digital

Results 3751 - 3775 of 4165Sort Results By: Published Date | Title | Company Name
Published By: Sanbolic     Published Date: Aug 21, 2009
Today, most video post production for standard-definition content has moved onto disk-based, non-linear editing (NLE) systems. These systems offer improved flexibility over linear, tape-based systems by allowing a workstation fast access to any part of the digital media file.
Tags : 
hi def, hi-def, san, storage area network, storage area networks, cisco, storage, hi-def video, digital media, digital media storage, media storage, post-production, sanbolic
    
Sanbolic
Published By: Signiant     Published Date: Aug 14, 2008
Never before has the Media and Entertainment (M&E) industry seen such rapid change in business models, adoption of digital technologies, and global, distributed, collaborative workflows. New business ventures, consolidation of terrestrial-based television stations, broadband penetration, time-to-market pressures, and shifting audience viewership are some of the ingredients that are contributing to the re-definitions that are taking place in the M&E industry.
Tags : 
signiant, digital media, supply chain, information management
    
Signiant
Published By: Signiant     Published Date: Aug 14, 2008
Moving content from raw form to finished form and delivering it to cable head-ends and Telco providers has its own unique set of challenges. How does content flow from the person or companies who are producing and post-producing the content to the companies that are hosting the content for consumption? IPTV content must be transformed in some fashion, such as various bit rates, resolutions, aspect ratios, file formats, etc.
Tags : 
signiant, information management, file transfer, ftp, large file transfer, digital media
    
Signiant
Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv, customer service, customer satisfaction, texas instruments
    
Texas Instruments
Published By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : 
wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo, home networking, texas intruments
    
Texas Instruments
Published By: Texas Instruments     Published Date: Aug 21, 2009
Designing wireless local area networking (WLAN) capabilities into stationary customer electronics (CE) systems is most successful when certain design issues are considered early in the development cycle.
Tags : 
wireless lan, wlan, wlans, consumer electronics, ce systems, vcr, consumer electronic, ce design, digital media, product development, texas instruments
    
Texas Instruments
Published By: Quocirca     Published Date: Dec 02, 2008
The need to share information has never been greater as cross-organizational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organizations, carries more and more risk as regulations are tightened around data protection and personal privacy.
Tags : 
quocirca, content security, aep networks, clearswift, symantec, trend micro, websense, smtp
    
Quocirca
Published By: Quocirca     Published Date: Apr 08, 2009
The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Tags : 
quocirca, paper systems, it systems, it infrastructure, mobile technologies, functionality, capacity, cost control, cost cutting, ongoing costs, tco, total cost of ownership, anoto, automating business processes, paperless office, paper-based processes, network connection reliability, wi-fi, bluetooth, hardware choices
    
Quocirca
Published By: Neterion     Published Date: Dec 05, 2006
The relentless growth of data and network-intensive applications such as digital imaging, multimedia content, and broadcast/video continues to drive volumes of enterprise data and network traffic. As growth continues, IT managers are challenged with implementing solutions without interrupting critical business processes.
Tags : 
network infrastructure, traffic management, bandwidth management, bandwidth, network management, neterion
    
Neterion
Published By: Envisional     Published Date: Dec 21, 2006
Now that millions of ordinary, non-geeky families are routinely downloading TV shows and movies without a second thought, digital piracy has clearly gone mainstream.  Download this paper to learn methods for preventing video piracy.
Tags : 
piracy, copyright, copyright infringement, digital piracy, fcc, envisional
    
Envisional
Published By: digitiliti     Published Date: Apr 02, 2007
The challenge of managing, protecting and storing digital data is a major issue for businesses of every size and category. Companies generally rank the improvement of their storage infrastructure as a top objective, and the escalation of data protection costs has become an overriding concern. According to recent research, the data storage capacity of the average North American enterprise is now 59 terabytes, and the projected annual production data growth is 20 to 30 percent.
Tags : 
data storage, software, data security, data protection, enterprise software, storage, digitiliti, backup and recovery, data backup
    
digitiliti
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : 
public key, secure content, encryption, proofspace, proofmark
    
ProofSpace
Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals, drug, fda, electronic signature, digital signature, audit, auditing, fda, compliant, ecora
    
Ecora Software
Published By: ElcomSoft     Published Date: Dec 06, 2007
Rapid development of digital technologies and electronic communication, availability of mobile PCs and smart phones, abundance of tools for creating documents or high-quality presentations coupled with constantly growing volumes of information and yearning for doing business more effectively leads to switching to electronic exchange of information.
Tags : 
pdf, acrobat, adobe acrobat, document security, secure content, secure pdf, password recovery, pdf password, elcomsoft, portable document, document management
    
ElcomSoft
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information is crucial in decision making. No wonder that protection of information is paid much attention. The most part of information is created and stored digitally (Microsoft Office documents, different databases, and financial data in Intuit Quicken etc). Thus software and hardware means of protecting information are the first to talk about.
Tags : 
password, password recovery, system recovery, elcomsoft
    
ElcomSoft
Published By: Catalyst SF     Published Date: Apr 30, 2008
This white paper is intended to provide an overview of the mobile marketing options available to marketers today. It is designed for the person who wants an entry level perspective on the platform. Ultimately, this document is meant as a starting point in your pursuit for greater understanding of emerging media options, in this case mobile. After reading, you should have some idea of how to proceed to explore digital marketing for your brand.
Tags : 
catalyst, mobile marketing, mobile, cell, cell phone, smart phone, interactive/pr agencies
    
Catalyst SF
Published By: Arcot     Published Date: Jun 04, 2008
Solutions including one-time-password (OTP) generator tokens, do not offer the same level of protection as the ArcotID against attacks such as the man-in-the-middle attack. The ArcotID secure software credential provides protection against common Internet threats and several futuristic attacks that are becoming popular among fraudsters.
Tags : 
authentication, digital signature, password management, cardholder authentication, arcot, smartcard
    
Arcot
Published By: SchemaLogic     Published Date: Jun 11, 2008
The Associated Press, like all publishing and digital media companies, must work rapidly to meet the demands of a shifting media landscape. An exploding wave of free content on the web meant that AP not only had to deliver more content online, but needed to create more relevance and niche content in order to update traditional ad revenue models with targeted web-based products and more potential for advertising dollars.
Tags : 
schemalogic, associated press, content delivery, content management, cms, content management system
    
SchemaLogic
Published By: RedEye On Demand     Published Date: Jun 23, 2008
Rapid manufacturing's benefits extend far beyond the upfront savings on tooling. Discover how it will improve your operations, sales and profits and why it is heralded as the next industrial revolution. In the first of a series, you will discover the benefits of the freedom to redesign your products at any stage in the life cycle.
Tags : 
plm, product design, product lifecycle management, design, redeye
    
RedEye On Demand
Published By: RedEye On Demand     Published Date: Jun 23, 2008
Adhering to the constraints and limiting design freedoms are necessary for conventional manufacturing processes. Rapid manufacturing eliminates all of the design constraints imposed by conventional manufacturing methods. It offers designers and engineers an unprecedented freedom to design a product and its components exclusively for the desired form, fit and function.
Tags : 
scm, design, product design, plm, product lifecycle management, redeye
    
RedEye On Demand
Start   Previous    144 145 146 147 148 149 150 151 152 153 154 155 156 157 158    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.