document

Results 951 - 975 of 1000Sort Results By: Published Date | Title | Company Name

Wainhouse: Evaluation for the Cisco TelePresence SX10

Published By: Cisco     Published Date: Jul 11, 2016
This document contains the results of WR’s independent, third-party testing, and our overall opinions of the Cisco TelePresence SX10 Quick Set group video conferencing system.
Tags : 
    
Cisco

WAT IS "RETURN ON INFORMATION"? : ONTDEK DE WAARDE IN UW DOCUMENTEN EN INFORMATIE

Published By: Iron Mountain     Published Date: Jun 01, 2015
Dit vijfdelige e-book biedt een uitgebreide en samenwerkingsgerichte strategie om organisaties te helpen hun informatiewaarde te maximaliseren en de risico's in elke fase te beperken. Dit geldt voor de gehele levenscyclus van documenten. Van het aanmaken van records en informatie, via het actieve leven tot de veilige vernietiging ervan.
Tags : 
application integration, project management, document management, records management, data warehousing, financial management, business technology
    
Iron Mountain

Web-based Software Automation and the Cellular Retailer

Published By: Data Guard Systems     Published Date: Aug 21, 2009
Web-based software automation is an essential part in managing business processes in today's cellular/wireless retail environment. An effective solution must have the ability to manage all of a company's operations simultaneously with virtually no interaction by an administrator. This document addresses key points that cellular retailers, wholesalers, and master agents need to know.
Tags : 
cellular retailer, business process management, bpm, software automation, data guard, data guard systems
    
Data Guard Systems

Webcast: 3 Steps to Content Sharing and Collaboration ft. Forrester Research

Published By: Box     Published Date: Jun 11, 2014
Watch this webcast to find out how to file sync and share fits into a document collaboration portfolio, learn about Forrester's evaluation of the market, and learn how to make the right choice for you.
Tags : 
box, forrester, content sharing, collaboration, file sync, share, portfolio, knowledge management, business technology
    
Box

WebEx Support Center: Remote Support Security Overview

Published By: WebEx Communications     Published Date: Dec 14, 2007
The purpose of this document is to provide information on the data security features and functions available with WebEx Support Center Remote Support and inherent to the underlying WebEx communication infrastructure known as the WebEx MediaTone™ Network.
Tags : 
online meetings, web conference, online collaboration, elearning, online classroom, web training, webinar, online demos, online presentations, interactive selling, desktop support, remote support, helpdesk, webex, knowledge management, remote access, best practices, customer service, hipaa compliance, video conferencing
    
WebEx Communications

Webinar: Red Hat Clouds Today

Published By: Red Hat     Published Date: Jan 21, 2011
Gordon Haff - Senior Cloud Product Manager, Red Hat You can build a private cloud today in an evolutionary way that makes use of and integrates with technologies that you already own. Proceed at your own pace and maintain strategic flexibility for the future using infrastructure products that provide a robust, enterprise-class environment that is consistent across bare metal, virtualized servers, private clouds, and public clouds. The steps are all thoroughly documented in a reference architecture, and can be augmented with additional Red Hat products and services as needed. In this session, Gordon Haff will take you through the steps.
Tags : 
red hat virtual tradeshow, live event, private cloud, virtualization, enterprise software, virtualized server, server virtualization, cloud computing
    
Red Hat

Webinar: Tiering Storage for Savings, Performance and Availability

Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear, emc, buying, data, social media, manage, voicemail, presentation, residents, issues, disk, data management
    
CDW

Website Security Threat Report 2013

Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

WebSphere Application Server Express - complimentary trial

Published By: IBM     Published Date: Jun 15, 2009
Enjoy this complimentary trial version of WebSphere Application Server Express V7. You'll see how it can provide single-step installation and configuration, wizards and default configurations, and easy to navigate documentation that includes extensive use of sample code to ensure fast and smooth start-up.
Tags : 
websphere, ibm, application server express v7, sign-step, trial, was, sample code, soa, enterprise applications, server package, servers, data management, service oriented architecture
    
IBM

What .NET Developers Need to Know About Azure

Published By: AppDynamics     Published Date: Sep 20, 2017
Azure has been through many rounds of changes that have significantly affected the ways in which .NET and other developers interact with the platform. The shift in strategy has been rocky at times. In 2011, technology reviewers described Microsoft Azure as a confusing platform with a difficult to use web-based interface and incomprehensible documentation. Since then, the teams working on the platform have gradually improved it, resulting in a much more user-friendly platform that offers a well-organized array of services.
Tags : 
mobile developers, microsoft azure, xamarin, it operations, developer market, container
    
AppDynamics

What is the business cost of content chaos?

