ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Management Research

  • Reach New Performance Heights with Cloud Data Warehousing:

    Sponsored by: IBM

    Discover a high performance cloud data warehouse service that enables simple and fast information management, analytics, and business intelligence operations in the cloud. With this solution, your enterprise can store, manipulate, and analyze data without the added complexity of network cluster maintenance and database management.

  • The Data Reservoir Landscape and IBM DB2 Analytics Accelerator

    Sponsored by: IBM

    The data reservior is designed as a solution architecture meant to yield insight into data and analytics. Read on to learn about this technology and how several deployments options will benefit your organization.

  • Best Practices for Archiving Data in ECM Tools

    Sponsored by: Axway

    Companies are excited about capturing content to enable business processes but some are failing to address long-term data preservation. Learn the business impacts and ECM ramifications of not archiving data, and best practices for capturing and preserving information as part of your ECM strategy.

  • Infographic: What's Happening with your Data Now?

    Sponsored by: Proofpoint, Inc.

    This infographic contains important stats about enterprise archiving trends and shows how a highly automated archiving system can help to reduce cost, mitigate risk, and deliver value.

  • ECM Software Helps Overcome Content Challenges

    Sponsored by: SearchContentManagement

    With broadened capabilities, ECM tools can capture, analyze, index, store, deliver and preserve data.

  • Risk or Reward? UC, IM, and Social Media in the Pharmaceutical Industry

    Sponsored by: Actiance

    For pharmaceutical companies, the reward from social channels is high, but they must mitigate the risk in order to make it worth using. Learn how to capture and archive all content from social channels to stay in line with corporate governance and regulatory requirements.

  • Compliance Beyond Email: Navigating the Complexities within Healthcare

    Sponsored by: Actiance

    This white paper explores how you can provide doctors and patients diverse communications coupled with strong compliance and data protection. Uncover 5 ways to mitigate legal and security risks in your healthcare organization.

  • Distell Supports Business Growth through Improved Information Management

    Sponsored by: OpenText

    Access this case study to discover the path Distell took to overhaul its corporate information strategy to improve collaboration, governance, and productivity. Discover how the ECM software they chose enables secure file sharing in the cloud and empowers their workers with work-from-anywhere, device-agnostic content sharing capabilities.

  • Optimize Patient Documentation with Enterprise Content Management

    Sponsored by: Actiance

    In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.

  • Cost Savings and Business Benefits Enabled by InfoSphere Information Server

    Sponsored by: IBM

    In this Forrester report, examine the potential ROI your enterprise can realize by deploying InfoSphere Information Server as part of your overall information architecture integration strategy. Learn how it can improve access to trusted information to create deeper insights and foster smarter decision-making.

  • Case Study: How Waitrose Enabled Easier Collaboration and Innovation

    Sponsored by: Cloud Sherpas

    This brief case study describes the strategy that allowed a retailer to share knowledge with thousands of people instantaneously. Discover how they were able to make everyday business processes more efficient, collaborate on documents to formulate ideas in real-time, and more.

  • Security Intelligence Platforms Review

    Sponsored by: IBM

    In this independently conducted study from Ponemon Institute, learn what 25 IT and IT security practitioners had to say about one security information and event management option.

  • Security School: Effective Analyze SIEM Data

    Sponsored by: SearchSecurity.com

    Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.

  • Achieve Data Governance and Quality With Information Management

    Sponsored by: Information Builders

    This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronized, consolidated, and shared vital citizen data.

  • The Emergence of Governed Discovery

    Sponsored by: Qlik

    This white paper introduces a new method of governing business intelligence: governed discovery. Access it now to learn how governed discovery can help simplify governance and promote innovation.

  • Digital Leeds

    Sponsored by: ComputerWeekly.com

    Dylan Roberts, CIO at Leeds City Council, who is directing a project on the digitisation of Leeds City Council and local government, explains his approach in this PowerPoint presentation.

  • Gartner: Digital transformation: How to survive the information crisis

    Sponsored by: ComputerWeekly.com

    It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.

  • Harnessing Business-Led IT

    Sponsored by: ComputerWeekly.com

    CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues

  • CW Europe – August 2015

    Sponsored by: ComputerWeekly.com

    This issue of CW Europe investigates the different cultural attitudes towards data management ethics.

  • CW Europe – July 2015

    Sponsored by: ComputerWeekly.com

    The economy in central and eastern Europe (CEE) is starting to recover, which means investment in IT across the region is also starting to return. This issue of CW Europe investigates how the boost in IT is changing the role of the CIO, from supporting the business to driving its growth.

  • Reduce Risk Through Information Sharing

    Sponsored by: SAS

    This white paper examines the emergence of fusion centers, or information sharing agencies. Explore the ways in which an effective strategy enables collaborative information sharing.

  • Best practice guide:What it takes to deliver a single view of the customer

    Sponsored by: IPL

    This white paper intends to provide the reader with insight into how to ease the burden of compliance, become more customer-centric, offer improved products and services and make better-informed decisions by creating a single view of your most important information. Access now and learn how to enable these benefits in your own business.

  • BYOD Compliance: Keep Mobile Data Regulation-Ready

    Sponsored by: SearchCompliance.com

    In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.

  • A new look at Vulnerability Management

    Sponsored by: TechTarget

    Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.

  • The Next Wave of Data Management : Is Big Data The New Normal?

    Sponsored by: Talend

    The following white paper reviews the business drivers that are impacting the new wave of data management, highlights the new tools companies have for consideration in their next generation data architecture, and finally outlines a total data management blueprint for consideration in your big data strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.