> Technology > Knowledge Management
 

Knowledge Management

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.
Results 276 - 300 of 3072Sort Results By: Published Date | Title | Company Name

Unpacking the Complexities of Enterprise Collaboration

White Paper Published By: AVI-SPL     Published Date: Sep 01, 2016
There are a few factors that are influencing the complexity of enterprise collaboration. In this tech brief, we’ll examine three issues that often surface when we work with IT teams on a Collaboration Program Assessment.
Tags : 
collaboration, enterprise collaboration, video conferencing, video meetings, video
    
AVI-SPL

Connecting Collaboration Tech from Multiple Vendors: 5 Experts Share Insights with IT

White Paper Published By: AVI-SPL     Published Date: Sep 01, 2016
We asked experts from Cisco, Crestron, Biamp, NEC, and AVI-SPL to share their insights and advice for companies trying to create a unified collaborative enterprise.
Tags : 
collaboration, video collaboration, ip networks, microsoft skype, skype
    
AVI-SPL

COLLABORATION SOLUTIONS IN A CLOUD-CENTRIC WORLD

White Paper Published By: AVI-SPL     Published Date: Sep 01, 2016
Is your business struggling with tight budgets and an overwhelmed IT department? If yes, you need to preserve existing investments and increase responsiveness in today’s fast-paced digital economy.
Tags : 
collaboration, cloud collaboration, byod, conference room, video conferencing
    
AVI-SPL

How to Unify Your Multi-Vendor Collaboration Environment

White Paper Published By: AVI-SPL     Published Date: Sep 01, 2016
For IT professionals who own AV, the goal is to apply the same standards to AV as they do to all their other disciplines—make it standardized, service-oriented, simple, and scalable.
Tags : 
collaboration, video conferencing, multiple vendor collaboration, video meetings, network management
    
AVI-SPL

Survival of the Fittest: Move Beyond FTP

White Paper Published By: Axway     Published Date: Jan 03, 2008
In a world where only the fittest survive, Axway can help. Our Managed File Transfer Survival Guide gives you a step-by-step plan for building a business case to ensure your success in managing the integrity of your data infrastructure. Download your complimentary survival guide today!
Tags : 
mft, ftp, managed file transfer, file transfer, data integrity
    
Axway

What is the Emphasis on Choosing an IM Software For Business?

White Paper Published By: B Labs     Published Date: Sep 19, 2010
This white paper briefly overviews a functionality of enterprise-level IM systems and describes new features and tasks that can be important to corporate and business users.
Tags : 
chat, instant messaging, communication, server, messenger
    
B Labs

The Importance of Cyber Resilience and Incident Response for Financial Institutions

Webinar Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response
    
BAE Systems

Making the Case for an Interoperable, Multi-scale Hospital/Healthcare Knowledge Domain

White Paper Published By: Baystate Health / Baystate Medical Center     Published Date: Jul 16, 2007
Get this free white paper to read why mass casualty and other public health emergencies create a demand for information within hospitals, between hospitals, between hospitals and local incident command centers, and between local, statewide and multi-state incident command centers and agencies.
Tags : 
hospital, healthcare, health care, medical records, fema
    
Baystate Health / Baystate Medical Center

9 Social Insights that Drive Real Business Results

White Paper Published By: Bazaarvoice     Published Date: Nov 05, 2014
Thanks to social, consumers are more vocal than ever and their opinions are influencing the purchase decisions of consumers all across the web. Learn how to turn social data into strategic business advantage with nine guiding insights to improve your bottom line today.
Tags : 
bazaarvoice, business results, business insights, social segmentation, product innovation
    
Bazaarvoice

SPM: Using Analytics to Impact Sales Performance

White Paper Published By: Beqom     Published Date: Dec 05, 2018
Download this free e-guide to gain an understanding of predictive analytics concepts, how to align your data sources to unlock the value of the data in your organization, analyze the correlations, and reap the benefits of analytics in optimizing sales performance.
Tags : 
salesforce compensation management, commission plans sales teams, compensation management, compensation management sales teams, compensation plans sales teams
    
Beqom

Securing the SaaS-Based Enterprise: Solving the Right Problems

Free Offer Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft
    
bitglass

Seven Essential Buying Criteria for Successful Video Delivery

White Paper Published By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : 
bitgravity, video delivery, legacy cdns, network architecture, internet video
    
BitGravity

The Limitations of Content Caching on Traditional CDNs

White Paper Published By: BitGravity     Published Date: Apr 22, 2008
This white paper outlines the limitations of proxy cache networks, presents the attributes and benefits of an ideal solution, and suggests that BitGravity has designed a content delivery system that addresses the needs in marketplace at an affordable price.
Tags : 
cdn, cdns, content delivery, content delivery network, content delivery networks
    
BitGravity

Password Peril: The Frontline Security Challenge in the SaaS Age

White Paper Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management
    
Bitium

What You Need To Know About Vendor Risk Management In Financial Institutions

White Paper Published By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management
    
BitSight Technologies

40 Questions You Should Have in Your Vendor Security Assessment

White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : 
networking, security, it management, knowledge management, enterprise applications
    
BitSight Technologies

Are Energy and Utilities at Risk of a Major Breach?

White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Why does the cyber security performance of several industries differ? Download the latest BitSight Industry Benchmarking report to find out.
Tags : 
networking, security, it management, knowledge management, data management
    
BitSight Technologies

The Evolution of Vendor Risk Management in Financial Institutions

White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : 
networking, security, it management, knowledge management, data management
    
BitSight Technologies

Beware the Botnets: Botnets Correlated to a Higher Likelihood of Breaches

White Paper Published By: BitSight Technologies     Published Date: Jul 23, 2015
Recent BitSight research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach. Download this report to learn how BitSight Security Ratings are a powerful metric for communicating cyber risk across the enterprise.
Tags : 
cyber risk, security, data, network, it operations
    
BitSight Technologies

Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability

White Paper Published By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : 
networking, security, software development, it management, knowledge management
    
BitSight Technologies

Making Risk Management More Effective with Security Ratings

White Paper Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.
Tags : 
risk management, security ratings, compliance mandates, executive reporting, security risk assessments
    
BitSight Technologies

Utilizing Security Ratings for Enterprise IT Risk Mitigation

White Paper Published By: BitSight Technologies     Published Date: Feb 03, 2015
In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.
Tags : 
security ratings, it risk mitigation, cyber risk, performance metrics, network security risk
    
BitSight Technologies

Cybersecurity is Essential for M&A Due Diligence - White Paper

White Paper Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Cybersecurity Is Essential for M&A Due Diligence" to learn how Security Ratings can help you examine the risk your latest target poses to your information security (and potentially your bottom line).
Tags : 
cybersecurity, security ratings, acquistion target, cybersecurity assessment, information security
    
BitSight Technologies

Securing Docker: What You Need to Know

White Paper Published By: Black Duck Software     Published Date: Feb 17, 2016
Container technologies like Docker promise to transform the way enterprises develop, deploy, and manage critical applications. However, containers are no panacea. The same challenges around deploying and managing applications in native environments and virtual machines also affect container deployments.
Tags : 
blackduck, docker, container deployments, docker containers, application management
    
Black Duck Software

Security Certifications in Mobility: What They Mean and Which to Look For

Webinar Published By: Blackberry     Published Date: Mar 12, 2013
FIPS, CAPS, AISEP, and many more — BlackBerry® has received certification from the most rigorous security testers in the world. In this insightful webinar, find out what they mean and why they matter to enterprises.
Tags : 
blackberry security certifications, organization, blackberry 10, webinar, transition
    
Blackberry
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End


Sub-Categories: Collaboration, Collaborative Commerce, Contact Management, Content Delivery, Content Integration, Content Management System, Corporate Portals, Customer Experience Management, Document Management, Information Management, Intranets, Messaging, Records Management, Search And Retrieval, Search Engines, Secure Content Management, SLA

Search      

Add Research

Get your company's research in the hands of targeted business professionals.