discovery

Results 276 - 300 of 324Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Jul 23, 2010
Investing in mobility is like investing in any other important business activity, and its success will largely depend on how closely it is aligned with both business and IT drivers. A successful mobility plan should focus on 'mobilizing' your critical business processes and include planning phases for discovery, development and deployment. This Guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, touchpoint
    
BlackBerry
Published By: Phunware     Published Date: Dec 06, 2014
Case study of the partnership between The CW Network and Phunware to develop and launch a next generation mobile app to 6 million users
Tags : 
mobile apps for entertainment, mobile apps for media, mobile dynamic content, app monetization, mobile monetization, mobile content discovery, mobile dynamic content, mobile cross promotion
    
Phunware
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: IBM     Published Date: Oct 14, 2015
If you havent looked at enterprise search technology in a while, its time to give it another look. This report details their findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help application development and delivery (AD&D) professionals select the right solution to grace their enterprise with the power of knowledge on demand.
Tags : 
ibm, forrester, knowledge discovery solutions, big data, enterprise, search technology, application development, networking
    
IBM
Published By: Actiance, Inc.     Published Date: Nov 13, 2014
The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!
Tags : 
actiance, gartner, magic quadrant, enterprise information archiving, cagr, eia, compliance, e-discovery
    
Actiance, Inc.
Published By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : 
mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security
    
Mimecast
Published By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : 
heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
    
Symantec
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsofts native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: IBM     Published Date: Jun 25, 2018
Vast resources of data are increasingly available, but the sheer volume can overwhelm human capability. By implementing the cognitive system of IBM Watson Discovery into their infrastructure, businesses can extract deeper and more accurate insights by efficiently identifying, collecting and curating structured and unstructured data. Watson Discovery, also capable of creating content collections and custom cognitive applications, can transform organizational processes to extend proprietary content and expert knowledge faster and at greater scales. Read more to learn how Watson Discovery can keep your organization evolving ahead of the competition. Click here to find out more about how embedding IBM technologies can accelerate your solutions time to market.
Tags : 
    
IBM
Published By: mindSHIFT     Published Date: Nov 29, 2007
Have you adjusted your data retention policies and electronic discovery procedures to comply with the new Federal Rules of Civil Procedure (FRCP)? Learn how email archiving can help you with these electronic discovery requirements.
Tags : 
frcp, secure content, secure data, data protection, database security, compliance, frcp compliance, data governance
    
mindSHIFT
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management, best practices
    
ARMA
Published By: Microsoft Surface     Published Date: Jun 30, 2017
The Natural Progression of the Digital Experience Our notes are the gatekeepers to discovery. From alternating current to the lithium battery, the flick of a pen is often the first stage of every great idea, but how many other great discoveries and connections have we missed, simply because we didnt write something down?
Tags : 
    
Microsoft Surface
Published By: Microsoft Surface     Published Date: Jun 30, 2017
The Natural Profession of the Digital Experience Our notes are the gatekeepers to discovery. From alternating current to the lithium battery, the flick of a pen is often the first stage of every great idea, but how many other great discoveries and connections have we missed, simply because we didnt write something down?
Tags : 
    
Microsoft Surface
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Directors agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam
    
Mimecast
Published By: IBM     Published Date: Jan 27, 2017
A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamlessly integrate with diverse technologies, from data marts to Apache Hadoop systems. And it must automatically discover, protect and monitor sensitive information as part of big data applications.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their datawhich can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : 
mdm, big data, automation, organization
    
IBM
Published By: Bazaarvoice     Published Date: Aug 05, 2014
The local consumer decision journey has changed. This step-by-step guide will show you how to connect with local consumers to improve visibility, gain control of your reputation, and drive more local leads and sales.
Tags : 
bazaarvoice, customer, local advocacy, sales, online discovery, local marketing
    
Bazaarvoice
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
    
Intel Security
Published By: Spredfast, Inc.     Published Date: Feb 05, 2015
Integrating social sponsorships can be more than a logo. In fact, they should be. When you add social experiences to your sponsorship packages, youre bringing brand partners all-new ways to engage with audiences and gain valuable exposure. Youre also creating more inventory and new revenue streams for your owned properties. Welcome to the Next Level in Sponsorship outlines 3 basic steps for successfully integrating social into your packages. Up-to-the-minute examples from The NBA, Discovery.com, Toyota, JCPenney, and other innovators in the sports and media worlds deliver fresh perspectives and creative inspiration. Pump up the value of your sponsorship packages with social. Download our quick-read whitepaper today.
Tags : 
spreadfast, sponsorship, inventory, revenue, social, advertiser, relationship, engage
    
Spredfast, Inc.
Published By: MarkLogic     Published Date: Mar 29, 2018
Its your golden opportunity: Rapidly integrate and harmonize data silos. Enhance drug discovery. Achieve faster time to insight. Get to market faster all with less cost than you think. Explore how Life Sciences organizations can accelerate Real World Evidence (RWE) in a comprehensive and cost efficient manner. Download this white paper to learn about challenges, solutions and most importantly how to equip your organization for success.
Tags : 
manufacturers, organizations, integration, optimization, data, quality
    
MarkLogic
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: Smarsh     Published Date: Feb 27, 2014
More organizations are deploying and migrating their information archiving to the cloud. In this report, The Radicati Group provides an overall market evaluation of 10 leading Cloud archiving providers, tips for selecting an information archiving solution and the opportunities and challenges that compliance, IT and legal professionals experience when choosing an information archiving platform.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
Published By: SAS     Published Date: Mar 20, 2019
In todays crowded analytics marketplace, who can you trust? Whats needed to deliver on the promise of transforming data into real value? And what do CIOs need to cost-effectively and successfully lead their organizations through changing technologies? For an organization to experiment with (and ultimately deploy) analytics, the responsibility falls squarely on the shoulders of IT. IT must provide secure access to lots of high-quality data, a friendly environment for experimentation and discovery, and a method for rapidly deploying and governing models. SAS can support an organization's journey toward becoming a data- and analytics-driven organization. We can help unlock the value by enabling with choices that make sense. Plus, we can show organizations how to get the most out of technology investments.
Tags : 
    
SAS
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This solution brief introduces the Smart Archive strategy from IBM, which is a comprehensive approach that combines IBM software, systems and service capabilities to help you drive down costs down and help ensure critical content is properly retained and protected.
Tags : 
ibm uk, ibm smart archive, ibm smart archive strategy, hardware, software, services, optimize, unify content
    
Ogilvy - IBM UK
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.