Controlled Vocabularies Reports

A Computer Weekly buyer's guide to big data architecture
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Big data architecture is increasingly proving its worth in business. In this 14-page buyer's guide, Computer Weekly looks at the storage needs that come with artificial intelligence, how to get the most out of data and what it can do to enhance a company's performance.
Posted: 08 Feb 2021 | Published: 10 Sep 2019

TechTarget ComputerWeekly.com

CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa
sponsored by TechTarget ComputerWeekly.com
EZINE: Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?
Posted: 14 Mar 2022 | Published: 16 Mar 2022

TechTarget ComputerWeekly.com

Computer Weekly – 23 May 2017: Global ransomware attack could be a security wake-up call
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.
Posted: 08 Feb 2021 | Published: 23 May 2017

TechTarget ComputerWeekly.com

December ezine: Tech for good
sponsored by MicroScope
EZINE: Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same
Posted: 08 Feb 2021 | Published: 29 Nov 2018

MicroScope

Case Management and Smart Process Applications
sponsored by K2
WHITE PAPER: This report looks at the applicability of smart process applications, the drivers for improved case management, and the feature sets required of a modern case management system.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

K2

Cost-Benefit Analysis: Comparing Key Players for Structured Analytics
sponsored by IBM
WHITE PAPER: Can your organization implement Hadoop clusters without being crippled by IT costs? This resource considers two major players offering structured analytics. Access now to see each of their cost-benefit results and discover the best choice for your business.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

IBM

CW Europe – October 2014 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

TechTarget ComputerWeekly.com

8 Must-Have Criteria for Self-Service Analytics
sponsored by Information Builders
WHITE PAPER: This white paper gives you 8 essential criteria for implementing self-service analytics in your organization. Discover how you can empower your business end users to tap into in-depth insights, driving more informed business moves and increasing visibility into valuable datasets.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Information Builders

Crafting a Data Lifecycle Management Strategy to Control Capacity
sponsored by Iron Mountain
EGUIDE: Jon Toigo, Chairman of the Data Management Institute, explains how information lifecycle management (ILM) strategies can help classify data and control capacity by allocating it to the appropriate storage. Discover how recent improvements in ILM can enable your enterprise to truly benefit from implementing this strategy.
Posted: 08 Aug 2016 | Published: 03 Aug 2016

Iron Mountain

MicroScope E-Zine April 2015
sponsored by MicroScope
EZINE: In this issue, we look at how employers can check staff criminal records and get industry views on the progress of the partnership between IBM and Apple.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

MicroScope