Business of Information Technology  >   Business Management  >  

Information Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IM (Information Management), Info Management
DEFINITION: A method to use technology for collecting, processing and condensing information with a goal of efficient management.
Information Management Reports
201 - 225 of 573 Matches Previous Page  |  Next Page
Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

2012-2013 IT Budget Benchmark
sponsored by ComputerWeekly.com
IT BRIEFING: This in-depth research from business advisory group CEB assesses IT spending plans in 2013 based on a survey of 180 large international businesses.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

E-Guide: Bringing Value to Application Monitoring Through SIM
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Profitability modeling and optimization - Demo
sponsored by IBM
WEBCAST: This webcast details one such option that effectively joins financial, operational, strategic planning and business analytics into an enterprise-wide, holistic solution. Watch this now to learn about this option that can seamlessly move between your personal, workgroup and enterprise requirements to deliver quick and accurate insights.
Posted: 09 Aug 2012 | Premiered: Aug 9, 2012

IBM

Planning, Analysis and Forecasting - Demo
sponsored by IBM
WEBCAST: This brief webcast details one analytics option that will seamlessly move between your personal, workgroup and enterprise requirements, helping you gain greater insights quicker and easier than ever before. Watch this now to learn real-life use cases for this innovative option.
Posted: 09 Aug 2012 | Premiered: Aug 9, 2012

IBM

Cognos: FPM: How KPIs can help motivate and reward the right behavior - Paper #1 – Introduction - White Paper
sponsored by IBM
WHITE PAPER: This paper outlines the value of key performance indicators (KPIs) and why it's integral you set annual targets for each of them and measure performance against them rather than develop strategy maps and generate strategic action plans that drive performance improvement.
Posted: 08 Aug 2012 | Published: 08 Aug 2012

IBM

Close, Consolidate and Report For Dummies
sponsored by IBM
EBOOK: This e-book will help you understand why integrating and unifying your closing, consolidating and reporting (CCR) process is critical. Read this to learn about re-engineering your point solution approach to CCR by investing in integrated solutions, how to achieve automation and enhance your ability to manage controls, reduce risks and more.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

IBM

CIO Handbook: The Risk Management Approach to Information Governance
sponsored by SearchCompliance.com
EBOOK: This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.
Posted: 19 Apr 2013 | Published: 20 Mar 2013

SearchCompliance.com

Universitätsklinikum Erlangen strengthens analytics expertise and focuses on a customised healthcare analytics solution
sponsored by IBM
WHITE PAPER: View this white paper to learn how one company strengthened analytics by developing a focus on customised healthcare. It linked to relevant operational systems, how to optimise information flow and how to support the overall strategic control of the hospital at just the touch of a button.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

IBM

The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods
sponsored by Attachmate Corporation
WHITE PAPER: This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach.
Posted: 10 Apr 2013 | Published: 31 Dec 2012

Attachmate Corporation

Beyond Business as Usual: The Mega Shift Toward Social Communications
sponsored by IBM
WHITE PAPER: Discover how integrating social software with communications is transforming the modern workplace, maximizing the potential of human capital, and generating value for businesses worldwide.
Posted: 09 Apr 2013 | Published: 02 Oct 2012

IBM

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit
sponsored by Attachmate Corporation
CASE STUDY: This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!
Posted: 09 Apr 2013 | Published: 30 Mar 2012

Attachmate Corporation

Introducing Social Business for the Mid-Market
sponsored by IBM
WHITE PAPER: Consult this resource to learn more about the insight Aberdeen research discovered by studying 229 mid-sized companies. They looked to uncover if there were specific characteristics that made companies more interested in using social business.
Posted: 09 Apr 2013 | Published: 09 Apr 2013

IBM

The New Universe of Managed File Transfer: Why Your Existing Solution May Not Be Adequate
sponsored by Attachmate Corporation
WHITE PAPER: Uncover the driving forces for an advanced managed file transfer (MFT) solution, as well as what to look for in such an approach and the many benefits you can enjoy after implementing a solution.
Posted: 09 Apr 2013 | Published: 29 May 2009

Attachmate Corporation

Getting Your Money’s Worth From Master Data Management
sponsored by SearchBusinessAnalytics
EBOOK: This handbook will provide IT and master data management (MDM) administrators, as well as business executives involved in sponsoring MDM initiatives, with practical advice on how to develop and implement successful programs.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchBusinessAnalytics

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Key insights for an effective records management strategy
sponsored by Iron Mountain
EGUIDE: Implementing new processes and workflows is just the beginning of establishing an effective records and information management (RIM) strategy. In this expert guide you will discover essential tips on how to ensure your RIM policy is not only highly effective but also sustainable. Read on to learn more.
Posted: 19 Dec 2012 | Published: 19 Dec 2012

Iron Mountain

Solution Spotlight: Data Quality, IT, and The Business
sponsored by IBM and Softchoice
EGUIDE: The consequences of poor quality data can be catastrophic – for BergerABAM, an engineering and construction company, the result of bad data was a $1 million deficit. Read this expert guide to learn why businesses today need data quality management policies and find out how to craft an effective initiative.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

IBM and Softchoice

Information Governance Strategy: Developing a Roadmap for Managing Corporate Info
sponsored by SearchContentManagement
EBOOK: Most organizations are looking for ways to better manage their structured and unstructured data – and information governance has the potential to do so. But implementing an effective program can be tricky. Review this e-book to gain practical tips on how to implement an information governance program, learn 5 pitfalls to avoid, and more.
Posted: 05 Sep 2012 | Published: 01 Sep 2012

SearchContentManagement

IBM and Oracle TCO: The Lumpy Mattress
sponsored by IBM
WHITE PAPER: This paper outlines Oracle's approach to overpricing one part of a database solution to compensate for another part, leading to a much higher total cost of ownership (TCO). Read this now to learn more about the evolution of TCO, Oracle's pricing strategy, IBM's pricing strategy and so much more.
Posted: 10 Aug 2012 | Published: 21 Sep 2011

IBM

Outperforming in a data-rich, hyper-connected world
sponsored by IBM
WHITE PAPER: This paper outlines the results of a survey conducted amongst more than 1,100 executives across nine industries in 64 countries on their ability to capture data, share insights and take actions based on what they learn. Read this now to discover how other companies are harnessing and handling their data and learn how you can follow a similar path.
Posted: 09 Aug 2012 | Published: 08 Aug 2012

IBM

BI Trends and Strategies E-Zine Issue 8
sponsored by SearchBusinessAnalytics
EGUIDE: Organizations are carving out small slices of their DWs and databases where scientists and analysts can manipulate and analyze data sets. The intent of the data sandbox is to separate experimentation from the production database environment. Read this edition of BI Trends and Strategies to learn about the many benefits of using data sandboxes.
Posted: 03 Aug 2012 | Published: 01 Aug 2012

SearchBusinessAnalytics
201 - 225 of 573 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement