Business of Information Technology  >   Business Management  >  

Information Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IM (Information Management), Info Management
DEFINITION: A method to use technology for collecting, processing and condensing information with a goal of efficient management.
Information Management Reports
201 - 225 of 559 Matches Previous Page  |  Next Page
Getting Your Money’s Worth From Master Data Management
sponsored by SearchBusinessAnalytics
EBOOK: This handbook will provides practical advice on how to develop and implement successful MDM programs. Gain expert advice on strategies and tactics for building effective MDM processes that can pay big business dividends.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchBusinessAnalytics

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

2012-2013 IT Budget Benchmark
sponsored by ComputerWeekly.com
IT BRIEFING: This in-depth research from business advisory group CEB assesses IT spending plans in 2013 based on a survey of 180 large international businesses.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

E-Guide: Bringing Value to Application Monitoring Through SIM
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods
sponsored by Attachmate Corporation
WHITE PAPER: This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach.
Posted: 10 Apr 2013 | Published: 31 Dec 2012

Attachmate Corporation

Beyond Business as Usual: The Mega Shift Toward Social Communications
sponsored by IBM
WHITE PAPER: Discover how integrating social software with communications is transforming the modern workplace, maximizing the potential of human capital, and generating value for businesses worldwide.
Posted: 09 Apr 2013 | Published: 02 Oct 2012

IBM

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit
sponsored by Attachmate Corporation
CASE STUDY: This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!
Posted: 09 Apr 2013 | Published: 30 Mar 2012

Attachmate Corporation

Introducing Social Business for the Mid-Market
sponsored by IBM
WHITE PAPER: Consult this resource to learn more about the insight Aberdeen research discovered by studying 229 mid-sized companies. They looked to uncover if there were specific characteristics that made companies more interested in using social business.
Posted: 09 Apr 2013 | Published: 09 Apr 2013

IBM

The New Universe of Managed File Transfer: Why Your Existing Solution May Not Be Adequate
sponsored by Attachmate Corporation
WHITE PAPER: Uncover the driving forces for an advanced managed file transfer (MFT) solution, as well as what to look for in such an approach and the many benefits you can enjoy after implementing a solution.
Posted: 09 Apr 2013 | Published: 29 May 2009

Attachmate Corporation

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Key insights for an effective records management strategy
sponsored by Iron Mountain
EGUIDE: Implementing new processes and workflows is just the beginning of establishing an effective records and information management (RIM) strategy. In this expert guide you will discover essential tips on how to ensure your RIM policy is not only highly effective but also sustainable. Read on to learn more.
Posted: 19 Dec 2012 | Published: 19 Dec 2012

Iron Mountain

Solution Spotlight: Data Quality, IT, and The Business
sponsored by IBM and Softchoice
EGUIDE: The consequences of poor quality data can be catastrophic – for BergerABAM, an engineering and construction company, the result of bad data was a $1 million deficit. Read this expert guide to learn why businesses today need data quality management policies and find out how to craft an effective initiative.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

IBM and Softchoice

Information Governance Strategy: Developing a Roadmap for Managing Corporate Info
sponsored by SearchContentManagement
EBOOK: Most organizations are looking for ways to better manage their structured and unstructured data – and information governance has the potential to do so. But implementing an effective program can be tricky. Review this e-book to gain practical tips on how to implement an information governance program, learn 5 pitfalls to avoid, and more.
Posted: 05 Sep 2012 | Published: 01 Sep 2012

SearchContentManagement

IBM and Oracle TCO: The Lumpy Mattress
sponsored by IBM
WHITE PAPER: This paper outlines Oracle's approach to overpricing one part of a database solution to compensate for another part, leading to a much higher total cost of ownership (TCO). Read this now to learn more about the evolution of TCO, Oracle's pricing strategy, IBM's pricing strategy and so much more.
Posted: 10 Aug 2012 | Published: 21 Sep 2011

IBM

Outperforming in a data-rich, hyper-connected world
sponsored by IBM
WHITE PAPER: This paper outlines the results of a survey conducted amongst more than 1,100 executives across nine industries in 64 countries on their ability to capture data, share insights and take actions based on what they learn. Read this now to discover how other companies are harnessing and handling their data and learn how you can follow a similar path.
Posted: 09 Aug 2012 | Published: 08 Aug 2012

IBM

BI Trends and Strategies E-Zine Issue 8
sponsored by SearchBusinessAnalytics
EGUIDE: Organizations are carving out small slices of their DWs and databases where scientists and analysts can manipulate and analyze data sets. The intent of the data sandbox is to separate experimentation from the production database environment. Read this edition of BI Trends and Strategies to learn about the many benefits of using data sandboxes.
Posted: 03 Aug 2012 | Published: 01 Aug 2012

SearchBusinessAnalytics

The Social Business: Advent of a new age
sponsored by IBM
WHITE PAPER: This paper outlines the why organizations need to become social businesses today. Read on to learn how your business can become social through crafting the right blueprint relying on networks, social and real-time collaboration, mobility and integration, how to deepen your customer relationships and the benefits associated with it, and much more.
Posted: 30 Jul 2012 | Published: 16 Feb 2011

IBM

Staples Case Study
sponsored by IBM
CASE STUDY: Staples set the bar for the office superstore when it first opened its doors in 1986. It now has the second-largest Internet retail revenue in the world with $10.2 billion in 2010 sales, 43% of the company's total revenue. This paper details how Staples delivered a much more personalized shopping experience to its online customers.
Posted: 25 Jul 2012 | Published: 21 Sep 2011

IBM

ITG Executive Summary: Value Proposition for IBM PureFlex Systems
sponsored by IBM
WHITE PAPER: This paper outlines a system that includes industry-leading capabilities at the infrastructure management level. Read on to discover how this option offers the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and allows organizations to extend common management services to non-SAP apps.
Posted: 23 Jul 2012 | Published: 18 Apr 2012

IBM

Smarter Commerce for Consumer Products
sponsored by IBM
WHITE PAPER: The connected customer is changing the way you must conduct business. In order to comply with your customers' demands, you must change the way your products are sourced, manufactured and distributed. Smarter commerce enables this, allowing you to transform how quickly you can manage and adapt your source, market, sell and service processes.
Posted: 18 Jul 2012 | Published: 16 Nov 2011

IBM

The path to securing your mobile Enterprise
sponsored by Juniper Networks, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript highlights the rise in mobile popularity, emerging security threats and how people are handling them. Discover more about IT architectures for mobile devices and how you can further develop a mobile workplace.
Posted: 12 Jul 2012 | Published: 12 Jul 2012

Juniper Networks, Inc.

From Big Data to Better Insights
sponsored by Oversight Systems
WHITE PAPER: This white paper provides insights on how you can enjoy the benefits of Big Data without having to pay high costs. Discover an approach that can speed return on investment and shorten deployment times so you can make better decisions for your business.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

Oversight Systems
201 - 225 of 559 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement