• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

file management

Results 26 - 50 of 150Sort Results By: Published Date | Title | Company Name
By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : 
renewable energy, customer profile, emc, risk management, best practices, storage, technology, security, it management, data management
    
EMC Corporation
By: Plex Systems     Published Date: Aug 15, 2014
There has been no shortage of high profile recalls over the past several years. Suppliers are being required to provide more robust quality management systems, provide better real-time visablity into manufacturing data, and may even be held accountable for additional charge-back and warranty claims. Take a next generation approach to quality management.
Tags : 
networking
    
Plex Systems
By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
By: IBM     Published Date: Oct 12, 2015
This IBM-commissioned profile of government information management professionals examines the challenges of dealing with the increase in digital and unstructured content as well as the roles that shared capture service and improved case management.
Tags : 
ibm, forrester, digital, engagement, forrester technology, information management, software development, it management, knowledge management, enterprise applications
    
IBM
By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management, business analytics, business management
    
Okta
By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: • Seamless, secure end-user access to applications and files • Easy-to-use enterprise app store • Management security • Fully integrated infrastructure stack • Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
By: SessionM     Published Date: Jan 24, 2018
Download Gartner’s latest Market Guide for Master Data Management of Customer Data Solutions to learn market definition, analysis and recommendations, the criteria necessary for evaluating marketing data management solutions and how master data sits in the middle of the 360° customer view.
Tags : 
customer engagement, unified customer profile, customer data platform, data orchestration, customer data activation, machine learning, data integration, personalization, cross-channel campaign management, single customer view, 360 profile, customer retention, customer loyalty, customer lifetime value, closed loop offers, next best offer, loyalty automation, loyalty platform, customer data management, customer data platform
    
SessionM
By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
    
Brainloop
By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
By: Red Hat, Inc.     Published Date: Jul 12, 2012
Recently, enterprises have seen enormous gains in scalability, flexibility, and affordability as they migrated from proprietary, monolithic server architectures to architectures that are virtualized, open source, standardized, and commoditized.
Tags : 
scalability, flexibility, affordability, performance, ease-of-use, reduced acqisition costs, reduced maintenance costs, red hat storage server, cloud, cloud computing, public cloud, private cloud, open cloud, data center, amazon web serivices, aws, unified file, unified object, n-way local synchronous replication, elastic volume management
    
Red Hat, Inc.
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
By: Epson     Published Date: Nov 21, 2017
A customer may store heavy file boxes in one of its warehouses, but Fireproof Records Center spends a lot of time strategizing about the paperless office. Based in Grove City, Ohio, the company helps businesses in central Ohio manage information more efficiently, offering a suite of cloud document management and scanning tools, including the easy-to-use Epson WorkForce® color document scanner.
Tags : 
    
Epson
By: Reputation.com     Published Date: Jun 29, 2018
Creating competitive advantage starts with a sound digital strategy. In a 2017 survey of healthcare consumers across the U.S. from a representative range of demographic groups, we found that 88% of consumers begin their search for healthcare providers online. Consumers rely on search engines and review sites to steer their decisions about where to go for care. What consumers read about you online heavily influences their decision-making. Your reputation is defined at every touchpoint a potential patient has with your doctors and organization on the web — from the doctor or location listing, to patient rating and reviews, to finding the right doctor and reading profiles on your website. Done well, online reputation management (ORM) enables your providers to generate a high volume of representative reviews from the “silent majority,” while providing valuable insights to improve patient experience, make operational improvements and drive new patient appointments.
Tags : 
    
Reputation.com
By: F5 Networks Inc     Published Date: Feb 25, 2010
Reducing Costs and Improving Efficiency for File-Based Storage.
Tags : 
idc, file virtualization, storage, network, data management, data migration, back up, migration, backup and recovery, storage virtualization, server virtualization
    
F5 Networks Inc
By: hightail     Published Date: Jan 17, 2014
Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.
Tags : 
enterprise applications, data management, secure content management, cloud computing
    
hightail
By: Cloudian     Published Date: Feb 15, 2018
A new class of storage promises to revolutionize file data management with scalability, simplicity and cost benefits that together represent a step function improvement from traditional NAS. Cloudian HyperFile offers a new approach that addresses both the scalability and cost concerns. It is the first to combine traditional NAS features with a limitlessly scalable, fully modular storage environment that reduces CAPEX costs by 2 /3 while simplifying management and eliminating storage silos. At CAPEX costs down to ½ cent per GB/month, and with scalability and storage density that minimize management and data center space costs, Cloudian HyperFile offers economics that radically transform the landscape for enterprise file storage.
Tags : 
    
Cloudian
By: Cloudian     Published Date: Feb 26, 2018
A new class of storage promises to revolutionize file data management with scalability, simplicity and cost benefits that together represent a step function improvement from traditional NAS. Cloudian HyperFile offers a new approach that addresses both the scalability and cost concerns. It is the first to combine traditional NAS features with a limitlessly scalable, fully modular storage environment that reduces CAPEX costs by 2 /3 while simplifying management and eliminating storage silos. At CAPEX costs down to ½ cent per GB/month, and with scalability and storage density that minimize management and data center space costs, Cloudian HyperFile offers economics that radically transform the landscape for enterprise file storage
Tags : 
    
Cloudian
By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
The product development ecosystem is complex, as it entails nearly every area of an enterprise — each with its own set of tools, files and needs. Enterprises need the right solutions to untangle the web of data management and enable a smarter approach to manufacturing. This article discusses how distributed data management, now an integrated part of SOLIDWORKS Manage, stores and regulates design data to streamline processes and improve the movement of information.
Tags : 
solidworks, data, management, development, ecosystem
    
Dassault Systemes SolidWorks Corp.
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter