discovery

Results 1 - 25 of 326Sort Results By: Published Date | Title | Company Name
By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
     123Together
By: Accelops     Published Date: Nov 05, 2012
Read this white paper to learn how the combination of discovery, data aggregation, correlation, out-of-the-box analytics, data management, and reporting can yield a single pane of glass into data center and IT operations and services.
Tags : accelops, data center, cloud service, cloud service management
     Accelops
By: Actiance     Published Date: Jul 09, 2012
SharePoint is used for a variety of information management tasks, the majority of which are subject to regulatory, e-Discovery, and legal mandates, as well as existing corporate policies.
Tags : sharepoint, double positive, microsoft
     Actiance
By: Actiance, Inc.     Published Date: Nov 13, 2014
The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!
Tags : actiance, gartner, magic quadrant, enterprise information archiving, cagr, eia, compliance, e-discovery
     Actiance, Inc.
By: Adaptive Planning     Published Date: Apr 25, 2012
In describing what forecasters are trying to achieve, Saffo outlines six simple, commonsense rules that smart managers should observe as they embark on a voyage of discovery with professional forecasters: Map a cone of uncertainty, look for the S curve, embrace the things that don't fit, hold strong opinions weakly, look back twice as far as you look forward, and know when not to make a forecast.
Tags : adaptive, business, finance, forecasting, business planning, budget
     Adaptive Planning
By: Adobe     Published Date: Feb 20, 2014
Most brands would love to have their apps among the top 25 most downloaded apps on the Apple App Store or Google Play. With more than one million apps available, there’s a great risk that your app won’t stand out from the crowd. Marketers need to make sure their core target audiences will first download and then regularly use their apps, without spending huge promotion budgets. This report will analyze how consumers discover apps and will provide some guidelines on how to promote your apps.
Tags : forrester, adobe, mobile app promotion, mobile app, mobile applications, apps, mobile marketing, promotion
     Adobe
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention
     AlienVault
By: Alteryx, Inc.     Published Date: Sep 06, 2017
From small organizations using spreadsheets and visual discovery tools to large enterprises trying to improve data quality and delivery, data preparation difficulties are a major concern. Download your complimentary copy of the full report so you can tackle your data preparation challenges.
Tags : 
     Alteryx, Inc.
By: Amazon Web Services and Intel     Published Date: Oct 07, 2015
With the large amounts of data that are constantly being utilized in today’s highly digitized world, there is a necessity for top of the line infrastructure to maintain everything with precision. Download this case study to see how high performance cloud computing can enhance collaboration and see how it will allow for research to be shared easily and the ability to scale up when needed.
Tags : high performance cloud computing, collaboration, data, enterprise applications
     Amazon Web Services and Intel
By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers’ trust and build on its unexpected success.
Tags : customer traffic, load balancer solution, application response times, visibility, cloud application service, cloud application delivery, aws, amazon web services
     Appcito
By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : cyber defenses, threat actors, it security, security analytics
     Arbor
By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : information-handling practices, edrm, electronic discovery, maturity model, it management, data management
     ARMA
By: ASG Software Solutions     Published Date: Dec 09, 2008
Generally, CMDBs populated by discovery tools alone simply aren't usable. They fail because they contain massive amounts of irrelevant information. You avoid this pitfall by correctly populating your CMDB in four simple steps.
Tags : asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm
     ASG Software Solutions
By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content
     Astaro
By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis
     Attivio
By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
     Avi Networks
By: AWS     Published Date: Nov 08, 2018
In this webinar, you will learn how Allergan used Druva and AWS during the acquisition of ZELTIQ Aesthetics. You will hear how Allergan protected against accidental and purposeful data loss, and how backup data can be used for eDiscovery and forensic analysis.
Tags : 
     AWS
By: AWS     Published Date: Jul 26, 2019
What you'll learn in this webinar: When you migrate your databases and applications from Oracle to Amazon Aurora, you can take advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS) to optimize your operations so you can focus on innovation. Clckwrk analyzes your existing database environment and creates a plan to embrace an elastic, scalable, cloud-native database solution that can grow with your business and help you eliminate the exorbitant costs of commercial database licenses. Watch this webinar to learn how: You can accelerate your migration off Oracle databases to Amazon Aurora with minimized disruption to your business You can leverage refactor code to work in your new database Clckwrk can help you establish a unique migration strategy for your needs, supported by a consultation practice that covers discovery to implementation
Tags : 
     AWS
By: Bazaarvoice     Published Date: Aug 05, 2014
The local consumer decision journey has changed. This step-by-step guide will show you how to connect with local consumers to improve visibility, gain control of your reputation, and drive more local leads and sales.
Tags : bazaarvoice, customer, local advocacy, sales, online discovery, local marketing
     Bazaarvoice
By: BlackBerry     Published Date: Jul 23, 2010
Investing in mobility is like investing in any other important business activity, and its success will largely depend on how closely it is aligned with both business and IT drivers. A successful mobility plan should focus on 'mobilizing' your critical business processes and include planning phases for discovery, development and deployment. This Guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications.
Tags : blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, touchpoint
     BlackBerry
By: Bloofusion     Published Date: Mar 01, 2010
Use the ten tough questions to quiz and help select your next SEO firm more effectively. Whether you are a CMO at billion dollar software firm or running your own online enterprise, at some point optimizing your site for discovery and favorable ranking by search engines for the terms that result in lead generation or purchase will become a priority.
Tags : bloofusion, ecommerce, url, ids, seo, cookie, optimization, tags
     Bloofusion
By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance, it management
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
In this white paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services. • Accelerate mean time to repair (MTTR) while communicating better with stakeholders. • Manage even the most complex hybrid environments more efficiently and effectively. • Understand the impact of proposed changes and potential security risks to guide decision-making.
Tags : cloud, hybrid environments, application discovery mapping, application dependency mapping, security risks
     BMC Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com