Business of Information Technology  >   Business Management  >   Information Management  >   Classification (Information Management)  >  

Controlled Vocabularies

RSS Feed    Add to Google    Add to My Yahoo!
Controlled Vocabularies Reports
 
Delivering Value-Based Healthcare: Episodes of Care Analytics for Providers, Payers, and ACOs
sponsored by SAS
RESEARCH CONTENT: In this interview with J. Peter Chingos, a Senior Industry Consultant of Health Analytics Practice, you will discover the benefits EOC analytics provides, as well as the challenges associated with implementation. Read on now to answer your burning questions about EOC and learn how EOC is enabling more predictive analytics.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SAS

The Strategic Execution Framework: Part 1
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from IPS explains how businesses can use the Strategic Execution Framework to help their companies stay on track and align projects to desired business outcomes.
Posted: 17 Dec 2015 | Published: 17 Dec 2015

ComputerWeekly.com

Leading the Data-Driven Transformation: The CIO & The New Age of Data Quality
sponsored by Trillium Software
WHITE PAPER: Discover the top 6 challenges modern CIOs face, and explore how to leverage data quality to propel CIO success. Learn the best practices for sustainable information management strategies, allowing your CIOs to transform your business models through data-driven digitization.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

Trillium Software

Stronger Business Insights for Finance Leaders
sponsored by IBM
VIDEO: This brief video considers one system that sheds light business performance metrics, with particular focus on analytics and business intelligence. Watch now to see if a system like this can help your senior executives steer your business down the right path.
Posted: 16 Dec 2015 | Premiered: 16 Dec 2015

IBM

Web Intelligence to the Rescue
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll discover what SAP BusinessObjects and Web Intelligence can deliver. When it comes to accessing large amounts of data and then creating customized and sophisticated analytical reports, you'll see why Web Intelligence is a wise choice.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

Global Knowledge

Information Lifecycle Governance Maturity Assessment
sponsored by IBM
RESOURCE: Increasing storage and maintenance costs, duplication of resources, the lack of trusted content, and exposure to risks and litigation are problems plaguing many enterprises today. So why are companies holding on to every bit of data? Take this assessment to determine your level of information governance maturity and see how much more you can grow.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

IBM

Key trends for IT leaders in 2016 Part I
sponsored by ComputerWeekly.com
EBOOK: Albert Ellis, CEO of recruitment company Harvey Nash Group, considers the key skill, careers and recruitment trends for 2016 in this PowerPoint presentation.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

ComputerWeekly.com

Using ERP for Process Manufacturing Quality Management
sponsored by IFS
WHITE PAPER: In this informative white paper learn how to use ERP for process manufacturing quality management to streamline and simplify your business processes.
Posted: 23 Feb 2015 | Published: 31 Dec 2013

IFS

Integrated Business Management to Match Your Organization's Needs
sponsored by Sage Software
WHITE PAPER: Whether you operate locally or internationally, it's time to integrate your business management infrastructure across the enterprise. Discover unified efficiency that adapts to your ever-changing objectives.
Posted: 13 May 2016 | Published: 13 May 2016

Sage Software

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014

TechTarget
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement