discovery

Results 276 - 300 of 318Sort Results By: Published Date | Title | Company Name
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: Ultimus     Published Date: Aug 16, 2007
By making process discovery easier and on-demand, Adaptive Discovery overcomes a major hurdle to success with BPM and shortens the time it takes organizations to capture the competitive advantages of BPM.
Tags : 
ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa
    
Ultimus
Published By: Ultimus     Published Date: Aug 16, 2007
By enabling Adaptive SOA, Ultimus Adaptive Discovery takes SOA to the highest level of rapid deployment and agility. It accomplishes this by enabling business processes to be developed rapidly, and to embrace change in real-time. More importantly, it empowers business professionals and analysts who own processes to discover and change processes with IT playing the supporting role to manage the infrastructure.
Tags : 
ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa
    
Ultimus
Published By: Ultimus     Published Date: Aug 16, 2007
In the coming years, we believe that BPM will become the most important technology-driven business initiative for most companies. It leads you toward a focus on using technology to support your business processes, rather than adapting your business processes to support your technologies. It provides strong, sustainable ROI and competitive advantage.
Tags : 
ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa
    
Ultimus
Published By: Computhink     Published Date: Jan 31, 2008
Lisa Morgan, Director Channel Programs, and Vince Smolek, Technical Services Manager at Computhink discuss the benefits of ViewWise, an email archive service.
Tags : 
email archiving, email archive, archive, archiving, storage, computhink, video
    
Computhink
Published By: Oce Business Services     Published Date: Jun 24, 2009
Download this free report to explore the potential of applying business performance management principles to advance document performance management to reduce costs; better manage documents as vital strategic, financial and information assets; and secure positive returns on investments from outsourcing. Learn more today!
Tags : 
oce, kpi, ekg, document processes, mail center, print/copy operations, records, operations
    
Oce Business Services
Published By: Integration New Media     Published Date: Aug 29, 2008
Corporate librarians are faced with many challenges today. They are not only asked to be knowledge experts, they also need to be information providers, technology consultants and project managers. Building an eLibrary involves more than simply assembling a collection of resources.
Tags : 
inm, integration new media, information management, content management, elibrary, research, ediscovery
    
Integration New Media
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Published By: Mimosa Systems     Published Date: Jan 14, 2009
This paper describes how Cost and Breakeven Analysis of Email Discovery Using Mimosa NearPoint Email Archiving with eDiscovery Option. This customer is one of the largest manufacturers and marketers of healthcare supplements in North America with corporate headquarters in California. The company wanted to solve two related problems: eDiscovery risk and cost and PST propagation.
Tags : 
mimosa systems, ediscovery option, ediscovery risk, pst propogation, mimosa nearpoint
    
Mimosa Systems
Published By: Mimosa Systems     Published Date: Jan 14, 2009
Email archiving is emerging as a critical new IT application for managing email. For legal discovery, storage management, and regulatory compliance, email archiving provides important benefits that cannot be achieved with native email applications. The purpose of this “Email Archiving 101” paper is to provide a basic introduction to email archiving and explain how it benefits management of the email application server. The leading enterprise email application is Microsoft® Exchange Server, and this paper is geared toward this application; however, the principles discussed apply to all messaging applications.
Tags : 
mimosa systems, email archiving, mimosa nearpoint, microsoft exchange server, email applications, enterprise email application
    
Mimosa Systems
Published By: Mimosa Systems     Published Date: Jan 14, 2009
This white paper will present an improved approach to legal discovery for Microsoft® Exchange systems provided by Mimosa Systems. Unlike existing methods for legal discovery of Exchange Server data, Mimosa’s approach delivers major advances in performance and granularity of information. To begin this paper, we will review the industry forces that are driving the need to manage email for legal discovery, followed by a discussion of the market-leading enterprise messaging application—Microsoft Exchange Server and the challenges it presents for legal discovery.
Tags : 
mimosa systems, microsoft exchange systems, legal discovery, email for legal discovery
    
Mimosa Systems
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to discovery the site-to-site channel bonding capabilities of PowerLink. Site-to-site channel bonding enables two or more sites with PowerLink installed to communicate with each other using the combined throughput of one or more connected WAN links. Learn more today!
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: Discovery Corps, Inc.     Published Date: Nov 20, 2009
Seeing into the hearts and minds of our customers is impossible; but this article describes how Data Mining techniques can be used to create strategies and tactics to increase customer retention and value.
Tags : 
data mining, business intelligence, predictive modeling, customer retention, high-value customers, decision support, clustering, discovery corps
    
Discovery Corps, Inc.
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : 
messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Here are five common problems that occur when corporate employees use PST files and the advantages of email archiving.
Tags : 
messagelabs, symantec hosted services, pst file, personal storage table, email archiving, storage and backup, disaster recovery, compliance
    
Symantec.cloud
Published By: SAS     Published Date: Apr 25, 2017
This TDWI Checklist provides seven steps your organization can follow to apply a balanced governance strategy as you expand your use of self-service visual analytics and discovery.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 27, 2019
In the quest to understand how a therapeutic intervention performs in actual use – in real medical practice outside the controlled environment of clinical trials – many life sciences organizations are stymied. They rely on one-off processes, disconnected tools, costly and redundant data stores, and ad hoc discovery methods. It’s time to standardize real-world data and analytics platforms – to establish much-needed consistency, governance, repeatability, sharing and reuse. The organizations that achieve these goals will formalize their knowledge base and make it scalable, while significantly reducing turnaround times, resources and cost. Learn the seven key components for putting that structure to real-world evidence – and four ways to take it to the next level.
Tags : 
    
SAS
Published By: Discovery Corps, Inc     Published Date: Jan 11, 2011
Article on how to handle missing values in a dataset during a data mining project
Tags : 
data mining, missing values, techniques, diagnosis, tips, missing data, technology
    
Discovery Corps, Inc
Published By: Forensics Consulting Solutions     Published Date: Jan 31, 2011
A guide to understanding electronically stored information and workflows used to produce data for litigation.
Tags : 
e-discovery, esi, electronic discovery, electronically stored information, workflows, data governance
    
Forensics Consulting Solutions
Published By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
    
IBM Corporation
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library