Knowledge Management White Papers

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.

Sub-Categories: Collaboration, Collaborative Commerce, Contact Management, Content Delivery, Content Integration, Content Management System, Corporate Portals, Customer Experience Management, Document Management, Information Management, Intranets, Messaging, Records Management, Search And Retrieval, Search Engines, Secure Content Management, SLA
Results 1 - 25 of 2175Sort Results By: Published Date | Title | Company Name
By: ThreatTrack Security     Published Date: May 26, 2015

Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”

Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security, it management
    
By: Aternity     Published Date: May 22, 2015

Learn how Aternity redefines end user experience management in this series of brief videos.

Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
By: ThreatTrack Security     Published Date: May 21, 2015

This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.

Tags : phishing, next-generation malware, security, email, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.

Tags : cyberthreat, security, malware, defense, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.

Tags : advanced protection, cyberthreat, security, incident response team, threatsecure, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this white paper to learn how to add value through malware analysis.

Tags : malware, security threat, cyberattack, cyberthreat, malware analysis, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.

Tags : security challenges, mid-market security, cyber-extortion, cyberthreat, security, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar to learn how to win the battle against Advanced Persistent Threats.

Tags : persistent threats, cyberattacks, security, data breach, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.

Tags : targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks

Tags : advanced threats, advanced targeted attacks, security, cybersecurity, it management, knowledge management, data management
    
By: Citrix GoToMeeting     Published Date: May 20, 2015

This eBook describes formal meeting follow-up and why you need it, and provide a practical template that’s ready to use.

Tags : meeting, formal meeting, formal meeting requirements, meeting template, way to perfect meeting follow-up, how to ensure your meetings, get good results from meetings, template for formal meetings
    
By: Citrix GoToMeeting     Published Date: May 20, 2015

The meeting professionals from Citrix have put together 29 crucial tips based on their experience with thousands of online events.

Tags : meetings, online meetings, video conferences, virtual meetings, tips for online meetings, checklist for online meetings, citrix, customer interaction service
    
By: Acronis EMEA     Published Date: May 19, 2015

This case study explores how Acronis Access changed the way Parrish Construction Group communicates.

Tags : build a mobile workforce, control access, share documents, security, acronis access solution, acronis, access to documents, mobility
    
By: Pluralsight     Published Date: May 18, 2015

There are five key areas for which you must apply a certain level of attention if you plan on retaining your tech staff: 1. The work environment 2. Education 3. Hardware/software programs 4. Perks of hard work 5. Recognition

Tags : work environment, education, motivation, technology, production, pluralsight, it management, knowledge management
    
By: Pluralsight     Published Date: May 18, 2015

Finding technical talent can be a daunting and challenging task. It used to be that you could find it in obvious places, but the growing demand for these candidates at almost any skill level has made it feel like there is a shortage. And if you do manage to find qualified people, they’re often already engaged and happy where they are.

Tags : talent, technology, consultants, motivation, pluralsight, it management, knowledge management
    
By: Aternity     Published Date: May 18, 2015

This whitepaper provides an overview of Aternity for VDI and how it monitors end user experience in a VDI environment.

Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
By: Aternity     Published Date: May 18, 2015

Aternity Mobile APM provides an expanded range of Mobile APM use cases to help you measure, manage, and improve workforce productivity. It’s not only for developers of mobile enterprise apps, but also for IT Ops who support them, and the line of business who rely on them to drive the business.

Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
By: Seagate Technology     Published Date: May 15, 2015

An inside look at how IT Executives and System Integrators are managing video surveillance data.

Tags : system integrators, enterprise it, video surveillance, knowledge management, ip networks, biometrics, intrusion detection, mobile data systems
    
By: Cisco     Published Date: May 15, 2015

Cisco UCS Director is a vital, certified solution for EMC VSPEX that supports V125 and V250 models. It delivers unified orchestration, provisioning, and management across virtualization, computing, network, and storage from a single-view portal. When EMC VSPEX and Cisco UCS Director are combined, IT can shift focus from managing infrastructure to delivering new service innovation.

Tags : data center, software, management, networking, roi. cisco, network management, network performance management, best practices
    
By: Tenable Network Security     Published Date: May 12, 2015

Download and read author Steve Piper's concise, yet detailed new eBook, Definitive Guide to Continuous Network Monitoring, to learn: -Why there is a growing interest in continuous network monitoring -How continuous network monitoring works, and -What’s required to implement continuous network monitoring

Tags : continuous network monitoring, security state, compliance, contextual analytics, vulnerability management, security analytics, networking, security
    
By: IBM     Published Date: May 12, 2015

whitepaper describing how Universal document and image viewers can reduce costs, time and headaches.

Tags : ibm, big data, information lifecycle, email, document sharing, email security, document management, information management
    
By: Box     Published Date: May 11, 2015

This report analyses products from the 16 most significant solution providers in this market.

Tags : file sync, share platforms, sync, make a smart file sync, vendors, devices, sharing files, share vendors
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Nexsan by Imation     Published Date: May 11, 2015

Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.

Tags : imation, nexsan, physical security, camera, surveillence, storage, online surveillance, storage management
    
By: IBM     Published Date: May 07, 2015

In this On Demand session learn about using cloud-based social collaboration tools to streamline key areas of your business, increasing time to invest in new product development. Hear how one manufacturer turned to an IBM Business Partner to implement IBM SmartCloud Connections.

Tags : cloud technologies, social collaboration tools, ibm, networking, it management, wireless, knowledge management, storage
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.