ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Management Research

  • 2016 State of the Connected Patient Report

    Sponsored by: Salesforce.com

    Explore the results of a survey conducted to understand how patients communicate with their healthcare providers, their opinions on telemedicine and wearable devices, and their experiences with post-discharge care.

  • ECM Software Helps Overcome Content Challenges

    Sponsored by: SearchContentManagement

    With broadened capabilities, ECM tools can capture, analyze, index, store, deliver and preserve data.

  • Distell Supports Business Growth through Improved Information Management

    Sponsored by: OpenText

    Access this case study to discover the path Distell took to overhaul its corporate information strategy to improve collaboration, governance, and productivity. Discover how the ECM software they chose enables secure file sharing in the cloud and empowers their workers with work-from-anywhere, device-agnostic content sharing capabilities.

  • Case Study: How Waitrose Enabled Easier Collaboration and Innovation

    Sponsored by: Cloud Sherpas

    This brief case study describes the strategy that allowed a retailer to share knowledge with thousands of people instantaneously. Discover how they were able to make everyday business processes more efficient, collaborate on documents to formulate ideas in real-time, and more.

  • Security Intelligence Platforms Review

    Sponsored by: IBM

    IT professionals weigh in on SIEM options and benefits in this independently conducted study from the Ponemon Institute.

  • Security School: Effective Analyze SIEM Data

    Sponsored by: SearchSecurity.com

    Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.

  • Achieve Data Governance and Quality With Information Management

    Sponsored by: Information Builders

    This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronized, consolidated, and shared vital citizen data.

  • The Emergence of Governed Discovery

    Sponsored by: Qlik

    This white paper introduces a new method of governing business intelligence: governed discovery. Access it now to learn how governed discovery can help simplify governance and promote innovation.

  • Digital Leeds

    Sponsored by: ComputerWeekly.com

    Dylan Roberts, CIO at Leeds City Council, who is directing a project on the digitisation of Leeds City Council and local government, explains his approach in this PowerPoint presentation.

  • Gartner: Digital transformation: How to survive the information crisis

    Sponsored by: ComputerWeekly.com

    It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.

  • Harnessing Business-Led IT

    Sponsored by: ComputerWeekly.com

    CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues

  • Automating Information Governance - assuring compliance

    Sponsored by: ComputerWeekly.com

    This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Information security for SMEs

    Sponsored by: ComputerWeekly.com

    In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs.

  • Optimize Patient Documentation with Enterprise Content Management

    Sponsored by: Actiance

    In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.

  • CW Europe – August 2015

    Sponsored by: ComputerWeekly.com

    This issue of CW Europe investigates the different cultural attitudes towards data management ethics.

  • CW Europe – July 2015

    Sponsored by: ComputerWeekly.com

    The economy in central and eastern Europe (CEE) is starting to recover, which means investment in IT across the region is also starting to return. This issue of CW Europe investigates how the boost in IT is changing the role of the CIO, from supporting the business to driving its growth.

  • Reduce Risk Through Information Sharing

    Sponsored by: SAS

    This white paper examines the emergence of fusion centers, or information sharing agencies. Explore the ways in which an effective strategy enables collaborative information sharing.

  • Best practice guide:What it takes to deliver a single view of the customer

    Sponsored by: IPL

    This white paper intends to provide the reader with insight into how to ease the burden of compliance, become more customer-centric, offer improved products and services and make better-informed decisions by creating a single view of your most important information. Access now and learn how to enable these benefits in your own business.

  • BYOD Compliance: Keep Mobile Data Regulation-Ready

    Sponsored by: SearchCompliance.com

    In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.

  • A new look at Vulnerability Management

    Sponsored by: TechTarget

    Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.

  • The Next Wave of Data Management : Is Big Data The New Normal?

    Sponsored by: Talend

    The following white paper reviews the business drivers that are impacting the new wave of data management, highlights the new tools companies have for consideration in their next generation data architecture, and finally outlines a total data management blueprint for consideration in your big data strategy.

  • Move Forward: Create a More Satisfying and Productive Omni-channel Experience

    Sponsored by: Hewlett Packard Enterprise

    Find out why so many are turning to the power of advanced information management and analytics (IM&A), in order to improve their understanding of consumers and deliver a seamless and more satisfying omni-channel experience.

  • Computer Weekly – 17 June 2014: The Met Office turns to open source

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out why the Met Office turned to an open source database to replace Oracle at the UK weather forecasting service. We take an in-depth look at Microsoft's SQL Server 2014 release. And we analyse the revolutionary potential of cloud computing. Read the issue now.

  • Smart Changes, Big ROI: Leading Companies Automate Their Record-to-Report Processes

    Sponsored by: IBM

    The following white paper explores the 3 big areas companies need to address in order to improve their reporting accuracy and accounting. Learn how industry innovators are using automation to gain the reporting prowess they need. Also explore technology recommendations and more.

  • Mom, Apple Pie, and the Office of Comptroller of the Currency

    Sponsored by: Iron Mountain

    Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.