• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

document

Results 251 - 275 of 965Sort Results By: Published Date | Title | Company Name
By: HP     Published Date: Jun 09, 2014
A brochure on the challenges addressed by HP Records Manager.
Tags : 
records manager, edrm, backup and recovery, storage virtualization, data protection, data warehousing
    
HP
By: Tricentis     Published Date: Mar 13, 2018
In a case of “if you can’t measure it, you can’t manage it,” some software project failures occur because of a lack of traceability — that is, an incomplete record of documentation around software quality assurance efforts. The lack of traceability has a significant impact on QA testing effectiveness and meeting strategic goals. However, with optimal traceability, testing becomes more efficient and enables collaboration throughout the software development lifecycle, as well as between product owners and organization leaders.
Tags : 
    
Tricentis
By: Canon Business Process Services, Inc.     Published Date: Aug 17, 2015
This paper will explore the potential of applying business performance management (BPM) principles to advance document performance management (DPM) in a way that enables organizations to reduce costs; better manage documents as vital strategic, ?nancial and information assets; and secure positive returns on investments from outsourcing. An example of this approach — spotlighted later in this paper — is MAX, a document performance management system that enables companies to more effectively manage their document processes and outsourcing service providers.
Tags : 
canon business process services, document management, document imaging, business performance management, outsourcing services, managed services, balanced scorecard framework, slas, service level agreements, improving operational efficiency, improve business results, six sigma methods, document services, claims processing, document processing, forms processing, it management
    
Canon Business Process Services, Inc.
By: Diligent     Published Date: Jul 10, 2017
William Hill made a faster-than-expected transition to using Diligent Boards due to rapid adoption by the board members and proactive support from both William Hill’s Secretariat team and Diligent. In addition, the company found one unexpected benefit –Diligent Boards is a very helpful tool when new directors join the board. Use of Diligent Boards has spread thanks to positive word of mouth from William Hill board members to other companies on whose boards William Hill board members also serve.
Tags : 
diligence board, portal, meeting information, providers, directors, document management, william hill
    
Diligent
By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
By: VMware Dell     Published Date: Jul 02, 2008
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits and limitations of these technologies as well as the best use cases for each, exemplified through user case studies.
Tags : 
desktop, desktop virtualization, virtualization, virtual machine, vmware, vmware ace, vmware vdi, server virtualization, desktop management
    
VMware Dell
By: VMware Dell     Published Date: Dec 07, 2011
This document covers network architecture, storage configurations, and best practices for configuration and deployment.
Tags : 
architecture, smb, small business, storage, storage configurations, deployment, design, scalability, manageability, application integration, analytical applications, business intelligence, configuration management, data integration
    
VMware Dell
By: Box     Published Date: Nov 28, 2012
This IDC Insight explores the emerging category of solutions that offer access to business content (folders, files, documents, etc.) on mobile devices.
Tags : 
collaboration, collaboration solutions, mobile workforce, mobility, mobile workers, mobile enterprise, wireless
    
Box
By: Box     Published Date: Nov 28, 2012
End users need the right tools for document collaboration, and in the era of consumerization, they'll find them... with or without you!
Tags : 
cloud, cloud file sharing, cloud file sharing vendors, cloud vendors, dropbox, box, google drive, files sharing, wireless, collaboration
    
Box
By: Symantec     Published Date: Oct 25, 2012
Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention and more.
Tags : 
symantec, security, threat detection, fud, malware
    
Symantec
By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This ESG Lab Validation documents the hands-on testing of HP VirtualSystem for VMware 2.0, optimized for VMware vSphere 5.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management
    
HP - Intel® Xeon® processors
By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This ESG Lab Validation documents the hands-on testing of an HP VirtualSystem for Microsoft solution that leverages the Microsoft Private Cloud Fast Track reference architecture.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management
    
HP - Intel® Xeon® processors
By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This document is intended to provide pointers for administrators who are currently running HP-UX Virtual Partitions on legacy, cell-based systems, and who are considering upgrading to HP-UX vPars version 6.1.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management
    
HP - Intel® Xeon® processors
By: Xerox     Published Date: May 28, 2014
Thanks for your interest in reinvesting through MPS
Tags : 
xerox, mps, document, print, managed document and print services, it management, data management
    
Xerox
By: Xerox     Published Date: May 28, 2014
Thanks for your interest in document process optimization.
Tags : 
xerox, managed print services, documents, print, it management, data management
    
Xerox
By: McAfee     Published Date: Jun 04, 2014
El paradigma de la seguridad de red actualmente está cambiando hacia una nueva realidad a medida que los métodos avanzados de hacking son más frecuentes y difíciles de detectar. Un ejemplo de este método son las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques). Aunque se han documentado ampliamente las evasiones en los últimos quince años, los proveedores de seguridad han ignorado sistemáticamente su importancia. Algunos proveedores incluso han minimizado la importancia de la amenaza presentada cómo evasiones como siendo puramente teórica. Sin embargo este debate no logra percibir el problema principal: el riesgo de los sistemas de seguridad de red comprometidos por AETs continúa creciendo a medida que más y más los ciberdelincuentes aprovechan activamente esta vulnerabilidad. La respuesta es combinar la inspección basada en flujos con la normalización de datos en múltiples capas de protocolo.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, aet, ngfw, ngips, ips de próxima generación, next generation firewall, next generation ips, seguridad, gestión de ti, security, it management
    
McAfee
By: McAfee     Published Date: Aug 15, 2014
Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw, firewall de próx ger, segurança, gerenciamento de ti, ngips, ips de próxima geração, network security, firewalls
    
McAfee
By: Netapp     Published Date: Apr 02, 2013
This document describes a solution on a NetApp® shared storage infrastructure that provides system administrators with the ability to quickly copy, clone, and manage SAP® systems.
Tags : 
sap, netapp, shared storage, storage, virtualization, landscape, virtualization management, backup and recovery, storage area networks, storage management, storage virtualization, database security
    
Netapp
By: Netapp     Published Date: Apr 02, 2013
This document aligns the server hypervisor with the storage hypervisor by prescribing the best practices for deploying VMware® vSphere® 5 on clustered Data ONTAP.
Tags : 
data center, virtualization, infrastructure, storage, netapp, cluster, storage hypervisor, backup and recovery, clustering, network attached storage, storage area networks, storage management, storage virtualization
    
Netapp
By: GoodData     Published Date: Sep 17, 2013
BI requirements are oft en out of date even before the fi rst set of specifi cations has been collected and documented. Agility is the last frontier in the battle for BI success, and it is the keystone to Forrester’s Agile BI triad: Agile BI soft ware development, Agile BI organizations, and Agile BI technologies.
Tags : 
gooddata, business intelligence, data. better data, bigger ideas, agile bi organization, bi success, bi technologies, software development, it management
    
GoodData
By: NetApp     Published Date: Dec 15, 2014
IT managers and line-of-business stakeholders are striving to increase efficiency of their application environments. The biggest challenges they face in supporting database environments are managing data growth and database size, and meeting database performance requirements. This ESG Lab Report documents the performance, reliability, availability, and serviceability of NetApp EF Series flash arrays in Oracle database environments.
Tags : 
it managers, application environments, data growth, serviceability, performance, storage
    
NetApp
By: CEB     Published Date: May 19, 2014
This document helps general counsel identify potential information technology issues that may create legal or regulatory risks. General counsel should use the ten questions and our guidance on what to listen for in the CIO's response to pressure test the company's IT management and security controls.
Tags : 
ceb, cio, information risk, it management, security controls, general counsel, regulatory risks, security
    
CEB
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter