Lawyers Reports

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
sponsored by Symantec Corporation
BOOK: This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.
Posted: 01 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

The Growing Importance of E-Discovery on Your Business
sponsored by Google Apps
WHITE PAPER: The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

Google Apps

Best Practices for Managing the Increasing Depth of Compliance Regulation
sponsored by IBM
EGUIDE: According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations.
Posted: 18 May 2011 | Published: 18 May 2011

IBM

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

IT Infrastructure at Your Service: Today’s challenging business climate is driving a move toward delivering IT functions as a service
sponsored by NTT America, Inc.
WHITE PAPER: This white paper examines many of the key considerations organizations must understand and assess before adopting IaaS.
Posted: 13 Jan 2010 | Published: 13 Jan 2010

NTT America, Inc.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Extend your Professional Services Capabilities with IM Virtualization Health Check
sponsored by Ingram Micro
WEBCAST: This webcast covers the importance of having a trusted partner as you work your way through the professional service market. It also features information on a virtual environment health check process.
Posted: 11 Dec 2013 | Premiered: Oct 16, 2013

Ingram Micro

Cooper Grace Ward Lawyers' Flexible Device Policy using VMware
sponsored by VMware
CASE STUDY: This video case study details the benefits a law firm got from turning to desktop virtualization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

VMware

e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff
sponsored by Symantec Corporation
BOOK: This e-book provides expert information on how to bridge the gap between IT management, security staff, and legal terminology.
Posted: 27 May 2008 | Published: 26 May 2008

Symantec Corporation

Ransomware Attacks Plaguing Health IT
sponsored by Cisco Umbrella
EGUIDE: Learn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

How Verification Services Fortify Your Software Escrow Solution
sponsored by Iron Mountain
WHITE PAPER: This paper examines the types of verification services used in the escrow industry. It discusses why verification has become a best practice for both the users of software and the developers creating the applications, as well as a solid recommendation by the lawyers who advise them.
Posted: 28 Dec 2011 | Published: 28 Dec 2011

Iron Mountain

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation

Walk the Line in Managing Big Data Analytics Efforts
sponsored by TechTarget Data Management
EBOOK: Big data projects are opportunities for data scientists to enhance company operations, but they have to keep in mind time and governance constraints.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

TOPICS:  Data Analytics
TechTarget Data Management

GDPR: 10 essential facts you need to know
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we give you the top 10 key facts you need to know about the General Data Protection Regulation according to privacy lawyer and KuppingerCole analyst, Karsten Kinast. Taken from the European Identity & Cloud Conference in 2016.
Posted: 18 May 2018 | Published: 18 May 2018

TechTarget ComputerWeekly.com

January Ezine: An issue covering what will happen in storage and networking in 2016
sponsored by MicroScope
EZINE: What does the year ahead hold? Plenty of action if you are involved with the software-defined networking market and the storage arena
Posted: 05 Jan 2016 | Published: 08 Jan 2016

MicroScope

Get the Message: Why Secure Texting in Healthcare Matters
sponsored by TechTarget Health IT
EBOOK: Texting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

TechTarget Health IT

CW Nordics – November 2015 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: IT is becoming more important to businesses, in part due to the digital revolution, and the women and men who lead IT are now increasingly coveted.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

TOPICS:  IT Management
TechTarget ComputerWeekly.com

Case Study: Appleby Simplifies Global Disaster Recovery with Fluid Data Technology
sponsored by Dell Compellent
CASE STUDY: Because Appleby operates data centers in several geographic regions, replication for disaster recovery purposes is one of the company’s top concerns. The company’s decentralized storage infrastructure seemed to make multi-site replication prohibitively costly and complex. Check out this case study to learn about the solution Appleby found.
Posted: 09 May 2011 | Published: 09 May 2011

Dell Compellent

New generation Business Process Management meets Agile and AI
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we find out how in its IT-centric guise, Business Process Management has been developing since the mid-2000s, and, more recently still, influenced by agile software development techniques and the renaissance of artificial intelligence/ machine learning.
Posted: 08 Feb 2021 | Published: 09 Jan 2018

TechTarget ComputerWeekly.com

CW EMEA July 2023: Can we trust AI?
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
Posted: 12 Jul 2023 | Published: 13 Jul 2023

TechTarget ComputerWeekly.com

Information Security ANZ March 2016
sponsored by TechTarget
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

Case Study: Global Law Firm Solves Privilege Management Issues with User Virtualization
sponsored by AppSense
CASE STUDY: In this case-study, you’ll discover how a global, highly regulated law firm was able to eliminate end-user management issues with a people-centric user virtualization solution.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

AppSense

E-discovery Software Brings Serious ROI to Information Governance
sponsored by Globanet Veritas
EGUIDE: Access this guide to examine the importance of leveraging tools like autoclassification and predictive coding for effective information governance. Additionally, you will discover approaches that improve ROI beyond just e-discovery.
Posted: 30 Sep 2016 | Published: 28 Sep 2016

Globanet Veritas

Boost your bottom line with document automation
sponsored by Adobe
EBOOK: Customer and employee expectations for digital document experiences are constantly changing, and investing in tools that connect with existing apps and automate redundant tasks is vital to fortifying processes – and saving time and money. Read this e-book to learn more.
Posted: 18 Mar 2024 | Published: 18 Mar 2024

TOPICS:  .NET
Adobe

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 08 Feb 2021 | Published: 02 May 2017

TechTarget ComputerWeekly.com

IT outsourcing in the digital age
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, discover how cloud computing continues to change the IT outsourcing industry, how Indian staff are making up a larger proportion of the workforces at large western companies, and find out how IT is disrupting the legal firms that support the outsourcing industry.
Posted: 08 Feb 2021 | Published: 17 Apr 2018

TechTarget ComputerWeekly.com

Using Predictive Coding to Your E-Discovery Advantage
sponsored by TechTarget CIO
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

TechTarget CIO

Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
Posted: 05 Feb 2024 | Published: 06 Feb 2024

TechTarget ComputerWeekly.com

Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023

TechTarget ComputerWeekly.com

Computer Weekly Buyer's Guide to EU General Data Protection Regulation
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.
Posted: 08 Feb 2021 | Published: 07 Feb 2018

TechTarget ComputerWeekly.com

Records Managers Gain Stature
sponsored by TechTarget Content Management
EBOOK: In this expert e-guide, learn how to deal with the ever-growing pileup of content and data many organizations are contending with. Topics covered include how new requirements are effecting records management roles, compliance is a growing concern when it comes to content management, and more.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

TechTarget Content Management

Presentation Transcript: Developing Your Cloud Strategy
sponsored by Intel
PRESENTATION TRANSCRIPT: This transcript looks at five key factors you need to consider as you begin putting together a cloud strategy. Jeffrey Ritter focuses on what is required to better assure any investment in the cloud will return the projected ROI.
Posted: 18 Aug 2011 | Published: 18 Aug 2011

Intel