and learn some some critical steps to help start the improvement effort in your office.
Tags : 
document management workflow, brother, document management strategy, multifunction printers, office technology, it management, business technology
    
Brother

Critical Scalability Considerations in Evaluating Log Management Solutions

Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox, application security, arcsight, mission critical assets, networking, network security, intrusion detection, intrusion prevention, hipaa compliance
    
ArcSight

CRM + Esignature: Digitizing the Sales Handshake

Published By: Adobe     Published Date: Aug 11, 2015
Download this Aberdeen Group report to learn why the best in class organizations are closing more deals faster by adopting esignatures.
Tags : 
adobe, document, crm, mobile, sales, automation, cloud, transactions, signatures, it management, business technology
    
Adobe

Cuándo y por qué sustituir su plataforma de comercio electrónico

Published By: SAP SME     Published Date: Aug 13, 2015
¿Cómo puede saber si ha llegado el momento de cambiar de plataforma? Lea el documento informativo y aumente su ROI. No pierda más y comience a capturar todas las oportunidades de ingresos disponibles.
Tags : 
omnicomercio, plataforma, sistema de comercio, e-commerce, comercio electrónico, ventas en línea, tienda online, ventas móviles, plataforma digital, sistema de comercio electrónico, hybris, experiencia del cliente, omnicanalidad
    
SAP SME

CureSeq Finds its Online Meeting Cure

Published By: Cisco     Published Date: Nov 30, 2016
CureSeq’s mission is to “revolutionize next-generation sequencing in the oncology space.” To accomplish this, the company must reach as many researchers and clinical oncologists as possible to help them identify and treat cancer. CureSeq, whose work has been published in scientific journals, needed a reliable online meeting solution to communicate effectively with critical stakeholders around the world. After struggling with several other solutions, the company selected Cisco WebEx to take advantage of the platform’s presentation and document-sharing capabilities and audio quality.
Tags : 
    
Cisco

Customer Centricity: Knowledge is Power in the Age of the Customer

Published By: IBM APAC     Published Date: Jul 09, 2017
This document outlines how Best-in-Class firms use efficient content processes to achieve higher levels of customer centricity.
Tags : 
customer, ecm, enterprise content management, customer experience
    
IBM APAC

Customer Centricity: The Key to Success in Retail Banking

Published By: Kofax     Published Date: Sep 08, 2011
See how some retail banks have redirected their focus to a more customer -centric approach. This whitepaper includes success stories from Banco Inversis and GMAC Commercial Mortgage Corporation (now Ally Financial) which highlight how Kofax has helped them maintain and even increase their competitive edge.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.