document

Results 976 - 1000 of 1012Sort Results By: Published Date | Title | Company Name

What's New in Sybase Adaptive Server Enterprise 15.7

Published By: Sybase     Published Date: Oct 18, 2011
Download this document for an overview of some of these capabilities and the benefits customers can expect from moving to ASE 15.7.
Tags : 
enterprise mobility, enterprise mobility software, enterprise mobility solutions, enterprise mobility systems, capital markets, capital markets solutions, capital markets analytics, business intelligence
    
Sybase

What's Up, .DOC? ODF, OOXML, and the Revolutionary Implications of XML in Productivity Applications

Published By: Burton Group     Published Date: Apr 08, 2008
Industry debate about the relative merits of OpenDocument Format (ODF) and Ecma 376 Office Open XML (OOXML) highlights the significance of the productivity application market shift from binary and proprietary file formats to vendor- and product-independent Extensible Markup Language (XML) models. The competitive stakes are huge, and the related political posturing is sometimes perplexing.
Tags : 
odf, document, open document format, burton group, xml, ooxml, office open xml, microsoft office
    
Burton Group

When Encryption Is Not Enough

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.

When the Going Gets Tough, Good Institutions Get Even Tougher on Ensuring Reg

Published By: Tripwire     Published Date: Jun 30, 2009
Learn the 5 core competencies of compliance and how to institute an automated compliance solution.
Tags : 
tripwire, banking, confidence, institution, regulatory, compliance, automated, solution
    
Tripwire

When Your Organization Gets Hacked, Here's How it Will Go Down

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America

When Your Organization Gets Hacked, Here's How it Will Go Down

Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America

White Paper: Are You Pushing Too Much Paper?

Published By: Supply Chain Connect     Published Date: Apr 24, 2008
Whether you are an electrical supplies wholesaler or a manufacturer of oilfield equipment, the challenge is the same: Are you maximizing your margins by keeping your administrative processes as streamlined as possible? Or, are you wasting time and money by supporting paper-intensive processes to handle quotes, orders, ship notices, receipt documents and invoices?
Tags : 
scm, edi, erp, scc, supply chain, supply chain connect, electronic data, enterprise resource planning
    
Supply Chain Connect

Whitepaper: Demystifying SD-WAN's Relationship to WAN Optimization

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As software-defined WAN (SD-WAN) continues to become a mainstream technology, its relationship to WAN Optimization (WANop) must be examined. At first glance, the two can appear alike, and are often erroneously mentioned as synonymous technologies. A deeper examination however, will reveal two distinct and highly complementary technologies with very limited feature overlap. This document aims to demystify the relationship between the two, outline the market shifts that have led to a reduced WANop sector, and provide a recommendation on deploying both technologies in a modern enterprise WAN.
Tags : 
    
VMware SD-WAN by VeloCloud

Whitepaper: File Sharing Without Fear

Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry

Why Corporate Compliance and IT Security Must Join Forces

Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : 
brainloop, technology, security, it security, end users, access control, internet security, security management
    
Brainloop

Why Google Apps Must Have Compliance Management

Published By: RecMan for Google Apps     Published Date: Sep 30, 2010
Millions of Google Apps users may be in violation of legal and organizational compliance standards. Learn how to avoid it.
Tags : 
compliance, records management, google apps, document compliance, compliance management, saas, records management software, governance
    
RecMan for Google Apps

Why IBM Flex System is the Best Blade Solution on the Market

Published By: IBM     Published Date: Sep 27, 2013
This document explains briefly how and why IBM Flex System surpasses mere blade systems.
Tags : 
ibm, ibm flex system, best blade solution, storage, ibm pureflex system, networking, platform systems, integrated systems
    
IBM

Why it Pays to Use eSignature Benefits (2016)

Published By: DocuSign     Published Date: Apr 12, 2017
Every day, all over the world, businesses and individuals are forgoing paper and signing important business and personal documents online. From signing a vendor contract, to signing a home mortgage, and everything in between. This white paper gives an overview on how you can use electronic signatures to sign and send documents digitally to keep life and business moving forward.
Tags : 
    
DocuSign

Why Smart Purchasers Focus on Value, Not Price

Published By: Canon Solutions America     Published Date: May 15, 2019
State and local governments can reduce their technology costs by adopting a “best value” approach to procurement. This brief focuses on the benefits of best-value purchasing for your agency’s critical print and document management solutions.
Tags : 
    
Canon Solutions America

Why VNA, and Why Standards?

