Information About DocumentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information About Document returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Information Integration/ Metadata Management
 •   Product Data Management/ Product Information Management
 •   Data Security
 •   Data Quality
 •   Business Intelligence Solutions
 •   Information Lifecycle Management
 •   Statistical Data Analysis
 •   Enterprise Data Protection and Privacy
 •   Customer Information Management/ Customer Databases
 •   Data Mining

Related Searches
 •   Based Information About
 •   Creation Information
 •   Designs Information About
 •   Desktop Information About Document
 •   Implementation Of Information About
 •   Information About Contact
 •   Information About Document Reports
 •   Information Terms
 •   Parts Information
 •   Risk Information About
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Time Value of Data by SGI

June 13, 2011 - (Free Research)
All of the printed material on earth is estimated to be about 200 petabytes (200,000 terabytes) of data. That is a lot of information and a lot of data to manage. But it is dwarfed by the amount of data that is generated worldwide with information technology today. Read this white paper to learn more about how to survive the information explosion. 
(WHITE PAPER) READ ABSTRACT |

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint by IBM

December 31, 2008 - (Free Research)
This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns? 
(WHITE PAPER) READ ABSTRACT |

The Truth About Mobile BI: Five Common Myths Debunked by Information Builders

December 01, 2011 - (Free Research)
Mobile computing is taking over the technology industry, but what about the business intelligence (BI) behind these tools? This paper discusses the myths of mobile BI's complexity as well as why your organization should be using mobile BI to benefit its success. 
(WHITE PAPER) READ ABSTRACT |

HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems by Hewlett-Packard Limited

November 01, 2013 - (Free Research)
Prevent future cyber attacks from occurring by modifying your company's security infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Get Smart About Big Data by CommVault Systems, Inc.

February 28, 2014 - (Free Research)
This white paper to get more information on a solution that can help you extract maximum value from your information by converging backup and archiving. 
(WHITE PAPER) READ ABSTRACT |

Analyst advice for IT security leaders by IBM

March 31, 2013 - (Free Research)
Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security. 
(WHITE PAPER) READ ABSTRACT |

Debunking APT myths: What it really means and what you can do about it by SearchSecurity.com

July 29, 2011 - (Free Research)
This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats. 
(EGUIDE) READ ABSTRACT |

Deciphering the truth about Big Data hype and security intelligence by Hewlett-Packard Limited

April 08, 2014 - (Free Research)
In this whitepaper, Randy Franklin Smith of UltimateWindowsSecurity.com discusses the key tenets of the realationship between Big Data and security information and event management. 
(WHITE PAPER) READ ABSTRACT |

The future of email and applications is social by IBM

April 05, 2013 - (Free Research)
While it's difficult to imagine a workplace without email, today many businesses are coping with information overload. Email is a key factor of business collaboration tools, so businesses need to find a way to modify information management. View this white paper to learn more about what the future of email application entails. 
(WHITE PAPER) READ ABSTRACT |

The Role of Data Integration and Quality Management in NIEM by Information Builders

May 01, 2013 - (Free Research)
Check out this paper today to investigate how the National Information Exchange Model (NIEM) has grown. Learn about the challenges it was designed to overcome and of the important role that enterprise integration and data quality management technologies play in the execution of NIEM initiatives. 
(WHITE PAPER) READ ABSTRACT |

Information Optimization Transformation Experience Workshop by Hewlett-Packard Limited

January 24, 2013 - (Free Research)
Many organizations continue to struggle with basic BI competencies, such as information quality, data integration, governance, and accessibility. Read on to learn how you can benefit from an online Big Data workshop where your business and IT leaders can collaborate on the latest strategies and trends about strategic information management. 
(WHITE PAPER) READ ABSTRACT |

Pandora VP Richard Rothschild talks about the challenges of cloud integration by SnapLogic

January 21, 2014 - (Free Research)
Listen to this fascinating webcast in which Richard Rothschild, VP of Enterprise Information Services at Pandora, talks about the challenges his company faces when integrating multiple cloud applications. 
(VIDEO) READ ABSTRACT |

Key Challenges in Risk Management: How Immediate Access to Integrated Information Can Mitigate Risk by Sybase, an SAP company

April 30, 2012 - (Free Research)
<p>This white paper reveals the findings of a recent survey of senior risk and IT decision-makers in international financial institutions, exploring their current risk management capabilities and their plans for introducing integrated technologies, and examining the relationship between data management and risk mitigation in depth.</p> 
(WHITE PAPER) READ ABSTRACT |

Smart  Organisations by ComputerWeekly.com

October 26, 2011 - (Free Research)
Download this report to learn how your organisation can use smart technology to drive innovation and enhance your competitive position, without breaking the bank. 
(WHITE PAPER) READ ABSTRACT |

Overview of RSD Glass by RSD

October 03, 2011 - (Free Research)
This white paper includes valuable information about information governance along with a solution to many governance challenges. 
(WHITE PAPER) READ ABSTRACT |

Making Business Relevant Information Instantly Available to More Users by SAP

June 19, 2009 - (Free Research)
Executives, managers, and business users need the ability to quickly discover, collect, analyze, and share relevant information and they need to be able to answer their own questions as they have them. Read this quick report to learn more about a solution that addresses just these needs. 
(WHITE PAPER) READ ABSTRACT |

User Directed Storage Management: How To Make Users Accountable For Responsible Storage Usage by Northern Parklife

February 12, 2009 - (Free Research)
The accelerated pace of doing business in today's world puts organizations under tremendous pressure. They need to be fleet and flexible, able to rapidly respond to opportunities, make decisions, and deploy resources. Critical to this is the way information is managed and stored. 
(WHITE PAPER) READ ABSTRACT |

eBook: Best Practices for DB2 on z/OS Performance by BMC Software, Inc.

April 17, 2009 - (Free Research)
This book contains general information about improving performance for DB2 on z/OS and specific information about how BMC products help improve performance. 
(EBOOK) READ ABSTRACT |

Splunk for Business Intelligence by Splunk

April 03, 2012 - (Free Research)
This paper uncovers how Splunk can be applied to a variety of business intelligence (BI) activities to allow your company real-time insight. 
(WHITE PAPER) READ ABSTRACT |

CW Europe – March Edition by ComputerWeekly.com

March 05, 2013 - (Free Research)
Never have we been so open about the information we share online, without so little concern for our privacy. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. 
(EZINE) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 13, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

Dispelling Myths & Revealing Truths about Email Management with SharePoint by Colligo Networks Inc.

May 18, 2011 - (Free Research)
This white paper outlines five things you need to know before developing an email management solution. It also seeks to dispel myths about SharePoint and Exchange. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 19, 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Protecting Healthcare Organizations from Patient Data Loss by Code Green Networks, Inc.

September 08, 2009 - (Free Research)
Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information. 
(WHITE PAPER) READ ABSTRACT |

Information Governance Perspectives from RSD: E-mail Archiving by RSD

August 17, 2009 - (Free Research)
With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts