ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Standards Research

  • Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.

  • IT Priorities 2021 - European Topics Infographic

    Sponsored by: TechTarget ComputerWeekly.com

    This year, a survey was conducted quizzing nearly 500 European IT sector professionals to gather what topics they identified as being imperative for 2021. In this infographic see whether remote working is here to stay, if there will be shifts in information management trends and what infrastructure tools will be deployed by most in 2021.

  • IT Priorities 2021 - European Topics Infographic

    Sponsored by: TechTarget ComputerWeekly.com

    This year, a survey was conducted quizzing nearly 500 European IT sector professionals to gather what topics they identified as being imperative for 2021. In this infographic see whether remote working is here to stay, if there will be shifts in information management trends and what infrastructure tools will be deployed by most in 2021.

  • How To Successfully Achieve Records Management Compliance and Strategy

    Sponsored by: Iron Mountain

    The following e-guide, created by the experts at SearchCompliance.com, offers advice and tips on navigating the records management landscape as well as how to best assure records management compliance. Read on to learn more.

  • Important Versus Vital Records: The Magic 5% You Can't Live Without

    Sponsored by: Iron Mountain

    Consult the following white paper to learn the steps it takes to properly identify and protect your vital records. Also gain a deeper understanding of the risks associated with inadequate preservation, how to evaluate storage options, and more.

  • Important Versus Vital Records: The Magic 5% You Can't Live Without

    Sponsored by: Iron Mountain

    Consult the following white paper to learn the steps it takes to properly identify and protect your vital records. Also gain a deeper understanding of the risks associated with inadequate preservation, how to evaluate storage options, and more.

  • Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets

    Sponsored by: Iron Mountain

    Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.

  • Skills Forecast: Big Data Analytics

    Sponsored by: TechTarget ComputerWeekly.com

    This report analyses the projected demand for IT professionals with Big Data Analytic skills in the UK over the next five years.

  • Cybersecurity Information Sharing: Establishing New Protocols

    Sponsored by: BMC Software, Inc.

    This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.

  • Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures

    Sponsored by: Sybase, an SAP company

    Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk!

  • IBM Information On Demand Virtual 2010

    Sponsored by: IBM

    Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.

  • 15 Minute Guide To Case Management

    Sponsored by: EMC Corporation

    In 15 minutes we'll discuss case management, explain why it's important, suggest how it enables connected government, touch on how it can be applied across a variety of case types, discuss the components of a case management solution, and offer deployment guides and suggestions.

  • Information Governance Perspectives from RSD: E-mail Archiving

    Sponsored by: RSD

    With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions

  • IBM Rational Asset Manager e-Kit

    Sponsored by: IBM

    Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.