Business of Information Technology  >   Business Management  >  

Information Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IM (Information Management), Info Management
DEFINITION: A method to use technology for collecting, processing and condensing information with a goal of efficient management.
Information Management Reports
1 - 25 of 559 Matches Previous Page  |  Next Page
Leading the Data-Driven Transformation: The CIO & The New Age of Data Quality
sponsored by Trillium Software
WHITE PAPER: Discover the top 6 challenges modern CIOs face, and explore how to leverage data quality to propel CIO success. Learn the best practices for sustainable information management strategies, allowing your CIOs to transform your business models through data-driven digitization.
Posted: 15 Aug 2016 | Published: 01 Aug 2016

Trillium Software

Crafting a Data Lifecycle Management Strategy to Control Capacity
sponsored by Iron Mountain
EGUIDE: Jon Toigo, Chairman of the Data Management Institute, explains how information lifecycle management (ILM) strategies can help classify data and control capacity by allocating it to the appropriate storage. Discover how recent improvements in ILM can enable your enterprise to truly benefit from implementing this strategy.
Posted: 08 Aug 2016 | Published: 03 Aug 2016

Iron Mountain

Leading the Data-Driven Transformation: The CIO & The New Age of Data Quality
sponsored by Trillium Software
WHITE PAPER: Discover the top 6 challenges modern CIOs face, and explore how to leverage data quality to propel CIO success. Learn the best practices for sustainable information management strategies, allowing your CIOs to transform your business models through data-driven digitization.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

Trillium Software

Put Your Business Content to Work
sponsored by IBM
MICROSITE: In this comprehensive resource hub, access 13 guides that will enable you to discover how to extract the most value from your business content and how to make it work for you. Learn about content engagement, data and information governance, sales transformation, and much more.
Posted: 28 Jul 2016 | Published: 28 Jul 2016

IBM

Pushing the Start Button on Information Lifecycle Governance
sponsored by IBM
WHITE PAPER: Strong information governance ensures that big data remains an advantage for your company. It is important to realize that information governance improvement has to come slowly, in steps instead of strides. Read on to gauge your company's information governance maturity and how to set realistic goals.
Posted: 28 Jul 2016 | Published: 30 Jan 2015

IBM

Disposing of Digital Debris: Information Governance Strategy and Practice in Action
sponsored by IBM
WHITE PAPER: No one intentionally creates digital debris. We create content and imbue it with value. But how do you remove digital debris without losing valuable content? Learn about enhanced Information Governance (IG) best practices to reduce your data footprint as we walk you through two IG models that can help you implement an effective IG program.
Posted: 27 Jul 2016 | Published: 31 Dec 2014

IBM

Information Lifecycle Governance Maturity Assessment
sponsored by IBM
RESOURCE: Increasing storage and maintenance costs, duplication of resources, the lack of trusted content, and exposure to risks and litigation are problems plaguing many enterprises today. So why are companies holding on to every bit of data? Take this assessment to determine your level of information governance maturity and see how much more you can grow.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

IBM

2016 State of the Connected Patient Report
sponsored by Salesforce.com
WHITE PAPER: Explore the results of a survey conducted to understand how patients communicate with their healthcare providers, their opinions on telemedicine and wearable devices, and their experiences with post-discharge care.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Salesforce.com

ECM Software Helps Overcome Content Challenges
sponsored by SearchContentManagement
EBOOK: ECM software, once limited to document management, has broadened its applications to include records management, web content management, workflow and collaboration. Learn how to evaluate ECM software to see which ones belong in your enterprise information toolkit.
Posted: 09 May 2016 | Published: 02 May 2016

SearchContentManagement

Distell Supports Business Growth through Improved Information Management
sponsored by OpenText
WHITE PAPER: Access this case study to discover the path Distell took to overhaul its corporate information strategy to improve collaboration, governance, and productivity. Discover how the ECM software they chose enables secure file sharing in the cloud and empowers their workers with work-from-anywhere, device-agnostic content sharing capabilities.
Posted: 14 Apr 2016 | Published: 31 Jan 2013

OpenText

Cost Savings and Business Benefits Enabled by InfoSphere Information Server
sponsored by IBM
ANALYST REPORT: In this Forrester report, examine the potential ROI your enterprise can realize by deploying InfoSphere Information Server as part of your overall information architecture integration strategy. Learn how it can improve access to trusted information to create deeper insights and foster smarter decision-making.
Posted: 16 Mar 2016 | Published: 31 Jul 2015

IBM

Case Study: How Waitrose Enabled Easier Collaboration and Innovation
sponsored by Cloud Sherpas
CASE STUDY: This brief case study describes the strategy that allowed a retailer to share knowledge with thousands of people instantaneously. Discover how they were able to make everyday business processes more efficient, collaborate on documents to formulate ideas in real-time, and more.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

Cloud Sherpas

Security Intelligence Platforms Review
sponsored by IBM
WHITE PAPER: IT professionals weigh in on SIEM options and benefits in this independently conducted study from the Ponemon Institute.
Posted: 16 Feb 2016 | Published: 28 Feb 2014

IBM

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Achieve Data Governance and Quality With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronized, consolidated, and shared vital citizen data.
Posted: 27 May 2015 | Published: 27 May 2015

Information Builders

Digital Leeds
sponsored by ComputerWeekly.com
PRESENTATION: Dylan Roberts, CIO at Leeds City Council, who is directing a project on the digitisation of Leeds City Council and local government, explains his approach in this PowerPoint presentation.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

Gartner: Digital transformation: How to survive the information crisis
sponsored by ComputerWeekly.com
ANALYST BRIEF: It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Optimize Patient Documentation with Enterprise Content Management
sponsored by Actiance
EGUIDE: In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

CW Europe – August 2015
sponsored by ComputerWeekly.com
EZINE: This issue of CW Europe investigates the different cultural attitudes towards data management ethics.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

ComputerWeekly.com

CW Europe – July 2015
sponsored by ComputerWeekly.com
EZINE: The economy in central and eastern Europe (CEE) is starting to recover, which means investment in IT across the region is also starting to return. This issue of CW Europe investigates how the boost in IT is changing the role of the CIO, from supporting the business to driving its growth.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

ComputerWeekly.com

Reduce Risk Through Information Sharing
sponsored by SAS
WHITE PAPER: This white paper examines the emergence of fusion centers, or information sharing agencies. Explore the ways in which an effective strategy enables collaborative information sharing.
Posted: 01 May 2015 | Published: 31 Dec 2014

SAS

Best practice guide:What it takes to deliver a single view of the customer
sponsored by IPL
WHITE PAPER: This white paper intends to provide the reader with insight into how to ease the burden of compliance, become more customer-centric, offer improved products and services and make better-informed decisions by creating a single view of your most important information. Access now and learn how to enable these benefits in your own business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

IPL

BYOD Compliance: Keep Mobile Data Regulation-Ready
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchCompliance.com

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014

TechTarget
1 - 25 of 559 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement