ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Standards White Papers

  • Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.

  • IT Priorities 2021 - European Topics Infographic

    Sponsored by: TechTarget ComputerWeekly.com

    This year, a survey was conducted quizzing nearly 500 European IT sector professionals to gather what topics they identified as being imperative for 2021. In this infographic see whether remote working is here to stay, if there will be shifts in information management trends and what infrastructure tools will be deployed by most in 2021.

  • IT Priorities 2021 - European Topics Infographic

    Sponsored by: TechTarget ComputerWeekly.com

    This year, a survey was conducted quizzing nearly 500 European IT sector professionals to gather what topics they identified as being imperative for 2021. In this infographic see whether remote working is here to stay, if there will be shifts in information management trends and what infrastructure tools will be deployed by most in 2021.

  • How To Successfully Achieve Records Management Compliance and Strategy

    Sponsored by: Iron Mountain

    The following e-guide, created by the experts at SearchCompliance.com, offers advice and tips on navigating the records management landscape as well as how to best assure records management compliance. Read on to learn more.

  • Important Versus Vital Records: The Magic 5% You Can't Live Without

    Sponsored by: Iron Mountain

    Consult the following white paper to learn the steps it takes to properly identify and protect your vital records. Also gain a deeper understanding of the risks associated with inadequate preservation, how to evaluate storage options, and more.

  • Important Versus Vital Records: The Magic 5% You Can't Live Without

    Sponsored by: Iron Mountain

    Consult the following white paper to learn the steps it takes to properly identify and protect your vital records. Also gain a deeper understanding of the risks associated with inadequate preservation, how to evaluate storage options, and more.

  • Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets

    Sponsored by: Iron Mountain

    Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.

  • Skills Forecast: Big Data Analytics

    Sponsored by: TechTarget ComputerWeekly.com

    This report analyses the projected demand for IT professionals with Big Data Analytic skills in the UK over the next five years.

  • Cybersecurity Information Sharing: Establishing New Protocols

    Sponsored by: BMC Software, Inc.

    This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.

  • Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures

    Sponsored by: Sybase, an SAP company

    Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk!

  • 15 Minute Guide To Case Management

    Sponsored by: EMC Corporation

    In 15 minutes we'll discuss case management, explain why it's important, suggest how it enables connected government, touch on how it can be applied across a variety of case types, discuss the components of a case management solution, and offer deployment guides and suggestions.

  • Information Governance Perspectives from RSD: E-mail Archiving

    Sponsored by: RSD

    With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.