digital collaboration

Results 76 - 83 of 83Sort Results By: Published Date | Title | Company Name
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection
    
Brainloop
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
    
Brainloop
Published By: IBM     Published Date: Aug 10, 2009
Digital Media convergence, Web 2.0 and social networking's growing influence are forcing Telecommunications companies to transform their service offerings. Watch this webcast to learn about IBM's asset-based telecommunications solutions that solve our clients most important challenges.
Tags : 
web 2.0, social networking, telecommunications, digital media, collaboration, ibm, empowering people, spde
    
IBM
Published By: Visible Technologies     Published Date: Jul 24, 2009
The impact of the social conversations has dramatically increased. More than 133 million blogs have been indexed since 2002. Twitter has doubled in size this year alone to roughly 30 million users, who create 1,500 new "Tweets" every second. Facebook's 35-year-old-plus demographic grew to 12 million users in the first quarter of 2009. But that's only part of the story. The results from search engines are even more important. 2,300 searches are performed every second of every day.
Tags : 
social networking, digital age, reputation, social networking, visible technologies, facebook, twitter, youtube
    
Visible Technologies
Published By: LeapFrog Interactive     Published Date: Jul 09, 2009
Integrated campaigns involving both traditional and digital marketing channels have demanded that brands utilize multiple agencies when executing a marketing campaign. To seamlessly combine all of these independent agencies, brands need to utilize agency summits, meetings that help get all sides to collaborate, cooperate, and create as a single unit rather than act as rival agencies.
Tags : 
leapfrog, agency, coordination, cooperation, marketing, advertising, campaign, digital
    
LeapFrog Interactive
Published By: EMC     Published Date: May 01, 2009
During this recorded webcast, you'll find out how organizations are combining 3D and 2D into their brand centers and creating new ways to engage their customers. You'll learn how CGI saves money and maximizes the reuse of CAD assets and CGI artwork for a variety of emerging media. And, you'll see a product demonstration, showing the impact 3D images can have on your marketing programs. Learn more today!
Tags : 
marketing, concent, cgi, cad, digital media, emc, images, artwork
    
EMC
Published By: LockLizard     Published Date: Dec 08, 2008
This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Tags : 
locklizard, document security, encryption, copy protection, digital rights management, document collaboration
    
LockLizard
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.