ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Governance White Papers

  • Computer Weekly – 12 November 2024: Innovating with weather data at the Met Office

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the Met Office is using its vast stores of weather data to create innovative new products. Our latest buyer's guide looks into identity and access management systems. And we examine the geopolitical threats that could curb the openness of open source. Read the issue now.

  • Computer Weekly – 18 June 2024: General election 2024 – the digital policies examined

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the digital policies revealed in the three main political parties' general election manifestos. Our new buyer's guide looks at the latest trends in cloud security. And we find out about the EU's plans for a digital single market that could span the globe. Read the issue now.

  • Computer Weekly – 18 July 2023: Soaring ahead with data at Rolls-Royce

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how aerospace giant Rolls-Royce uses data to improve its competitive advantage. We examine the benefits and best practices in software-defined storage. And we analyse calls for a review of laws around the use of computer evidence prompted by the Post Office IT scandal. Read the issue now.

  • 8 electronic signature best practices to build in to your workflow

    Sponsored by: TechTarget ComputerWeekly.com

    Here are 8 tips to think about when creating an e-signing process include cataloging documents requiring signatures, building user stories and determining necessary software features.

  • Traditional vs. enterprise risk management: How do they differ?

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.

  • Data classification tools: What they do and who makes them

    Sponsored by: TechTarget ComputerWeekly.com

    Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.

  • 10 data lake uses for enterprises

    Sponsored by: TechTarget ComputerWeekly.com

    Data lakes have become an essential tool for the modern data management platform. They provide a scalable and cost-effective platform for storing and managing large volumes of data, and they support real-time data analysis and processing. This infographic highlights ten cases in which data lakes are critical for modern data management.

  • What's all this talk about data mesh?

    Sponsored by: TechTarget ComputerWeekly.com

    Data mesh is a new approach aims to make data more accessible, usable and valuable to the organization by creating a more flexible, scalable and collaborative data architecture. In this article, we point out some of the benefits and challenges of data mesh, and how to set up the right culture and infrastructure to make the most of this approach.

  • CW EMEA - January 2023: Protecting the privacy of schoolchildren

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.

  • Fail to prepare quality data, prepare to fail

    Sponsored by: TechTarget ComputerWeekly.com

    Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".

  • 6 data preparation best practices for analytics applications

    Sponsored by: TechTarget ComputerWeekly.com

    Amid issues of data sources, data silos and data quality, the process of collecting and prepping data for analytics applications requires a practical and effective approach. In this infographic, we put together 6 data preparation best practices for analytics applications to help enterprises master their data.

  • 10 steps to building a data catalog

    Sponsored by: TechTarget ComputerWeekly.com

    Building a data catalog is an important initiative for many IT and data management teams. But organizations shouldn't undertake a data catalog project without getting input from business users. In this e-guide, learn why data catalogs have become a core component of the data management environment, and the 10 steps to build a data catalog.

  • 5 steps for a smooth ECM implementation

    Sponsored by: TechTarget ComputerWeekly.com

    Before implementing Enterprise Content Management, it's important for organizations to develop an ECM roadmap or strategy to identify the top priorities and get clarity on the necessary procedures and technologies it entails. This infographic outlines the steps to successfully implement an ECM system.

  • Data governance for all seasons and reasons

    Sponsored by: TechTarget ComputerWeekly.com

    To promote business buy-in and avoid resistance to governance policies, programs should be business-driven, with data owners involved and the data governance committee making the decisions on standards, policies and rules. This infographic highlights some of the best practices for implementing and managing data governance programs.

  • The Ultimate Guide to Enterprise Content Management

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.

  • Infographic: DevOps vs. DataOps

    Sponsored by: TechTarget ComputerWeekly.com

    DevOps is a collaboration between the application development and IT operations teams. The emphasis of this approach is communication and cooperation, and it has bled into data operations in a process called DataOps. In this infographic, we explore the main differences between these two concepts and the benefits and challenges of each one of them.

  • Infographic: 6 information governance best practices

    Sponsored by: TechTarget ComputerWeekly.com

    Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.

  • Infographic: 6 file transfer best practices

    Sponsored by: TechTarget ComputerWeekly.com

    File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.

  • Top 5 digital transformation trends in 2022

    Sponsored by: TechTarget ComputerWeekly.com

    As organizations move out of crisis mode, CIOs are rethinking their digital transformation strategies. Here are five key areas CIOs are focusing on as we move out of crisis mode and into the future, with Intelligent search, CDPs, AIOps, DevOps/Agile/ITSM claiming the spotlight.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Big data vs. Machine learning: How do they compare?

    Sponsored by: TechTarget ComputerWeekly.com

    Data is at the heart of every modern enterprise. As more companies master the big data management process, forward-thinking ones are applying intelligent forms of analytics to extract more value from the data in their systems. In this infographic, we take a lot into the concepts of big data and machine learning, how they differ and how they relate.

  • Computer Weekly - 22 March 2022: One year on from IR35 reforms - why IT skills are harder to find

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a year after IR35 tax reforms were introduced, we assess the impact on the UK's IT talent pool – and it's not looking good. We examine the rise of industry clouds, and how they are changing the market. And we find out how London councils plan to work together on data and innovation. Read the issue now.

  • Infographic: Top big data trends in 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Big data is driving changes in how organizations process, store and analyze data. The benefits are spurring even more innovation. In this infographic, we take a look at four major trends in big data for 2022.

  • Infographic: Four emerging data integration trends

    Sponsored by: TechTarget ComputerWeekly.com

    To build up an effective data and analytics architecture, enterprises should look at leveraging new approaches in data integration. In this infographic, we take a look at four emerging data technologies to consider for future data integration projects.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.