ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Management Research

  • Leading the Data-Driven Transformation: The CIO & The New Age of Data Quality

    Sponsored by: Trillium Software

    Discover the top 6 challenges modern CIOs face, and explore how to leverage data quality to propel CIO success. Learn the best practices for sustainable information management strategies, allowing your CIOs to transform your business models through data-driven digitization.

  • Crafting a Data Lifecycle Management Strategy to Control Capacity

    Sponsored by: Iron Mountain

    Jon Toigo, Chairman of the Data Management Institute, explains how information lifecycle management (ILM) strategies can help classify data and control capacity by allocating it to the appropriate storage. Discover how recent improvements in ILM can enable your enterprise to truly benefit from implementing this strategy.

  • Leading the Data-Driven Transformation: The CIO & The New Age of Data Quality

    Sponsored by: Trillium Software

    Discover the top 6 challenges modern CIOs face, and explore how to leverage data quality to propel CIO success. Learn the best practices for sustainable information management strategies, allowing your CIOs to transform your business models through data-driven digitization.

  • Put Your Business Content to Work

    Sponsored by: IBM

    In this comprehensive resource hub, access 13 guides that will enable you to discover how to extract the most value from your business content and how to make it work for you. Learn about content engagement, data and information governance, sales transformation, and much more.

  • Pushing the Start Button on Information Lifecycle Governance

    Sponsored by: IBM

    Strong information governance ensures that big data remains an advantage for your company. It is important to realize that information governance improvement has to come slowly, in steps instead of strides. Read on to gauge your company's information governance maturity and how to set realistic goals.

  • Disposing of Digital Debris: Information Governance Strategy and Practice in Action

    Sponsored by: IBM

    No one intentionally creates digital debris. We create content and imbue it with value. But how do you remove digital debris without losing valuable content? Learn about enhanced Information Governance (IG) best practices to reduce your data footprint as we walk you through two IG models that can help you implement an effective IG program.

  • Information Lifecycle Governance Maturity Assessment

    Sponsored by: IBM

    Increasing storage and maintenance costs, duplication of resources, the lack of trusted content, and exposure to risks and litigation are problems plaguing many enterprises today. So why are companies holding on to every bit of data? Take this assessment to determine your level of information governance maturity and see how much more you can grow.

  • 2016 State of the Connected Patient Report

    Sponsored by: Salesforce.com

    Explore the results of a survey conducted to understand how patients communicate with their healthcare providers, their opinions on telemedicine and wearable devices, and their experiences with post-discharge care.

  • ECM Software Helps Overcome Content Challenges

    Sponsored by: SearchContentManagement

    ECM software, once limited to document management, has broadened its applications to include records management, web content management, workflow and collaboration. Learn how to evaluate ECM software to see which ones belong in your enterprise information toolkit.

  • Distell Supports Business Growth through Improved Information Management

    Sponsored by: OpenText

    Access this case study to discover the path Distell took to overhaul its corporate information strategy to improve collaboration, governance, and productivity. Discover how the ECM software they chose enables secure file sharing in the cloud and empowers their workers with work-from-anywhere, device-agnostic content sharing capabilities.

  • Cost Savings and Business Benefits Enabled by InfoSphere Information Server

    Sponsored by: IBM

    In this Forrester report, examine the potential ROI your enterprise can realize by deploying InfoSphere Information Server as part of your overall information architecture integration strategy. Learn how it can improve access to trusted information to create deeper insights and foster smarter decision-making.

  • Case Study: How Waitrose Enabled Easier Collaboration and Innovation

    Sponsored by: Cloud Sherpas

    This brief case study describes the strategy that allowed a retailer to share knowledge with thousands of people instantaneously. Discover how they were able to make everyday business processes more efficient, collaborate on documents to formulate ideas in real-time, and more.

  • Security Intelligence Platforms Review

    Sponsored by: IBM

    IT professionals weigh in on SIEM options and benefits in this independently conducted study from the Ponemon Institute.

  • Security School: Effective Analyze SIEM Data

    Sponsored by: SearchSecurity.com

    Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.

  • Achieve Data Governance and Quality With Information Management

    Sponsored by: Information Builders

    This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronized, consolidated, and shared vital citizen data.

  • Digital Leeds

    Sponsored by: ComputerWeekly.com

    Dylan Roberts, CIO at Leeds City Council, who is directing a project on the digitisation of Leeds City Council and local government, explains his approach in this PowerPoint presentation.

  • Gartner: Digital transformation: How to survive the information crisis

    Sponsored by: ComputerWeekly.com

    It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.

  • Harnessing Business-Led IT

    Sponsored by: ComputerWeekly.com

    CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues

  • Optimize Patient Documentation with Enterprise Content Management

    Sponsored by: Actiance

    In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.

  • CW Europe – August 2015

    Sponsored by: ComputerWeekly.com

    This issue of CW Europe investigates the different cultural attitudes towards data management ethics.

  • CW Europe – July 2015

    Sponsored by: ComputerWeekly.com

    The economy in central and eastern Europe (CEE) is starting to recover, which means investment in IT across the region is also starting to return. This issue of CW Europe investigates how the boost in IT is changing the role of the CIO, from supporting the business to driving its growth.

  • Reduce Risk Through Information Sharing

    Sponsored by: SAS

    This white paper examines the emergence of fusion centers, or information sharing agencies. Explore the ways in which an effective strategy enables collaborative information sharing.

  • Best practice guide:What it takes to deliver a single view of the customer

    Sponsored by: IPL

    This white paper intends to provide the reader with insight into how to ease the burden of compliance, become more customer-centric, offer improved products and services and make better-informed decisions by creating a single view of your most important information. Access now and learn how to enable these benefits in your own business.

  • BYOD Compliance: Keep Mobile Data Regulation-Ready

    Sponsored by: SearchCompliance.com

    In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.

  • A new look at Vulnerability Management

    Sponsored by: TechTarget

    Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.