Knowledge Management White Papers

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.

Sub-Categories: Collaboration, Collaborative Commerce, Contact Management, Content Delivery, Content Integration, Content Management System, Corporate Portals, Customer Experience Management, Document Management, Information Management, Intranets, Messaging, Records Management, Search And Retrieval, Search Engines, Secure Content Management, SLA
Results 1 - 25 of 1747Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Nov 04, 2014

n this Gigaom Research Webinar, we will examine the schism between the automated enterprise and the manual operations that support it, assess the tools and processes available to bring the back office up to speed, and present a roadmap to bring business agility and consistency to your operations.

Tags : adobe, communications, business automation, business communications, operations, human resources, office compliance, business process automation
    
By: IBM     Published Date: Oct 30, 2014

Filled with exotic terms like “Hadoop” and “Data Scientist”, Big Data, business intelligence and analytics have always been the domain of the biggest enterprises with huge teams to devote to analyzing data. But thanks to the latest technology advances businesses of almost any size can utilize tools to help inform every part of business decision-making. This SlashGuide looks at a recent Slashdot Pulse research study on BI/BA and discusses what’s really important when it comes to Big Data – and what businesses can do now to capitalize on the trend.

Tags : business analytics, big data, bi/ba, it management, knowledge management, data management, best practices
    
By: IBM     Published Date: Oct 22, 2014

A case study on how a major oil and gas producer saves 35 percent on data storage costs and 30 percent in litigation-related costs by adopting a smarter data discovery and defensible disposal strategy, using IBM Enterprise Content Management solutions.

Tags : legacy data, data storage costs, data storage, content management, it management, knowledge management, data management, business intelligence
    
By: IBM     Published Date: Oct 22, 2014

Download this white paper from MWD Advisors and get an inside look at what you’ll need to (1) Empower your most valuable knowledge workers; (2) Provide exceptional customer experiences; and (3) Thrive in an increasingly competitive environment

Tags : customer service, case management, advanced analytics, it management, knowledge management, business analytics, business intelligence
    
By: Box     Published Date: Oct 22, 2014

Box helps Marketing teams save time, keep branding consistent and increase efficiency. Learn how Box helps Marketers send large files, work with agencies and create campaigns quickly and productively.

Tags : box, marketing, large files, file transfer, marketing campaigns, productivity, email security, wireless messaging
    
By: IBM     Published Date: Oct 22, 2014

Not storing data is cheaper than storing it. As enterprise data continues to grow and IT budgets remain flat, organizations need to more effectively maximize existing storage capacity and manage storage spend based on data value. In this white paper, Enterprise Strategy Group Sr. Analyst Mark Peters demonstrates how IBM's Information Lifecycle Governance solutions can help IT buyers improve the information economics for their organizations by curtailing data growth through defensible disposal of data.

Tags : data storage, big data, data disposal, data value, it management, data management, business intelligence, content management system
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, it management, mobile computing, mobile data systems
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers
    
By: Dyn     Published Date: Oct 16, 2014

Web presence is now a required option for customers accessing a business’s products and services. But more than just an option, web pages have become the face of most companies to the public. Learn how can you take control of the Internet effect on your company’s web presence through Internet monitoring, analysis and planning.

Tags : dyn, internet visibility, web infrastructure, web presense, customer service, online business, internet performance, network performance
    
By: IBM     Published Date: Oct 10, 2014

Agile Development and DevOps emphasize quick feedback cycles. But how do we test non-trivial applications with many components? What do we do when some components are outside of our control, expensive to access, or simply not ready to test against? Delaying integration testing or running the tests infrequently is can cause problems to linger, quality to fall, and delivery delays.

Tags : agile development, composite applications, integration testing, it management, knowledge management, application integration, best practices, business analytics
    
By: IBM     Published Date: Oct 10, 2014

Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.

Tags : release management, application management, market trends, application deployment, it management, knowledge management, best practices, business intelligence
    
By: LogMeIn     Published Date: Oct 10, 2014

This white paper provides its research results which aims to find out how well companies are doing in terms of creating sales leaders.

Tags : sales training, virtual sales training, virtual collaboration, logmein, sales management, mobile computing, mobile workers, wireless infrastructure
    
By: LogMeIn     Published Date: Oct 10, 2014

A research paper written by Ovum in collaboration with join.me by LogMeIn to help understand how web conferencing tools can benefit businesses.

Tags : web conferencing, changes in web conferencing, collaboration tools, web collaboration, logmein collaboration tools, mobile computing, mobile workers, collaboration
    
By: OpenText     Published Date: Oct 01, 2014

Customer expectations are the primary driver for omni-channel commerce. Whether B2B or B2C, your customers want an integrated experience, they expect to see consistent branding, rich media, and correct information supporting a continuous shopping journey across channels. And that requires digital assets such as images, text, video, and audio to be synchronized with product information, and delivered seamlessly across all channels. Digital asset management is a core, foundational capability ensuring the benefits of omni-channel customer experiences are delivered.

Tags : opentext, cem, e-commerce, rich media, omni channel, b2b, b2c, integrated experience
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

Mobile device Management was just the beginning of the enterprise journey towards complete mobility. Learn why enterprise mobility management is now needed for all devices and data for work.

Tags : mobile device management, mobility, enterprise mobility, mobile security, application management, it management, knowledge management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

As a retail security professional, you are challenged with maintaining a constant state of PCI compliance and keeping your infrastructure safe using best-of-breed security solutions that help, rather than hinder, your quest to validate your systems. Endpoint protection that is based on detecting known malware is demonstrably ineffective —and has the potential to create numerous inefficiencies across your organization. In addition, constant updating of security patches and antivirus software libraries can slow response times and leave endpoints vulnerable to APT attacks. Besides potential breaches of your customers’ personal information, as well as damage to your brand, a lack of endpoint control can also put you at risk for steep PCI noncompliance and regulatory penalties—fines that can range anywhere from $10,000 to $100,000 per month.

Tags : retail security, pci compliance, infrastructure security, endpoint protection, security, knowledge management, best practices, project management
    
By: Bit9     Published Date: Sep 30, 2014

Recent high-profile data breaches at brand name retailers, highlight the need to protect your company’s reputation and your customer’s personal information. The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few.

Tags : data breach protection, it security, infrastructure protection, pci compliance, security, knowledge management, best practices, business activity monitoring
    
By: SAS     Published Date: Sep 30, 2014

How The University of Texas System is increasing transparency to the public with dynamic data visualizations.

Tags : sas, dynamic data visualizations, the university of texas system, it management, knowledge management
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock? The good news is IT can embrace BYOD with security and confidence given the right preparation and technology??

Tags : byod, device discovery, self-service portals, end users, knowledge management, mobile data systems, best practices
    
By: Bit9     Published Date: Sep 30, 2014

Retailers and other covered organizations face increasing pressure to not only comply with PCI DSS 3.0, but to also protect servers and endpoints from evolving security threats. This new white paper explains how a positive security solution can help you achieve both goals, and avoid the costs and risks of non-compliance and/or a security breach.

Tags : pci compliance, endpoint monitoring, dss security, security solutions, security, it management, content management system, secure content management
    
By: Bit9     Published Date: Sep 30, 2014

This new eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : it security, pci compliance, industry regulations, security solutions, security, it management, risk management, content management system
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices
    
By: Lenovo     Published Date: Sep 16, 2014

Virtual Desktop Infrastructure (VDI) works best for smaller centrally located user bases that share a core set of application and file needs. As the world moves to the web and the cloud, is VDI still a good fit for emerging mobility and BYOD needs for your agency? See this infographic to learn more about the tradeoffs, and what you can do to take advantage of emerging cloud solutions to drive improved mobile productivity across your entire organization.

Tags : vid, cloud alternatives, emerging mobility, mobile productivity, it management, bandwidth management, content integration
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.