Business of Information Technology  >   Business Management  >  

Information Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IM (Information Management), Info Management
DEFINITION: A method to use technology for collecting, processing and condensing information with a goal of efficient management.
Information ManagementReports
226 - 250 of 620 Matches Previous Page  | Next Page
Building A Powerful IM Strategy for Large Organizations
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: Large organizations face challenges in identifying and defining requirements for the implementation of information management strategies. This classroom will lead you through Enbridge Inc.'s journey - from understanding business risks and gaining executive support, to elaborating, staffing, and implementing measureable execution techniques.
Posted: 01 Apr 2013 | Premiered: 02 Apr 2013


Three Reasons to Outsource
sponsored by Iron Mountain
WHITE PAPER: Consult this white paper to learn more about the benefits of outsourcing your records management approach. Develop a comprehensive plan for records and information and your organization will be able to deliver the information management effectively.
Posted: 25 Mar 2013 | Published: 25 Mar 2013

Iron Mountain

Information governance University--Knowing and Mastering the Rules of the Game Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In the global marketplace, legal teams and compliance managers must be aware of how laws and regulations in different countries and regions address information governance. This session will discuss strategies for identifying rules, creating inventory of rules and successful techniques for measuring execution of those rules.
Posted: 07 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Information Governance University: Records Management Strategy, Transparency and Collaboration Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This session discusses expert strategies on simplifying records management
Posted: 06 Mar 2013 | Premiered: 07 Feb 2013

SearchCompliance.com

Information Governance University: Archive Information governance models, measurement and program success Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This session discusses planning and measuring strategies for successful information governance.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Information Governance Online Symposium
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Since corporate data is one of an organization's most valuable assets, it only makes sense to implement an information governance policy. By doing so, IT leaders can reduce legal risks and increase the ability to be more agile. Enter this online learning environment in order to gain information governance advice from several industry experts.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

On-Demand Webcast: Got Big Data? Learn Tricks to Combine Data from Traditional and Untraditional Sources
sponsored by Dell Software
WEBCAST: In this on-demand video, renowned big-data expert Guy Harrison discusses tricks for using the Toad® Business Intelligence Suite to easily access, integrate, cleanse, and analyze data from nearly any source. Then, see how one company used Toad to save time, reduce risk and improve customer server.
Posted: 12 Feb 2013 | Premiered: Feb 12, 2013

Dell Software

Key insights for an effective records management strategy
sponsored by Iron Mountain
EGUIDE: Implementing new processes and workflows is just the beginning of establishing an effective records and information management (RIM) strategy. In this expert guide you will discover essential tips on how to ensure your RIM policy is not only highly effective but also sustainable. Read on to learn more.
Posted: 19 Dec 2012 | Published: 19 Dec 2012

Iron Mountain

2012-2013 IT Budget Benchmark
sponsored by ComputerWeekly.com
IT BRIEFING: This in-depth research from business advisory group CEB assesses IT spending plans in 2013 based on a survey of 180 large international businesses.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Using SharePoint to Unify Records Management with Iron Mountain Solutions
sponsored by Iron Mountain
WHITE PAPER: As the amount of unstructured business data continues to grow, IT is under pressure to craft effective records management programs – and fast. Only 37% of companies with formal policies are able to consistently apply them company-wide. Read on to learn about a next-gen platform that integrates with SharePoint to provide highly-effective policies.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

Iron Mountain

Best Practices in Unified Records Management to Reduce Risks and Support Data Growth
sponsored by Iron Mountain
WHITE PAPER: With the volume of your paper and digital records steadily increasing, the need for a records management policy that effectively manages both is a top priority. Read on to discover how a unified records management strategy can help you get control of all your business-critical records. Plus, learn 5 key features of an effective program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

Iron Mountain

A Unified Records Management Approach to Maximize SharePoint and Social Media
sponsored by Iron Mountain
WHITE PAPER: As the use of social media and SharePoint technologies continues to rise, effective records management is becoming more difficult than ever before.  Inside this paper, learn best practices for effectively managing SharePoint and social media, including 5 questions to consider and 4 key issues to address when designing your overall strategy.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Iron Mountain

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Organizational development's influence on the e-discovery process
sponsored by SearchCompliance.com
VIRTUAL SEMINAR: In this tip, learn how organizational culture and structure influences e-discovery process.
Posted: 14 Nov 2012 | Premiered: 06 Nov 2012

SearchCompliance.com

The Compliance Case for Social Media Records Management
sponsored by Iron Mountain
EGUIDE: In this e-guide, learn how your organization can develop a solid records management policy to stay compliant while reaping social networking benefits.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

Iron Mountain

Information governance: Reduce risk and improve compliance
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

Iron Mountain

Scalable ECM and document management strategy
sponsored by Iron Mountain
EGUIDE: The need for effective enterprise content management (ECM) is becoming business-critical – it not only  improves business processes but also ensures you meet regulatory compliance. Read on to learn ECM best practices, including why digital archiving and scalable document management technology is essential.
Posted: 27 Aug 2012 | Published: 01 Aug 2012

Iron Mountain

Protecting Your Information as if It Were Our Own
sponsored by Iron Mountain
WHITE PAPER: This resource introduces the security practices and information security services of an information management services provider intent on providing unparalleled protection of assets, comprehensive security assurance and industry-leading expertise. Read on to discover a potential information management partner now.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Iron Mountain

Getting Your Money’s Worth From Master Data Management
sponsored by SearchBusinessAnalytics
EBOOK: This handbook will provide IT and master data management (MDM) administrators, as well as business executives involved in sponsoring MDM initiatives, with practical advice on how to develop and implement successful programs.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchBusinessAnalytics

Weighing the Options for an Enterprise Mobility Strategy
sponsored by Dimension Data
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

Dimension Data

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Solution Spotlight: Data Quality, IT, and The Business
sponsored by IBM and Softchoice
EGUIDE: The consequences of poor quality data can be catastrophic – for BergerABAM, an engineering and construction company, the result of bad data was a $1 million deficit. Read this expert guide to learn why businesses today need data quality management policies and find out how to craft an effective initiative.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

IBM and Softchoice

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by McAfee, Inc.
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

McAfee, Inc.

E-Guide: Bringing Value to Application Monitoring Through SIM
sponsored by CA Technologies.
EGUIDE: This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

CA Technologies.

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by BlueCoat
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

BlueCoat
226 - 250 of 620 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement