electronic

Results 1 - 25 of 418Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Jan 23, 2013
No business likes to throw money out the window, or in the case of the modern day enterprise, down the electronic data stream. But, that is exactly what businesses all over the world are doing every day if they don’t have control of their data. This paper is sponsored by: ASG.
Tags : 
white paper, dataversity, asg, metadata, business management, data, data management
    
DATAVERSITY
Published By: ASG     Published Date: Feb 05, 2013
No business likes to throw money out the window, or in the case of the modern day enterprise, down the electronic data stream. But, that is exactly what businesses all over the world are doing every day if they don’t have control of their data.
Tags : 
white paper, dataversity, asg, metadata, business management, data, data management
    
ASG
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: APC by Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : 
arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
    
APC by Schneider Electric
Published By: Nuance     Published Date: Feb 09, 2011
Since Adobe debuted the PDF file format in the early 1990s, it has become the defacto standard for electronic documents in many markets. While engineers, publishers, and printers push the format to its technical limits with rich media and 3-D content, the general office worker comprises the PDF-using majority.
Tags : 
nuance, pdf, office environment, rich media, adobe, conversion
    
Nuance
Published By: MyOffice24x7     Published Date: Oct 12, 2012
An instructive whitepaper for introducing electronic forms to your organisation, with the view of supplementing or replacing the use of paper forms in its business processes.
Tags : 
    
MyOffice24x7
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: DocuSign     Published Date: Apr 24, 2018
DocuSign can help you deliver customer experiences (CX) that will have your users (customers, employees, vendors, and others) rewarding you with positive responses and greater loyalty. This How-To Guide shows how you can apply electronic document review and approvals to empower the very best interactions from any device.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
"With every eSignature vendor claiming they are “eiDAS compliant”, you should equip yourself with the right level of knowledge to filter through what is right for your business. Download the whitepaper to learn why it is important choose an eSignature service provider that: • Delivers all the various e-signature types defined by eIDAS: Simple, Advanced and Qualified • Is independently accredited against European Commission-recommended technical standards • Offers international reach and experience to accommodate your business"
Tags : 
    
DocuSign
Published By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : 
astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content
    
Astaro
Published By: Dependable Solutions     Published Date: Feb 16, 2010
A critical challenge for many companies in 2009 was to stay on top of licensees' obligations, payments, receipts and royalties, along with growing volume of approvals.
Tags : 
dependable solutions, licensing, edi, electronic data interchange, sku
    
Dependable Solutions
Published By: DocuSign     Published Date: Feb 13, 2017
DocuSign electronic signatures are valid and legally binding around the world. In fact, they are more enforceable than traditional handwritten signatures. Hear from DocuSign's Chief Legal Officer, Ken Moyle, and DocuSign's Founder, Tom Gonser, about how DocuSign delivers the highest levels of legal enforceability and is the only eSignature provider to warrant compliance with the Federal ESIGN Act.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Feb 13, 2017
Running fully digital processes is an imperative. Deals need to be closed anytime, anywhere and they need to be closed NOW. Learn how your organization can use DocuSign and Salesforce with mobile to accelerate transactions, reduce costs, and increase security and compliance – all while providing an enhanced customer experience.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs, mobile
    
DocuSign
Published By: OpenText     Published Date: Mar 02, 2017
Whether you’re new to Electronic Data Exchange (EDI) or looking to enhance your understanding, EDI Basics is for you. This ebook explains fundamental EDI concepts in simple language to help you move away from old, manual processes to an automated supply chain.
Tags : 
edi solutions, b2b integration, edi benefits, implementation
    
OpenText
Published By: Infosys     Published Date: May 21, 2018
There are several reasons for this, including the inability of healthcare institutions to constantly monitor post-operative deterioration as well as patient's inability to visit the healthcare center for post-operation followups. Most of the patient data is recorded manually. This data is often weaned from displays of multiple monitoring devices like vitals monitor, infusion pumps, and ventilators. More often than not, these devices do not talk to each other or to a central system. Doctors, nurses, or other care-givers manually note down patient statistics in their files and notepads. Even though the healthcare industry is in the throes of digitization, there's still a lot of paper doing the rounds. eventually, the data from these physical sheets might be fed into an electronic system, but there is a high chance of error in that process.
Tags : 
digital, connected, care, patient, healthcare
    
Infosys
Published By: Infosys     Published Date: May 21, 2018
Our client offered electronic money transfer services. For years they had provided the digital links and the networks of agents that enabled people to send money quickly and easily around the world. But digital technology introduced a number of challenges to their business. Not only were pure digital payment companies threatening the agent-based model, but their business models had lower operating costs than a network of physical agents. Also, other technologies such as virtual money transfer via blockchain were being more widely adopted. In addition, industry mergers strengthened competitors, while increased protectionism began to reduce the number of migrant workers - the core customers of our client. The digital world was looking like a difficult place to operate in.
Tags : 
money, transfer, digital, technology, business
    
Infosys
Published By: IBM     Published Date: Mar 28, 2018
The global electronics industry is the cornerstone of the digital economy and the Internet of Things (IoT). Electronic devices act as conduits for users’ digital experiences, which are now seamlessly enabled and updated in the cloud. The industry’s digital device success has also introduced its latest challenge: going beyond the device. Leveraging data to drive insights is key to delivering greater value. Doing so requires electronics firms to flawlessly integrate hardware, software, services and data while learning from and adapting to users. Through Digital ReinventionTM, they can combine digital approaches and data by design to drive new capabilities, changing business from the ground up
Tags : 
    
IBM
Published By: IBM     Published Date: Mar 28, 2018
2018 Benchmarking Report
Tags : 
    
IBM
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Iron Mountain     Published Date: Aug 28, 2014
The volume of information in the healthcare industry continues to grow exponentially. Meaningful Use, ICD-10, and Accountable Care are all contributing to this data growth. Download this whitepaper to learn how your organization can develop strategies to effectively manage this information throughout its life cycle.
Tags : 
iron mountain, healthcare information, information governance, information management, healthcare it, hit, data management, electronic information, healthcare roi, business intelligence, information technology
    
Iron Mountain
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.