Business of Information Technology  >   Business Management  >  

IM (Information Management)

RSS Feed    Add to Google    Add to My Yahoo!
IM (Information Management) Reports
BYOD Compliance: Keep Mobile Data Regulation-Ready
sponsored by
EBOOK: In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Contemporary Digital Information Assets Require New Look At Governance
sponsored by IntraLinks, Inc
EGUIDE: To protect and manage constantly evolving digital information assets, modern companies must reexamine data governance and classification.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

IntraLinks, Inc

Information Governance Symposium: Leverage predictive coding, analytics tech for information governance
sponsored by
VIRTUAL ENVIRONMENT: Corporate data is one of an organization's most valuable assets, making a comprehensive information governance policy vital to bottom line success. Enter this interactive, online learning environment to gain information governance advice from several industry experts.
Posted: 28 Jan 2014 | Premiered: 31 Jan 2014

Defensible preservation and collection
sponsored by
VIRTUAL ENVIRONMENT: In this web seminar, learn to identify the risks posed by deficient data collection, how to use forensic principles for targeted collections and the relationship between preservation scale and costs.
Posted: 20 Jun 2014 | Premiered: 24 Jun 2014

Harnessing Business-Led IT
sponsored by
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

Expert Analysis: 2015's Top Security Information and Event Management Vendors Compared
sponsored by IBM
WHITE PAPER: The following Magic Quadrant white paper examines the top 13 security information and event management vendors. Inside, learn how each compares in terms of strengths, cautions, and more to get started on the right path to top-notch information security.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


Computer Weekly – 17 June 2014: The Met Office turns to open source
sponsored by
EZINE: In this week's Computer Weekly, we find out why the Met Office turned to an open source database to replace Oracle at the UK weather forecasting service. We take an in-depth look at Microsoft's SQL Server 2014 release. And we analyse the revolutionary potential of cloud computing. Read the issue now.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Tuning Hadoop on Dell PowerEdge Servers
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This comprehensive resource describes how to tune BIOS, OS, file system, and Hadoop settings to increase performance in Hadoop workloads.
Posted: 23 Jan 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014


Information Governance: Buy Now or Pay Later
sponsored by Commvault
WEBCAST: View the following webcast to hear from a renowned research firm as they reveal why companies need to have an information archiving solution to help maintain compliance, reduce IT costs, and more.
Posted: 04 Feb 2014 | Premiered: Feb 4, 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement