corporate content

Results 1 - 25 of 60Sort Results By: Published Date | Title | Company Name
Published By: Acquia     Published Date: Sep 14, 2011
With Drupal, it is easy to produce engaging, content rich websites, incorporate both structured and unstructured data sources, and blend published information with user-generated content.
Tags : 
acquia, technology, drupal, assmebled web, content rich websites, user-generated content, data sources
    
Acquia
Published By: Acrolinx     Published Date: Jan 28, 2015
Watch Your Tone! offers valuable advice on how you can create your own corporate voice — a unique, instantly recognizable style for all your content, that lets you speak with one voice and stand out from the crowd. This must-read resource for content professionals shares deep insights from industry experts and takes you step-by-step through the process of developing your perfect tone of voice.
Tags : 
tone of voice, corporate voice, platform, style, content, crm & customer care, marketing research
    
Acrolinx
Published By: Acronis EMEA     Published Date: May 19, 2015
This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.
Tags : 
security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance, share corporate content, sync, enterprise security, acronis access advanced solution
    
Acronis EMEA
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation
    
Attachmate
Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content, emerging marketing, marketing research
    
bigtincan
Published By: bigtincan     Published Date: Oct 10, 2014
Sales teams are the lifeblood of every organization, as they are tasked with acquiring market share and growing revenue. Access to corporate content – and understanding how to use it – is one of the greatest barriers salespeople must overcome. Mobile sales enablement is about providing dynamic, on-demand content that can be accessed during any selling situation.
Tags : 
mobile sales, mobile sales enablement, on-demand content, market share, emerging marketing, marketing research, sales
    
bigtincan
Published By: bigtincan     Published Date: Dec 12, 2014
The following white paper explores the various facets of the content challenge and outlines a new formula for maximizing content value.
Tags : 
content value, content management, content enablement, mobile world, corporate currency, content challenges, emerging marketing, internet marketing, marketing research
    
bigtincan
Published By: Box     Published Date: Nov 24, 2015
Today's EFSS market offers a range of maturing options to IT leaders as well as mobile and collaboration planners. New capabilities for corporate system integration and enhanced content collaboration continue to add to standard EFSS functionality.
Tags : 
file sync, sharing, box, efss, ecm, collaboration, productivity
    
Box
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Data fuels workforce productivity. But corporate data typically resides in disparate silos spread across on-premises networks and cloud repositories. Knowledge workers are forced to repeatedly disrupt daily workflows to gather information from this data sprawl — a time-consuming and inefficient activity that diminishes productivity. They need a single point of access to all data sources, available from any device, where they can share and manipulate the content resources required to do their jobs.
Tags : 
sharefile, productivity, security, mobility, workflow
    
Citrix ShareFile
Published By: Citrix Systems     Published Date: Oct 07, 2014
Mobile workspaces fulfill the vision for anywhere, anytime flexibility and productivity. People are empowered to get their work done in an always-on, fully secure environment that follows them everywhere, on any device. With seamless access to all corporate resources—even on the same devices that hold their personal content—people can get their work done faster and better for optimal business impact. By achieving true enterprise mobility, the organization as a whole gains new levels of agility and performance. This paper discusses the elements to a complete mobile workspace solution.
Tags : 
business, growth, workspace, mobile, experience, launch, windows, desktop, advisory, management, customer, time-sensitive, productive, counsel, strategic, collaborate
    
Citrix Systems
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365
    
Commvault
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Published By: HPE Intel     Published Date: Feb 17, 2016
Strategies for State, Local, and Education IT Management View this webinar to learn about how the explosive growth of data calls for new approaches from IT management. You'll hear from a panel of state, local, and education IT decision makers how increasing scale and complexity of data collection and storage are challenging their departments to adapt. Participants: Mark Meyers is the CTO and DIS Director of the state of Arkansas Dr. Paul Kim is the CTO and Assistant Dean of the Graduate School Education at Stanford University Leo Leung is the VP of Corporate Marketing at Scality Bob Schaar is the Segment Solutions Leader for SLED and SMB at Hewlett Parckard Enterprise Wyatt Kash is the VP of Content Strategy at Fedscoop
Tags : 
    
HPE Intel
Published By: Human Capital Institute     Published Date: May 16, 2014
Your employees are also online consumers of information and entertainment. You can maximize enterprise learning by applying practices from the new generation of information delivery, while keeping the best of the old-school approaches.
Tags : 
hci, human capital institute, enterprise learning, information delivery, corporate learning, strategic learning, center for creative leadership, employee development, employee learning, peer networking, peer-based learning, consumer-employees, on-demand learning, mobile learning, streaming content, adobe systems, macy’s inc., performance management, talent development, synchronous training
    
Human Capital Institute
Published By: IBM     Published Date: Jul 20, 2016
New research from IBM found that one-third of employees surveyed at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. Why? They’re tired of workplace apps that don’t perform like their personal apps: intuitively, on the go, and with some intelligence. Saying “yes” might feel good to your teams, but it can also turn your infrastructure into a Beast. You don’t know all the different apps being used, like file sharing or online meetings. Or how much they cost. Or if your content is safe and manageable. Can you give your teams what they want without getting trampled by the Beast? Yes you can. You can transform the Beast into a Beauty. But you need to consider three critical ways to make that happen.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business operations, business technology, third-party cloud apps, workplace apps
    
IBM
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : 
data security, byod, corporate security, mobile data security, user experience
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Mobile productivity necessitates instant and easy access to retrieve, edit, share and send corporate data from anywhere. In this paper we’ll explore the rapid workplace productivity transformation of securing enterprise content so employees can use smartphones and tablets to run all business from the palms of their hands.
Tags : 
mobile content management, mobile productivity, corporate data, access, workplace productivity, smartphones, tablets
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Security is really about access; today’s work demands access to anything from anywhere on any device. Learn how to securely let employees share, edit and distribute work data across iOS, Android and Windows.
Tags : 
ibm, fiberlink, data security, mobile, mobile strategy
    
IBM MaaS360
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.