transfer

Results 176 - 196 of 196Sort Results By: Published Date | Title | Company Name
Published By: Citrix Online     Published Date: Apr 06, 2009
Today, stakeholders and projects pepper the globe. Successfully navigating the project lifecycle - from risk management and estimating to managing scope and facilitating knowledge transfer - now requires a different recipe.
Tags : 
citrix, project management, project lifecycle, risk management, managing scope, risk, collaboration, projects, stakeholders, virtual collaboration, risk analysis, dashboard, collaboration, saas, virtual, project management
    
Citrix Online
Published By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : 
backup infrastructure, legacy systems, overload infrastructure, cloud, it management, knowledge management, data management
    
Arcserve
Published By: Signiant     Published Date: Oct 15, 2010
There is more content than ever and many new ways to consume that content - thus the complexity of managing the flow of that content throughout the supply chain - from creation to the consumer.
Tags : 
signiant, file transfer software, digital distribution, content management
    
Signiant
Published By: File Transfer Consulting     Published Date: Jun 07, 2011
Examines IPv6 issues specific to file transfer applications, then tests 14 applications for readiness.
Tags : 
ipv6, managed file transfer, mft, file transfer, interoperability, compatibility
    
File Transfer Consulting
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper illustrates how, by using YouSendit and replacing FTP, Cisco has dramatically cut video administration costs by 90%. The Flip video file delivery process for Cisco Networking Academy's global operations is now much simpler, less costly and more efficient.
Tags : 
cisco networking academy, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: Western Union Business Solutions     Published Date: Jul 26, 2011
In an increasingly interconnected global economy, an effective cash flow management strategy can provide an essential foundation for your company's success in foreign markets.
Tags : 
money transfer, transfer money, send money, western union money transfer, online money transfer, bill payment, bill payment services, western union prepaid card, prepaid credit card, gift cards, buy gift cards, custom gift cards, personalized gift cards
    
Western Union Business Solutions
Published By: Attachmate     Published Date: Jul 09, 2013
Is your file transfer system keeping up with growing trading-partner requirements? Can it accommodate multiple platforms, protocols, and security standards? Can it successfully deliver large files, to the right person, on time? If uncertainty is part of your daily routine, you need to see this video.
Tags : 
download ftp program, secure ftp, secure large file transfer, managed file transfer, ftp automation, managed ftp reflection ftp client, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, storage
    
Attachmate
Published By: IBM     Published Date: Apr 22, 2014
Read this ebook from Aberdeen to learn why leading organizations are moving away from the chaos of multiple methods to a single managed file transfer platform, and get best practices for developing a secure, best-in-class file transfer process of your own. 
Tags : 
ibm, file transfer, mft, ftp, managed file transfer, mature file transfer process, mft platform, content management
    
IBM
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : 
clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla, ha cluster, high availability, load balancer, mission-critical transfers, active/passive, edi, it management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files, the right managed file transfer (MFT) solution can allow such transfers to continue without risking the security of the corporate network. The paper explains that the right MFT solution can enable business growth, enhance operational efficiency, enable compliance, reduce costs, and increase ROI. Choosing the right MFT solution requires eight considerations described in the paper, and concludes by explaining why Globalscape solutions are the choice of our customers around the world.
Tags : 
it management, data management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, it management, data management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too!
Tags : 
file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, it management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
Find out the answer and as well as the other deployment options.
Tags : 
globalscape, saas, managed file transfer, mft, deployment, deployment model, security, automation, mft solutions, file sharing, software development, it management, data management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft, it management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb, multi-zone architecture, dmz, it management
    
Globalscape
Published By: Salesforce     Published Date: Nov 19, 2015
Over the next 50 years, more than $41 trillion in assets will be transferred from one generation to another. The non-profit Center on Wealth and Philanthropy sets the bar even higher--$58.1 trillion by 2061. Whatever the final figure, the generational shift of wealth represents an extraordinary opportunity for financial advisers.
Tags : 
    
Salesforce
Published By: Salesforce     Published Date: Nov 19, 2015
In the next five years, more than $2 trillion is expected to transfer between generations. To capitalize on this massive redistribution of wealth, today’s financial advisors need to meet the demands of today’s clients who are social, mobile, more connected, better informed and looking to collaborate with their advisors when they want, where they want.
Tags : 
salesforce, financial services, cloud, mobile, data, data center
    
Salesforce
Published By: Forcepoint     Published Date: May 03, 2016
Quanto mais tempo os atacantes permanecerem em sua rede, mais movimento lateral é possível e maior o risco de furto de dados. Parar a exfiltração de dados, em vez de tentar impedir as violações de dados, é a abordagem mais realista para a segurança de dados e a redução do tempo do comprometimento à reparação de ameaças.
Tags : 
    
Forcepoint
Published By: IBM     Published Date: Mar 30, 2017
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as extract, transfer and load (ETL), data replication or data virtualization.
Tags : 
data integration, data security, data optimization, data virtualization, database security
    
IBM
Published By: Domino     Published Date: Apr 06, 2018
Domino provides a broad portfolio of innovative industrial coding and marking solutions developed in collaboration with customers in food and beverage, life sciences, manufacturing and other industries. Beyond delivering the latest printing technologies and Industry 4.0 connectivity, Domino brings four decades of knowledge and expertise to help companies maximize productivity and OEE with agility to meet the changing needs of today’s fast-paced world. Domino is more than a mark. Domino printing technologies include thermal transfer overprinting, thermal ink jet, continuous ink jet, print-and-apply labeling, large character inkjet and laser.
Tags : 
domino, food, beverage, manufacturing, customers
    
Domino
Published By: Fujitsu America, Inc.     Published Date: Jan 21, 2019
Over the last 15-20 years, educational researchers have studied the impact of online environments, technology in classrooms, and applications that support teachers. The transfer of knowledge in online environments (Merges 2011) sets a framework that could be applied to research in AR & VR as collaborative environments become available. Electronic environments offering a shared portal for multiple users afford teachers and researchers the opportunity to study group work among students. To find out how Fujitsu could help enhance your AR & VR solutions download this whitepaper today. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.