• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

document

Results 301 - 325 of 965Sort Results By: Published Date | Title | Company Name
By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
MongoDB is an open-source, document database designed with both scalability and developer agility in mind. MongoDB bridges the gap between key-value stores, which are fast and scalable, and relational databases, which have rich functionality. Instead of storing data in rows and columns as one would with a relational database, MongoDB stores JSON documents with dynamic schemas. Customers should consider three primary factors when evaluating databases: technological fit, cost, and topline implications. MongoDB's flexible and scalable data model, robust feature set, and high-performance, high-availability architecture make it suitable for a wide range of database use cases. Given that in many cases relational databases may also be a technological fit, it is helpful to consider the relative costs of each solution when evaluating which database to adopt.
Tags : 
total, cost, ownership, comparison, mongodb, oracle
    
AstuteIT_ABM_EMEA
By: LogMeIn     Published Date: Feb 27, 2018
LogMeIn offers consistently reliable service to its Bold360 customers and is vigilant in efforts to provide services that are not only robust and scalable, but also secure. This document describes how we achieve reliable scalability and the measures taken by LogMeIn to protect Bold360 customer data.
Tags : 
industry, network, service, operations, scalability, data, encryption
    
LogMeIn
By: Seismic     Published Date: May 14, 2019
New research from Content Marketing Institute shows that enterprise content marketers are seeing more success with content marketing. Download the report to learn: ? The benefits of a documented content marketing strategy ? How enterprise marketers rate alignment of content marketing and sales in their organization ? Content marketing methods enterprise marketers use to nurture their audience Discover the benchmarks, budgets, and trends impacting content marketers in the B2B enterprise space in the year ahead.
Tags : 
    
Seismic
By: Oracle     Published Date: Oct 20, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle
By: Oracle     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle
By: Rand Secure Archive     Published Date: Jun 06, 2013
Without a doubt, technology has revolutionized the way business is done. The vast majority of internal and external communication is now done through email, instant messaging, VOIP and other types of electronic communication. In addition, most business documents exist in digital form. The digitization of business has had significant implications for litigation. Legal eDiscovery is now an essential part of settling cases between organizations. Previously, many companies believed that eDiscovery was only for organizations that were public or highly regulated, but now most companies recognize that electronically stored information (ESI) regulations are applicable to all organizations and there is an ever-increasing need for cost-effective eDiscovery.
Tags : 
coding, ediscovery, legal, effective, organization, networking, security, it management, storage, data management
    
Rand Secure Archive
By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
    
Brainloop
By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security, intrusion prevention, security management, security policies
    
Brainloop
By: Brainloop     Published Date: Nov 09, 2011
This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.
Tags : 
brainloop, enterprise, information management, security options, technology, business, access control, authentication, internet security, security management, security policies
    
Brainloop
By: Lexmark     Published Date: May 28, 2014
A UBM tech report on the 6 secrets that banks can use to reduce cost and drive process improvements
Tags : 
lexmark, reducing costs, driving process improvements, modern document management, best practices, business process management, document management, records management
    
Lexmark
By: NAVEX Global     Published Date: Apr 20, 2018
Learn how to effectively and efficiently manage your organisation's employee handbook, code of conduct and other important documents. This guide gives organisations of all sizes insight on how to optimize policy and procedure management with real-world examples, helpful tips, and research. What you’ll learn: - Best Practices on How to Plan, Implement, and Measure your programme - Eleven Commandments of Policy Formatting and Writing - 20 Questions for Prioritising Policy Development Efforts - Pros & Cons of Various Distribution Methods - Assessment Questions to Evaluate Your Current Document Management Strategy - Build versus Buy Considerations
Tags : 
    
NAVEX Global
By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global
By: Adobe Systems     Published Date: Mar 04, 2011
Learn how easy it is to create and send a single PDF Portfolio using Adobe Acrobat X Pro. See how to create a rich, branded PDF Portfolio containing many types of documents, each with a rich preview experience. Discover how to embed web pages and streaming media and even output the entire portfolio experience as a web page.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media, business intelligence, business process management, enterprise software, sales & marketing software
    
Adobe Systems
By: Adobe Systems     Published Date: Mar 04, 2011
Join Adobe experts to learn how to enable your PDF documents so that multiple people, in real time, can add notes and comments, promoting a true "conversation" about your critical documents. See how to use familiar commenting tools and even enable users of the free Adobe Reader to take part in your review.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media, acrobat x, business intelligence, enterprise software, sales & marketing software
    
Adobe Systems
By: Adobe Systems     Published Date: Mar 04, 2011
In this session presented by Adobe experts, you'll learn how to use Adobe Acrobat X Pro to save time and standardize processes by automating routine, multistep tasks in a guided Action. Find out how to create, manage, execute, and share a sequence of automatic or user-guided steps that can be applied to single PDF files or batches of files.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media, acrobat x, business intelligence, enterprise software, sales & marketing software
    
Adobe Systems
By: Adobe     Published Date: Jun 02, 2011
This whitepaper highlights next steps for IT to collaborate beyond office walls and enable IT's infrastructure to better support the increase of rich-media documents.
Tags : 
adobe acrobat x, document collaboration, exchange, infrastructure, enterprise communication, cost reduction, global collaborators, total cost of ownership, collaboration, document management
    
Adobe
By: Adobe     Published Date: Jun 02, 2011
A study of knowledge worker collaboration workflows.
Tags : 
adobe acrobat x, crimson consulting group, productivity, collaboration workflow, document security, collaboration, document management
    
Adobe
By: Adobe Systems Inc.     Published Date: Mar 04, 2011
Learn how easy it is to create and send a single PDF Portfolio using Adobe Acrobat X Pro. See how to create a rich, branded PDF Portfolio containing many types of documents, each with a rich preview experience. Discover how to embed web pages and streaming media and even output the entire portfolio experience as a web page.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media
    
Adobe Systems Inc.
By: Saba Software     Published Date: Jan 03, 2013
Download the whitepaper "Building a Business Case for Learning Management Systems” now and learn how to sell an LMS within your organization with political astuteness and business savvy.
Tags : 
lms, learning management systems, business case, business case document, lms acquisition initiative
    
Saba Software
By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
security, security practices, enterprise security, security information management, government, application security, security services, server virtualization
    
HP - Intel®
By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
cloud, cloud computing, virtualization, application modernization, blade servers
    
HP - Intel®
By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
virtualization, virtualized servers, it infrastructure, government, application modernization, servers, blade servers
    
HP - Intel®
By: Tripwire     Published Date: Feb 08, 2013
John Gilligan, former CIO of the U.S. Air Force and the U.S. Department of Energy, led the development of this document; it represents a consensus of government and nongovernment experts.
Tags : 
cyberdefender, security, federal, government, sans 20 sc, dhs, defense
    
Tripwire
By: Enterprise Mobile     Published Date: Oct 08, 2013
Find out what enterprise companies and their technology leaders think about the future of mobility by exploring the results of a recent survey. You’ll learn about the strategies organizations are using to implement mobility, obstacles they’re encountering along the way, and the drivers behind the push to go mobile. With 2014 just ahead, this document gives helpful suggestions for future planning.
Tags : 
mobility-as-a service, managed mobility services, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter