Knowledge Management

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.
Results 76 - 100 of 1382Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Oct 11, 2016
Find out how IBM Configure Price Quote can help make sales of the most complicated configurable products easy.
Tags : 
ibm, commerce, business to business, b2b, cpq
    
IBM
White Paper Published By: IBM     Published Date: Oct 11, 2016
Third party white paper from FitforCommerce and IBM on the 5 roadblocks to avoid on the journey to omnichannel retail success.
Tags : 
ibm, commerce, b2c, b2c ecommerce, ecommerce
    
IBM
Webinar Published By: IBM     Published Date: Oct 11, 2016
Watch this short video to see how the right commerce solution can help you understand your customers like never before, and deliver exactly what they want.
Tags : 
ibm, commerce, b2c, b2c ecommerce, ecommerce
    
IBM
White Paper Published By: Adobe     Published Date: Oct 10, 2016
Read the infobrief for insights on: - What digital transformation is and how other businesses are doing it - How you can save time, money, and improve your customer experience with digitally transformed document workflows - Best practices and first steps in transforming document workflows in your own company
Tags : 
adobe, document cloud, document workflows, acrobat, adobe acrobat
    
Adobe
White Paper Published By: IBM     Published Date: Oct 10, 2016
Read this IBM white paper to learn why all retailers, no matter their size, need the ability to efficiently manage and execute accurate prices, improve their responsiveness to competitor pricing, and ensure compliance with their strategic pricing policies and goals.
Tags : 
ibm, commerce, omni-channel, merchandising, retail
    
IBM
Webinar Published By: IBM     Published Date: Oct 10, 2016
Watch this IBM-sponsored webinar to hear from Brian Kilcourse, Managing Partner at RSR Research, as he shares research and insights that can help you ensure that your dynamic pricing strategy is intelligent, timely, coordinated and successful.
Tags : 
ibm, commerce, omni-channel, merchandising, retail
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
Learn about IBM’s API Connect – an offering that integrates StrongLoop technology with IBM’s API Management platform into one seamless experience for developers & IT.
Tags : 
ibm, cloud, middleware, application services, api
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
IBM has just launched two new offerings that will help you to achieve your hybrid integration strategy. IBM Application Integration Suite and IBM App Connect enable you to integrate across on-premise and cloud environments, take advantage of the API economy and leverage existing IT investments to achieve digital transformation.
Tags : 
ibm, cloud, middleware, application services, api
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
In this session, we will talk about the latest release of DataPower V7.5. This release delivers enhanced cloud and API capabilities, in an updated modernized user experience.
Tags : 
ibm, cloud, api, ibm datapower v7.5, ibm datapower
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
The world of IT is rapidly transforming — from back office process automation to front line engagement. Put another way, IT no longer supports the business, it *is* the business. The challenge is, the application architectures and processes of existing applications are inadequate to support the requirements of tomorrow’s IT. This presentation will discuss the changing nature of business and customer engagement and discuss what capabilities IT must put in place to deliver the next generation of enterprise applications.
Tags : 
ibm, cloud, middleware, infrastructure, enterprise applications
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Uncovering the Risks of SAP Cyber Breaches by Ponemon Institute How are organizations truly managing cybersecurity risks in their SAP ecosystem? Ponemon Institute’s latest study of 607 global IT security practitioners reveals senior level perceptions about SAP, its security challenges, and the risk of data breaches and cyberattacks.
Tags : 
ibm, security, ponemon institute, technology, fraud
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Read this white paper to learn about how to get smart about insider threat prevention, including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third party collaboration.
Tags : 
ibm, data, big data, security, data loss
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Having an integrated approach to access management for mobile, web and cloud applications is essential to taking control of access management.
Tags : 
ibm, security, access management, access manager, integrated access management
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : 
ibm, security, access management, access manager, kuppingercole
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, security, maturity, gartner, magic quadrant
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
ibm, security, web fraud, malware, cybercrime
    
IBM
White Paper Published By: Salesforce Commerce Cloud     Published Date: Sep 29, 2016
The concept of distributed commerce, the ability for consumers to buy on any Internet-connected device or application, could have a profound impact on retail. As a result, integrating new means of engagement and commerce – quickly and at scale – is vital. In this whitepaper from Salesforce Commerce Cloud, formerly Demandware, you’ll see how every touchpoint is a transaction and how retailers can adapt. Download now!
Tags : 
demandware, commerce, retail, shopping, shopping journey
    
Salesforce Commerce Cloud
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : 
akamai, cybersecurity, security, ddos, ddos attack
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Read this guide to learn the key security capabilities that a web application firewall (WAF) can deliver to defend your web applications and to get ideas for extending your existing WAF and improving web application security.
Tags : 
akamai, security, cybersecurity, web application security, web application firewall
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
This infographic will walk you through a few key questions around your web applications.
Tags : 
akamai, attackers, cyber attacks, cybersecurity, web applications
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.