Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Online Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Online Privacy Reports
 
Global Sourcing Trends in 2012
sponsored by ComputerWeekly.com
IT BRIEFING: The latest IT outsourcing trends from global law firm Morrison & Foerster.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

ComputerWeekly.com

UK IT priorities 2012
sponsored by ComputerWeekly.com
IT BRIEFING: This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Presentation Transcript: Addressing the Challenges of Enterprise Data Management – An Integrated Approach with IBM® Optim™
sponsored by Advent Global Solutions Inc.
PRESENTATION TRANSCRIPT: This transcript of a presentation by Subash Chaganty outlines data management challenges that modern enterprises face and outlines ways in which IBM Optim, a database management system (DBMS), can help address them.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

Advent Global Solutions Inc.

Computer Weekly – 20 August 2013: Mixing work and play – how corporate applications can learn from computer games
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at gamification, the trend for corporate software to use techniques developed for computer games. After the Prism internet surveillance scandal, Switzerland hopes to become a safe location for cloud services. And we talk to an NHS CIO about the challenges of a paperless health service. Read the issue now.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

ComputerWeekly.com

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Whitepaper: IBM Optim Data Redaction: Reconciling openness with privacy
sponsored by IBM
WHITE PAPER: Redaction is a word that many—if not most—IT organizations have never heard of. If they have, they would probably be hard-pressed to define it or explain its importance. But that situation is changing quickly as organizations realize they must have a solution.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

IBM

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now.
Posted: 31 Mar 2014 | Published: 01 Apr 2014

ComputerWeekly.com

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement