data sharing

Results 76 - 100 of 108Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 10, 2014
Building an effective sales team starts with hiring the best talent and then making them productive as quickly as possible.
Tags : social collaboration, social networking, social business, communication, social media, mobile, bid data, cloud
     IBM
By: Silver Peak     Published Date: Jun 24, 2013
Running multiple data centers can be costly and complex. While using shared WAN links is a viable option for cutting costs, many organizations would rather incur the additional expense of private lines than sacrifice performance. This resource details the challenges of sharing WAN links and explores how WAN optimization – which employs a set of technologies to improve the bandwidth, latency, and loss characteristics of WAN links – can help you achieve the private line performance you need without the high price tag.
Tags : data centers, wan links, optimization, technology, improve bandwidth, boost performance, disaster recovery, backup
     Silver Peak
By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : data security, compliance, technology, network security, regulatory compliance, security, enterprise applications, data management
     Intralinks
By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : collaboration solutions, risk management, business productivity, it efficiency, business users, enterprise applications
     Intralinks
By: Dropbox for Business     Published Date: May 07, 2015
It's all about Usability. Help educate your prospects about the shifting role of IT and share best practices for evaluating technology in a BYOD world.
Tags : usability, employee performance, consumerization, application adoption, best practices, byod, data management, ofs
     Dropbox for Business
By: IBM     Published Date: May 12, 2015
whitepaper describing how Universal document and image viewers can reduce costs, time and headaches.
Tags : ibm, big data, information lifecycle, email, document sharing
     IBM
By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules
     Iovation
By: SAS     Published Date: Mar 19, 2013
Gaining Insights from Your Data Faster than Ever and Sharing the Insights with Others
Tags : big data, visualization, interactive, data, data visualization
     SAS
By: IBM MaaS360     Published Date: Oct 08, 2015
The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : ibm, fiberlink, maas360, apple, ios, data security, information sharing, networking
     IBM MaaS360
By: IBM     Published Date: Jul 01, 2015
This whitepaper talks about the steps to cloud expertise solutions
Tags : hybrid cloud solutions, customer experience, hybrid cloud, data analytics, data sharing, infrastructure as a service, iaas, data integration
     IBM
By: IBM     Published Date: Jul 20, 2016
New research from IBM found that one-third of employees surveyed at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. Why? They’re tired of workplace apps that don’t perform like their personal apps: intuitively, on the go, and with some intelligence. Saying “yes” might feel good to your teams, but it can also turn your infrastructure into a Beast. You don’t know all the different apps being used, like file sharing or online meetings. Or how much they cost. Or if your content is safe and manageable. Can you give your teams what they want without getting trampled by the Beast? Yes you can. You can transform the Beast into a Beauty. But you need to consider three critical ways to make that happen.
Tags : ibm, enterprise social solutions, enterprise solutions, business operations, business technology, third-party cloud apps, workplace apps, enterprise applications
     IBM
By: Cisco     Published Date: Jun 02, 2015
The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : infrastructure, data, cloud, sharing, software, network, storage
     Cisco
By: SAS     Published Date: Apr 25, 2017
Are you a marketing leader on the path to modernizing your marketing organization? Are you a marketing analyst championing analytical transformation in your campaigns? If you answered yes to either question, this e-book is for you. It offers a practical account of how to create a new marketing culture that adds value through data and analytics. You’ll meet marketing leaders from Comerica, Lenovo, RCI, SAS and Visa – and read how they’re implementing analytics, redefining marketing strategies and transforming their cultures. By sharing their perspectives, we hope to provide a new set of best practices to guide your analytical transformation – and to help you reinvent your marketing organization for the digital age.
Tags : 
     SAS
By: SAS     Published Date: Aug 02, 2017
With more data in the hands of more people – and easier access to easy-to-use analytics – conversations about data and results from data analysis are happening more often. And becoming more important. And expected. So it’s not surprising that improved collaboration is one of the most common organizational goals. Why? Because two heads, or 10 heads, are better than one. Because bouncing ideas off of others helps you consider more options. And because sharing what you know may help someone else make better decisions.
Tags : 
     SAS
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
Data sharing is the first priority in web conferencing. Web conferencing doesn't work well for day-to-day collaboration. Everything is a scheduled, “meet-me” conference. You can’t just call someone. Web conferencing providers don’t offer a complete solution. You have to separately manage and integrate video systems and instant messaging through independent platforms that do not integrate into the web conferencing service, resulting in an inferior and disjointed user experience. Download now to learn why Lifesize Cloud is the ONLY solution you need!
Tags : lifesize, web conferencing, team collaboration, data sharing, video systems, software development, data management
     LifeSize, a division of Logitech
By: HP     Published Date: Aug 26, 2014
Make sense of modern storage technologies and architectures and how they might impact your business. HP helps you understand unstructured data, block and object storage, storage system architectures, and storage networking options. Discover how the right mix or technologies such as virtualization, file sharing, and deduplication can help control storage costs, protect your data from loss or corruption, and provide reliable access to critical business information for every authorized user. See how.
Tags : data, business, technology, portfolio, cloud-based, support, portal, solution
     HP
By: IBM     Published Date: Jan 10, 2014
Applications are evolving at an ever-faster pace. These applications are not discrete islands; they build on a complex, interconnected set of components that includes disparate technologies, developers, deployment topologies and organizations. Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This whitepaper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : ibm, rational, integration, integration testing, incremental integration, testing, virtulization, data management
     IBM
By: IBM     Published Date: Feb 04, 2015
Businesses contain countless systems, sensors, meters, and other IT devices generating volumes of data daily.But, are your devices and systems simply sharing data or are they having a conversation that enables better business outcomes?
Tags : machine data, big data, data-in-motion analytics, iot, enterprise applications, data management
     IBM
By: IBM     Published Date: May 30, 2008
Organizations with data-sharing environments, complex information and systems hinder business responsiveness and decision makers’ ability to make informed decisions. This white paper will describe how engaging in a master data management (MDM) project enables effective governance of data - specifically master data - and achieves maturity in key categories of the IBM Data Governance Maturity Model.
Tags : ibm, mdm, master data management, data management, data governance
     IBM
By: Safe Software     Published Date: Aug 21, 2009
Spatial data warehouses are becoming more common as government agencies, municipalities, utilities, telcos and other spatial data users start to share their data. This paper illustrates some of the issues that arise when undertaking data replication and data sharing.
Tags : data warehousing, share data, data management, data distribution, data sharing, replication, safe, safe software
     Safe Software
By: Visible     Published Date: Aug 21, 2009
The biggest problem facing CIO's today is their existing applications. This paper describes the problem and describes our permanent solution, Enterprise Application Integration.
Tags : integration, application integration, application security, collaboration, data sharing, data integration, business integration, efficiency
     Visible
By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : quocirca, encryption, security, information protection, compliance, data management
     Quocirca
By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing
     Quocirca
By: Neterion     Published Date: Dec 05, 2006
Virtualization is a key strategy for simplifying deployment of IT resources and maximizing their utilization. Specifically, virtualization refers to the concept of abstracting physical resources such as compute cycles, data storage, and network bandwidth, and then provisioning and sharing these resources amongst multiple applications.
Tags : virtualization, data center, data centers, datacenters, resource management, it management, network management, virtual
     Neterion
By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : platforms, data management
     BMC Control M
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com