Published By: IBM     Published Date: Nov 10, 2016
Within any organization, business content – applications, forms, reports, office documents, audio, video, and social media – is poorly managed and often out-of-reach of critical business processes. And, when business content is invisible, unclassified or unmanaged, it creates chaos. Content chaos causes a breakdown in the flow of information between an organization and its customers, its partners and even within itself – failures that often impact customer engagement, business agility, and the capacity to collaborate securely and effectively. It's time you learn how to put your business content to work.
Tags : 
ibm, analytics, ecm, business cost, business process, enterprise applications, business technology
    
IBM

What You Need to Know Now for Modern Backup Data Protection Buyer’s Guide for Enterprise Storage

Published By: HP     Published Date: Feb 02, 2015
Everyone agrees that data is the lifeblood of any business. Just think how tense you get when your laptop crashes and you realize you have not saved that critical document. Or put yourself in the shoes of your company’s sales teams when they suddenly find themselves unable to access information related to a deal in the pipeline at the end of the quarter because it is corrupted or went missing because of a database or server issue. Data protection is—and always will be—a constant concern.
Tags : 
    
HP

What You Need to Know Now for Modern Backup Data Protection Buyer’s Guide for Enterprise Storage

Published By: HP     Published Date: Feb 11, 2015
Everyone agrees that data is the lifeblood of any business. Just think how tense you get when your laptop crashes and you realize you have not saved that critical document. Or put yourself in the shoes of your company’s sales teams when they suddenly find themselves unable to access information related to a deal in the pipeline at the end of the quarter because it is corrupted or went missing because of a database or server issue. Data protection is—and always will be—a constant concern.
Tags : 
    
HP

What's New in AutoPlay Media Studio 6.0?

Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
This document outlines the new features in AutoPlay Media Studio 6.0 over previous versions of the product. Built on a solid base of proven predecessors, AutoPlay Media Studio 6.0 is more powerful and flexible than ever!
Tags : 
enterprise applications, sales & marketing software, cd maker, multimedia studio, multimedia software, indigo rose
    
Indigo Rose Corporation

What's Up, .DOC? ODF, OOXML, and the Revolutionary Implications of XML in Productivity Applications

Published By: Burton Group     Published Date: Apr 08, 2008
Industry debate about the relative merits of OpenDocument Format (ODF) and Ecma 376 Office Open XML (OOXML) highlights the significance of the productivity application market shift from binary and proprietary file formats to vendor- and product-independent Extensible Markup Language (XML) models. The competitive stakes are huge, and the related political posturing is sometimes perplexing.
Tags : 
odf, document, open document format, burton group, xml, ooxml, office open xml, microsoft office, word, microsoft word, software development, document management, productivity
    
Burton Group

When Encryption Is Not Enough

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.

When the Going Gets Tough, Good Institutions Get Even Tougher on Ensuring Reg

Published By: Tripwire     Published Date: Jun 30, 2009
Learn the 5 core competencies of compliance and how to institute an automated compliance solution.
Tags : 
tripwire, banking, confidence, institution, regulatory, compliance, automated, solution, system, institution, change, documentation, control, security, audit, accountability, business management, data mining, data protection
    
Tripwire

When Your Organization Gets Hacked, Here's How it Will Go Down

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America

When Your Organization Gets Hacked, Here's How it Will Go Down

Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America

White Paper: Are You Pushing Too Much Paper?

Published By: Supply Chain Connect     Published Date: Apr 24, 2008
Whether you are an electrical supplies wholesaler or a manufacturer of oilfield equipment, the challenge is the same: Are you maximizing your margins by keeping your administrative processes as streamlined as possible? Or, are you wasting time and money by supporting paper-intensive processes to handle quotes, orders, ship notices, receipt documents and invoices?
Tags : 
scm, edi, erp, scc, supply chain, supply chain connect, electronic data, enterprise resource planning, supply chain management, productivity
    
Supply Chain Connect

Whitepaper: Demystifying SD-WAN's Relationship to WAN Optimization

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As software-defined WAN (SD-WAN) continues to become a mainstream technology, its relationship to WAN Optimization (WANop) must be examined. At first glance, the two can appear alike, and are often erroneously mentioned as synonymous technologies. A deeper examination however, will reveal two distinct and highly complementary technologies with very limited feature overlap. This document aims to demystify the relationship between the two, outline the market shifts that have led to a reduced WANop sector, and provide a recommendation on deploying both technologies in a modern enterprise WAN.
Tags : 
    
VMware SD-WAN by VeloCloud

Whitepaper: File Sharing Without Fear

Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry

Why Corporate Compliance and IT Security Must Join Forces

Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : 
brainloop, technology, security, it security, end users, access control, internet security, security management, security policies, vulnerability management
    
Brainloop
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.