Published By: GE Healthcare     Published Date: Feb 23, 2015
In a vendor neutral archive, images and documents from multiple departments and on platforms from multiple vendors can be easily viewed in one place. Learn more about how it works and why it's important in this session.
Tags : 
xds, cross enterprise document sharing, unified view of patient images, archive & storage, image sharing & management, vendor neutral archive (vna), centricity clinical archive, mobile image capture
    
GE Healthcare

Why Your Data May Be Vulnerable in Places You Wouldn't Expect

Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America

Why Your Organization Needs to Focus on Outbound Content

Published By: DataMotion     Published Date: Oct 02, 2008
This white paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and discusses the steps that an organization should take to mitigate the risks it faces from employee use of communication tools. Also included in this document are brief descriptions of the companies that have co-sponsored it.
Tags : 
certifiedmail, borderware, postini, symantec, workshare, data management, data protection, database security
    
DataMotion

Wide Area File Services: Document Collaboration for the Distributed Business Environment

Published By: Globalscape     Published Date: Mar 21, 2014
This paper outlines the essential requirements for file sharing across a wide-area network (WAN), and briefly discusses the limitations of appliance-based WAN optimization when applied specifically to document collaboration. The paper uses a solution analysis to compare common business needs to required features, and explains how appliance-based optimization falls short of these needs. The paper then describes how Globalscape's software-only solution. (WAFS) provides file replication and collaboration across globally dispersed networks, securely and reliably, with the performance of local file sharing.
Tags : 
file sharing, wan optimization, high bandwidth, low overhead, file replication, autodesk, revit, wafs
    
Globalscape

Will County Records Management Office Case Study

Published By: Computhink     Published Date: Dec 10, 2007
The job of a Records Management Office is to take all paper documents that need to be preserved, from all county offices, and implement a strategy to preserve them. When the law changed on January 1, 2001 to allow digitally scanned copies to be legal documents (The Illinois Electronic Records Act), the challenge to find a preservation system that would be both efficient and cost effective increased dramatically.
Tags : 
document management, records management, information, electronic document management, computhink, viewwise, viewise, government
    
Computhink

WIN TOP TALENT AND ENHANCE THE EMPLOYEE EXPERIENCE WITH DIGITAL DOCUMENT PROCESSES

Published By: Adobe     Published Date: Oct 05, 2016
Download this paper and see how converting to a 100%-digital HR document process has made all the difference.
Tags : 
    
Adobe

WIN TOP TALENT AND ENHANCE THE EMPLOYEE EXPERIENCE WITH DIGITAL DOCUMENT PROCESSES

Published By: Adobe     Published Date: Mar 21, 2017
Perks and benefits evolve. What was once cool quickly becomes standard. Today, speed and ease of necessary tasks have become key differentiators for organizations.
Tags : 
    
Adobe

Winning the War on Talent

Published By: Adobe     Published Date: Sep 10, 2015
Whether your company seeks experienced pros or the brightest grads, competition is fierce to get the best offer to the right candidate ASAP.
Tags : 
adobe, graduates, onboard, documents, contract
    
Adobe

Winning the War on Talent

Published By: Adobe     Published Date: Nov 10, 2015
With Adobe Document Cloud you can win and retain the best, slash costs and delays, and free everyone to focus on the projects that drive your organization forward.
Tags : 
ibm, human resources, talent, adobe, document cloud sales management, contracts, e-signatures, quote to cash
    
Adobe

Wireless LAN Security: What Hackers Know That You Don't

Published By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11
    
AirDefense

Workday and Netflix

Published By: Workday     Published Date: Oct 13, 2017
Netflix is the world’s leading Internet television network with over 81 million members in over 190 countries enjoying more than 125 million hours of TV shows and movies per day, including original series, documentaries, and feature films. Members can watch as much as they want, anytime, anywhere, on nearly any Internet-connected screen. Members can play, pause, and resume watching, all without commercials or commitments.
Tags : 
    
Workday
Start   Previous    27 28 29 30 31 32 33 34 35 36 37 38 39 40 41    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.