Business of Information Technology  >   Business Management  >   Information Management  >   Classification (Information Management)  >  

Controlled Vocabularies

RSS Feed    Add to Google    Add to My Yahoo!
Controlled VocabulariesReports
 
Manage structured data with intelligent archiving
sponsored by Hewlett-Packard Company
BROCHURE: Find out how HP Structured Data Manager can help organizations gain control of structured application and database data.
Posted: 21 Sep 2014 | Published: 19 Feb 2014

Hewlett-Packard Company

Streamline eDiscovery
sponsored by Hewlett-Packard Company
BROCHURE: Discover how HP eDiscovery can perform the complete range of eDiscovery steps, from collection through production.
Posted: 21 Sep 2014 | Published: 05 Dec 2013

Hewlett-Packard Company

Addressing Information Governance Challenges
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this white paper to find out key problems with current information governance practices and what organizations can do to address the flaws in them.
Posted: 25 Aug 2014 | Published: 31 Mar 2014

Hewlett-Packard Company

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

CW Europe – October 2014 Edition
sponsored by ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

Information security for SMEs
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs.
Posted: 23 May 2014 | Published: 23 May 2014

ComputerWeekly.com

Build the Future: The Era of the Dynamic Data Center
sponsored by CA Technologies.
WHITE PAPER: Access this brief paper that explains why IT departments must take on the role of system integrator in organizations today. Learn how to foster greater collaboration between tech teams managing data center resources to meet increasingly stringent and time-critical business demands.
Posted: 24 Sep 2014 | Published: 31 Dec 2013

CA Technologies.

On-Demand Webinar: Connecting the Internet of Things
sponsored by Red Hat
WEBCAST: The Internet of Things is exploding in size, measuring, collecting, analyzing, monitoring, and sharing useful information. View this webinar now to find out how information can be integrated into existing enterprise systems and analyzed to make smarter decisions and build more effective solutions.
Posted: 06 Oct 2014 | Premiered: Oct 6, 2014

Red Hat

Are You Ready for Real-Time Information?
sponsored by Hitachi Data Systems
WHITE PAPER: Enterprises today have a special appetite for real-time data to enable better decision making - and it's no long a luxury, but an expectation.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Hitachi Data Systems

Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement