You've requested...

Driving Information-led Business Innovation with IBM Information Server

If a new window did not open, click here to view this asset.

Download this next:

Top 10 information management stories of 2019

Consolidation and acquisition marked the supplier side of the IT industry in respect of information management in 2019. The question of how modern BI and analytics software shapes up to non relational big data is addressed and suggests that data integration is the enduring, difficult problem for CIOs to solve. Here are Computer Weekly’s top 10 information management stories of 2019.

These are also closely related to: "Driving Information-led Business Innovation with IBM Information Server"

  • Combine your IG and BI programs for a 1-2 punch of data value

    As the data organizations collect begins to grow, an information governance strategy becomes not only convenient, but a necessity. But IG can provide far more than merely a way to organize your data.

    Explore the myriad of benefits that a fully realized information governance program can provide your business in this expert e-guide.

    Discover how a simple records management can be bolstered and improved when put in conjunction with innovative technologies such as business analytics to increase the value and usefulness of your information governance program.

  • How to tackle information overload

    In this week’s Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the software giant wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer’s guide looks at the emerging trend of network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

    Also inside:

    • Blockchain technology allows distributed retention of encrypted data and is at the heart of cooperative cloud storage.
    • Apache Spark is growing in popularity and finding use across a range of applications on Hadoop, from online betting to rail networks..
    • We look at how OpenStack is shifting into the enterprise and explore the cultural barriers it faces.
    • Warwickshire County Council’s CIO, Tonino Ciuffini, talks about his love for the job, and how the local authority is looking to make full use of the cloud and information sharing to improve citizens’ lives.

     

Find more content like what you just read:

  • Information Risk Management – Expectations Versus Reality

    Many businesses have identified a gap between their ideas of information risk management strategies and the maturity of their implementations. Through considering the experiences of 12 security professionals, the “Information Risk Management—Expectations Versus Reality” report explores this gap. Continue reading to unlock insights.

    Download

  • Infographic: 6 information governance best practices

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

    Download

  • Big Data and Analytics Applied to Oil and Gas

    Companies that leverage data to optimise business processes will not only survive, but thrive during market downturns, and dominate the industry on the next upswing, this report from Quorum argues.

    Download

  • Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks

    Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.

    Download

  • How do cybercriminals steal credit card information?

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

    Download

  • Navigating the iPaaS Landscape: An Insightful Buyer's Guide

    This iPaaS Buyer's Guide helps you navigate the integration platform market. Learn how to identify critical features, evaluate enterprise-class capabilities, and build a business case. Download the guide to discover the right iPaaS solution for your organization.

    Download

  • How to build a risk-informed, resilient business

    Discover how to build a risk-informed, resilient business that can adapt to change and uncertainty. This e-guide explores the risks businesses face and how an effective management solution can help you seize hidden opportunities. Read the full e-guide to learn more.

    Download

  • The components and objectives of privacy engineering

    In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.

    Download

  • Google named a Visionary for Security Information and Event Management (SIEM)

    Google Security Operations was named a Visionary in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM). Participating for the first time, Google earned Visionary positioning thanks to its easy to use query interface which helps in threat hunting and rapid investigation. Download your complimentary copy.

    Download

  • Object Storage 101

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

    Download

  • Infographic: Four emerging data integration trends

    To build up an effective data and analytics architecture, enterprises should look at leveraging new approaches in data integration. In this infographic, we take a look at four emerging data technologies to consider for future data integration projects.

    Download

  • Why missing product information can be a critical error

    The frustrations of finding the right product or service across hundreds of options is a shared experience for many in any industry, but especially in B2C environments. Learn why product experience strategy is the essential first step to omni-channel CX and digital commerce domination in this webinar.

    Download

  • Unlock strategic IT investment with this comprehensive guide

    Discover how to make strategic IT investments that drive business value. This in-depth guide explores the challenges of IT portfolio management and how a strategic portfolio management approach can help you align IT with business goals, spend money more wisely, and accelerate innovation. Read the full e-book to learn more.

    Download

  • Data discovery: how to pick the right software

    In this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.

    Download

  • Cloud native security: Best practices, tools & technologies

    As more and more applications are migrated into the cloud, and organizations focus less on their own on-premises hardware, countless cloud and app security questions have arisen. This State of Cloud Native Security Report delves into the current market landscape for cloud and cloud-native security.

    Download

  • Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated

    This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.

    Download

  • UK police unlawfully processing over a million people's data on Microsoft 365

    The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.

    Download

  • Share your tech purchasing decisions for 2024

    TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

    Download

  • Overview of Office 365

    This exclusive webcast details the key features of Microsoft Office 365 and will help you work through the implementation process.

    Download

  • Information technology skills guide

    Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.

    Download

  • Improve customer experience with good customer data

    Learn how you can build customer loyalty and improve customer experiences via quality and effective customer data collection and analysis. In addition, tap into how companies like 7-Eleven, Walgreens, and Mazda are improving customer journeys by enabling mobile loyalty programs.

    Download

  • Informational Brief: The anatomy of an AI-driven organization

    Today, AI is changing the data and analytics game. That’s why IDC recently set out to understand the characteristics of organizations that are making the most of AI-driven decisioning and the outcomes they are achieving. Download this analyst report to discover key trends in leadership and decision making in the era of generative AI.

    Download

  • CW APAC, February 2021: Buyer’s guide to data management

    In this handbook, focused on data management in the Asia-Pacific region, Computer Weekly looks at best practices, Alibaba’s use of databases, the role of artificial intelligence in handling information and data trends to look out for

    Download

  • PEX Network Webinar

    Watch this short video and learn how AI can help drive business application intelligence, deliver business information reliably and responsibly, anticipate and automate computer systems' capabilities, improve the user experience, do predictive analytics, and get insights into solving new types of problems.

    Download

  • Share your tech purchasing decisions for 2024

    TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

    Download

  • Unlock integrated intelligence with knowledge graphs & LLMs

    In this blog post, you'll discover how large language models and knowledge graphs can revolutionize data intelligence and search capabilities. Inside, you'll learn about their integration and the potential benefits it brings to enterprises. Read the full blog post now to explore this powerful combination.

    Download

  • Discover 4 ways to boost innovation with RISE with SAP

    Discover four key technologies to enhance your SAP Cloud migration with RISE with SAP: SAP Signavio, SAP Business Technology Platform, Green Ledger, and Joule AI. These tools can transform processes, elevate decision-making, and promote sustainability. Access the e-book for optimal RISE with SAP migration strategies.

    Download

  • Share your tech purchasing decisions for 2024

    TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

    Download

  • Geospatial intelligence on the move

    By having access to a centralised geographic information system (GIS), valuable context can be added to an organisation's existing data assets which can be accessed by any mobile worker, including the field force.

    Download

  • Smarter, connected meeting spaces

    This report from analyst group Quocirca explains how to use smart technology to make meetings more effective.

    Download

  • Security is an investment you can’t afford not to make

    Security is an investment you can’t afford not to make. In this Total Economic Impact study, Forrester Consulting defines the value derived from implementing Umbrella SIG / SSE and constructs a detailed cost-benefit analysis to help quantify benefits and inform security investment decisions. Discover how to get the most out of your security budget.

    Download

  • Share your tech purchasing decisions for 2024

    TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

    Download

  • CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital

    Heineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.

    Download

  • A Computer Weekly buyer's guide to blockchain technology

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

    Download

  • False cents of security: The price of being compromised

    Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.

    Download

  • Computer Weekly – 30 April 2024: What's it like being the IT chief at Man Utd?

    In this week's Computer Weekly, we speak to the chief digital information officer of Manchester United Football Club to discuss the IT that keeps a premiership team running. We also investigate how well prepared the UK is for major semiconductor supply chain disruptions. Read the issue now.

    Download

  • Data protection, a live issue that affects us all

    Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.

    Download

  • Computer Weekly – 4 July 2023: How data is beating heart disease

    In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.

    Download

  • Government insists 'nothing sinister' about web user data gathering

    Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.

    Download

  • GDPR: Risk, opportunity and what it means for security professionals

    This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.

    Download

  • Navigating the impact of GenAI on security: A CISO's guide

    This guide explores how generative AI can impact security and the evolving role of the CISO. It covers key use cases, benefits, and risks that CISOs should consider when implementing generative AI. Read the full guide to learn how to navigate the security implications of this transformative technology.

    Download

  • The state of email security

    Email is notoriously susceptible to attacks, making email security a continuing necessity for organizations. In order to make sense of a crowded and complex market, this Omnia Universe report breaks down the most important information about the landscape as a whole, as well as leading vendors. Read on to learn more.

    Download

  • Decentralising datacentres: The new challenges of security at the edge

    In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

    Download

  • Digital Operational Resilience Act: Quick guide & checklist

    In this white paper, discover a 25-point checklist for adopting the Digital Operational Resilience Act (DORA).

    Download

  • Unlock the full potential of your data with advanced analytics

    In this webcast, you’ll hear from industry experts as they break down the variety of technological, regulatory, and market factors that are driving innovation and change within Best Execution Analytics. Tune in to learn how you can leverage customized analytics and robust dashboards unlock the full potential of market data for your business.

    Download

  • The key to saving time during your auditing processes

    When working through an audit, manual processes can be tricky, time-consuming, and overwhelming. This was the case for Southwest Airlines, who sought out an innovative way that they could consolidate their information and automate their auditing operations. Tune into this video to learn more.

    Download

  • 8 secure file transfer services for the enterprise

    Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.

    Download