Knowledge Management White Papers

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.

Sub-Categories: Collaboration, Collaborative Commerce, Contact Management, Content Delivery, Content Integration, Content Management System, Corporate Portals, Customer Experience Management, Document Management, Information Management, Intranets, Messaging, Records Management, Search And Retrieval, Search Engines, Secure Content Management, SLA
Results 1 - 25 of 1661Sort Results By: Published Date | Title | Company Name
By: Samanage     Published Date: Aug 12, 2014

When: Tuesday, August 12 at 11:00am ET / 8:00am PT Join us for this educational webcast, presented by Randy Michaels of Knowledge ToolWorks, a leading expert on IT and business processes, to learn how you can make ITSM work for you without getting tangled up in its ugly tentacles.

Tags : samanage, randy michaels, itsm, it service management, knowledge toolworks, service driven organization, itsm framework, it management
    
By: CA Technologies     Published Date: Jul 30, 2014

Join us on July 30th at 10am PT, the panelists will examine the current state of enterprise mobility programs and outline concrete steps and examples that businesses can take to reboot their own mobility efforts.

Tags : ca technologies, emm, enterprise mobility management, mobile workers, mobile devices, byod, enteprise mobility, remote access
    
By: Foxit     Published Date: Jul 25, 2014

Learn about why your organization should go paperless and see how this can increase productivity and save your organization money.

Tags : foxit, paperless, save money, increase productivity, information sharing, knowledge management, enterprise applications
    
By: Foxit     Published Date: Jul 25, 2014

Learn why enterprises should standardize on a single PDF provider and see how this can provide a complete solution at an affordable price to address the needs of dissimilar users.

Tags : foxit, single pdf provider, computing platforms, software applications, customer ease, enterprises, knowledge management, enterprise applications
    
By: Egencia     Published Date: Jul 25, 2014

Just six months after signing on with Egencia for their corporate travel management, NASDAQ OMX Group, Inc. (“NASDAQ OMX”), has realized savings of $500,000 (a 32% reduction), increased online adoption from 30% to 61% and reduced the number of hours needed to manage the travel program by 50 hours per week. In addition, 90% of surveyed travelers indicated they would recommend Egencia to a colleague.

Tags : egencia, nasdaq omx, business travel, corporate travel management, travel spend, travel programs, knowledge management
    
By: Citrix     Published Date: Jul 25, 2014

After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.

Tags : mobility management, citrix, mobile app, network security, remote access, mobile workers, smart phones, wireless infrastructure
    
By: Citrix     Published Date: Jul 25, 2014

Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.

Tags : enterprise information, secure, android, apple ios, microsoft window tablets, flexibility, mobile workers, smart phones
    
By: Citrix     Published Date: Jul 25, 2014

Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.

Tags : email, mobile, collaboration, smartphone, tablets, productivity, access control, mobile workers
    
By: Citrix     Published Date: Jul 25, 2014

Learn how Citrix XenMobile can empower your organization to move from traditional corporate issued BlackBerry devices to any user-owned mobile device without sacrificing security and control.

Tags : blackberry, byod, citrix xenmobile, control, security, mobile computing, mobile workers, smart phones
    
By: Citrix     Published Date: Jul 25, 2014

Discover how to select technologies and develop policies for your BYOD program.

Tags : boyd, simple, secure, technologies, wireless infrastructure, wireless security, best practices, collaboration
    
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: Citrix     Published Date: Jul 25, 2014

Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

Tags : mobility, management, boyd, secure app, data delivery, security management, smart phones, secure content management
    
By: Riverbed     Published Date: Jul 18, 2014

Recent developments and trends such as BYOD, advances in enterprise video technologies, and a proliferation of employee collaboration platforms have prompted more and more organizations to develop comprehensive unified communications (UC) strategies. Compelled by the prospect of reducing communication costs and raising employee productivity, 78% of organizations report they already have a strategic plan and budget in place for at least some components of UC. Download to learn more!

Tags : riverbed, unified communications, communication costs, enterprise video technologies, employee collaboration, remote access, mobile computing, mobile workers
    
By: Citrix     Published Date: Jul 18, 2014

This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.

Tags : citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop, wireless infrastructure
    
By: AtTask Q3 N. America Lead Gen     Published Date: Jul 17, 2014

If you’re reading this eBook, it’s probably because you’ve got a pest control problem. This isn’t just an irritating lizard infestation, though. This is larger and nastier than lizards; it’s a huge, nasty, fire-breathing, hard to ignore, dragon. The dragon of work chaos. And you need to know how to slay it. Well, there’s no need to fear. This eBook will teach you the right—and necessary—weapons to help you extinguish the fire, examine your burn wounds, and exterminate the work chaos dragon for good.

Tags : at task, work chaos, solutions, input processes, poor visibility, resources, knowledge management, enterprise applications
    
By: AtTask Q3 N. America Lead Gen     Published Date: Jul 17, 2014

When it comes to project management, we tend to talk about the tactical—the assignments, the tasks, the approvals, and so on. But business is evolving, and many project teams are now being asked to lead change, instead of just timelines and milestones. This evolution is accelerating and is driven by fresh thinking and business necessity supported by advanced technologies that are highly accessible to a much broader range of contributors. Effectively managing work is no longer just the role of a few specialists. In this Whitepaper you will learn lessons from 40 PPM experts on making the transition from project management to project leadership.

Tags : at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management
    
By: AtTask Q3 N. America Lead Gen     Published Date: Jul 17, 2014

Rapid changes in both technology and business mean that IT departments are constantly barraged with new projects whether it's writing a web app or implementing new infrastructure for mobile application. It's a challenge just to stay ahead of the curve. This Whitepaper examines the top 10 every day pains that prevent IT managers from getting work done and offers some new and trusted solutions for improving your productivity.

Tags : at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management
    
By: Pitney Bowes     Published Date: Jul 17, 2014

Watch this recorded webinar to learn why retailers need to give price-sensitive web consumers stellar customer service and value through guaranteed landed costs and accurate delivery times and tracking.

Tags : pitney bowes, ecommerce, retail, online business, shipping, tracking, tracking and shipping, customer service
    
By: AlienVault     Published Date: Jul 14, 2014

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
By: AlienVault     Published Date: Jul 14, 2014

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.

Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
By: AlienVault     Published Date: Jul 14, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.

Tags : alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
By: Symantec     Published Date: Jul 11, 2014

Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIO's conquering these types of challenges? Find out how in this white paper by Expert, David Davis.

Tags : data, protection, physical and virtual environment, recovery, storage, consolidation, cio's, networking
    
By: IBM     Published Date: Jul 09, 2014

If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.

Tags : ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas
    
By: Box     Published Date: Jul 02, 2014

Today, marketers face many challenges, and often have to do more with less. Here are some of the top challenges marketers face today and how they solve these problems within their organization.

Tags : box, zip files, collaboration, marketing roi, collaboration, ftp, search portal, budget management
    
By: Box     Published Date: Jul 02, 2014

Today, businesses of all sizes are adopting cloud services to accelerate growth, create more efficient operations and expand their reach. In this white paper, you’ll find scenarios and economic justification for making a shift to enterprise content collaboration with Box.

Tags : box, collaboration, lan, infrastructure, data storage, data space, networking, storage
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.