Business of Information Technology  >   Business Management  >  

Information Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IM (Information Management), Info Management
DEFINITION: A method to use technology for collecting, processing and condensing information with a goal of efficient management.
Information Management Reports
1 - 25 of 549 Matches Previous Page  |  Next Page
Risk or Reward? UC, IM, and Social Media in the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: Discover how you can overcome the negative compliance and security side effects of deploying new communications and social channels in the pharmaceutical industry. Learn 6 ways to adopt these technologies while mitigating legal and security risks.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

Compliance Beyond Email: Navigating the Complexities within Healthcare
sponsored by Actiance
WHITE PAPER: This white paper explores how you can provide doctors and patients diverse communications coupled with strong compliance and data protection. Uncover 5 ways to mitigate legal and security risks in your healthcare organization.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

Why Enterprises Need Trustworthy Data
sponsored by IBM
WHITE PAPER: In this e-book, information governance expert Paula Wiles Sigmon discusses what enterprises are doing to improve the quality of their data, who should be responsible for data that goes in and out of an enterprise data warehouse, and the emerging role of the chief data officer. Gain tips on how you can foster confidence in your data.
Posted: 18 Apr 2016 | Published: 30 Jun 2014

IBM

Distell Supports Business Growth through Improved Information Management
sponsored by OpenText
WHITE PAPER: Access this case study to discover the path Distell took to overhaul its corporate information strategy to improve collaboration, governance, and productivity. Discover how the ECM software they chose enables secure file sharing in the cloud and empowers their workers with work-from-anywhere, device-agnostic content sharing capabilities.
Posted: 14 Apr 2016 | Published: 31 Jan 2013

OpenText

Optimize Patient Documentation with Enterprise Content Management
sponsored by Actiance
EGUIDE: In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

Cost Savings and Business Benefits Enabled by InfoSphere Information Server
sponsored by IBM
ANALYST REPORT: In this Forrester report, examine the potential ROI your enterprise can realize by deploying InfoSphere Information Server as part of your overall information architecture integration strategy. Learn how it can improve access to trusted information to create deeper insights and foster smarter decision-making.
Posted: 16 Mar 2016 | Published: 31 Jul 2015

IBM

Case Study: How Waitrose Enabled Easier Collaboration and Innovation
sponsored by Cloud Sherpas
CASE STUDY: This brief case study describes the strategy that allowed a retailer to share knowledge with thousands of people instantaneously. Discover how they were able to make everyday business processes more efficient, collaborate on documents to formulate ideas in real-time, and more.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

Cloud Sherpas

Security Intelligence Platforms Review
sponsored by IBM
WHITE PAPER: In this independently conducted study from Ponemon Institute, learn what 25 IT and IT security practitioners had to say about one security information and event management option.
Posted: 16 Feb 2016 | Published: 28 Feb 2014

IBM

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Achieve Data Governance and Quality With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronized, consolidated, and shared vital citizen data.
Posted: 27 May 2015 | Published: 27 May 2015

Information Builders

Digital Leeds
sponsored by ComputerWeekly.com
PRESENTATION: Dylan Roberts, CIO at Leeds City Council, who is directing a project on the digitisation of Leeds City Council and local government, explains his approach in this PowerPoint presentation.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

Gartner: Digital transformation: How to survive the information crisis
sponsored by ComputerWeekly.com
ANALYST BRIEF: It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

CW Europe – August 2015
sponsored by ComputerWeekly.com
EZINE: This issue of CW Europe investigates the different cultural attitudes towards data management ethics.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

ComputerWeekly.com

CW Europe – July 2015
sponsored by ComputerWeekly.com
EZINE: The economy in central and eastern Europe (CEE) is starting to recover, which means investment in IT across the region is also starting to return. This issue of CW Europe investigates how the boost in IT is changing the role of the CIO, from supporting the business to driving its growth.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

ComputerWeekly.com

Reduce Risk Through Information Sharing
sponsored by SAS
WHITE PAPER: This white paper examines the emergence of fusion centers, or information sharing agencies. Explore the ways in which an effective strategy enables collaborative information sharing.
Posted: 01 May 2015 | Published: 31 Dec 2014

SAS

Best practice guide:What it takes to deliver a single view of the customer
sponsored by IPL
WHITE PAPER: This white paper intends to provide the reader with insight into how to ease the burden of compliance, become more customer-centric, offer improved products and services and make better-informed decisions by creating a single view of your most important information. Access now and learn how to enable these benefits in your own business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

IPL

BYOD Compliance: Keep Mobile Data Regulation-Ready
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchCompliance.com

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014

TechTarget

The Next Wave of Data Management : Is Big Data The New Normal?
sponsored by Talend
WHITE PAPER: The following white paper reviews the business drivers that are impacting the new wave of data management, highlights the new tools companies have for consideration in their next generation data architecture, and finally outlines a total data management blueprint for consideration in your big data strategy.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Talend

Move Forward: Create a More Satisfying and Productive Omni-channel Experience
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out why so many are turning to the power of advanced information management and analytics (IM&A), in order to improve their understanding of consumers and deliver a seamless and more satisfying omni-channel experience.
Posted: 03 Jul 2014 | Published: 30 Jun 2014

Hewlett Packard Enterprise

Computer Weekly – 17 June 2014: The Met Office turns to open source
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out why the Met Office turned to an open source database to replace Oracle at the UK weather forecasting service. We take an in-depth look at Microsoft's SQL Server 2014 release. And we analyse the revolutionary potential of cloud computing. Read the issue now.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Smart Changes, Big ROI: Leading Companies Automate Their Record-to-Report Processes
sponsored by IBM
WHITE PAPER: The following white paper explores the 3 big areas companies need to address in order to improve their reporting accuracy and accounting. Learn how industry innovators are using automation to gain the reporting prowess they need. Also explore technology recommendations and more.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

IBM
1 - 25 of 549 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement