Information Quality Reports

Data is pure gold in the right hands
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Applying technology like machine learning to transaction data could significantly increase the proportion of money laundering activity that is detected. It is projects like this that are driving demand for data science skills. In this e-guide, read about the power of data against money laundering, and how to get the skills to turn data into gold.
Posted: 08 Feb 2021 | Published: 13 Nov 2019

TechTarget ComputerWeekly.com

Computer Weekly – 24 May 2022: Set innovation free and make great ideas a reality
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Gartner's call to innovate – and innovation across retail, the circular economy and the automotive sector. We talk to Verastar's CTO about customer engagement in its small business services. And we examine how poor data quality is frustrating corporate desires to be data-driven. Read the issue now.
Posted: 23 May 2022 | Published: 24 May 2022

TechTarget ComputerWeekly.com

How to unlock the true value of data
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.
Posted: 08 Feb 2021 | Published: 19 Aug 2019

TechTarget ComputerWeekly.com

The ultimate guide to data preparation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Poor data equates to wrong decisions, bias in the AI algorithm and flawed decision-making. What's more, data that personally identifies an individual can only be used in very specific ways, as stipulated by GDPR. Read about data preparation in this e-guide.
Posted: 08 Feb 2021 | Published: 22 Oct 2019

TechTarget ComputerWeekly.com

Informatica Data Integration Hub
sponsored by Informatica
WHITE PAPER: Even the best managed large-scale enterprise data integration environments grow complex over time, and are continuously pressured to operate leaner and more efficiently. In this white paper, learn about an innovative publish-and-subscribe model that can be applied to data integration, delivering automation without compromising control.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

Informatica

IBM Cognos Framework Manager - Ensure consistent business intelligence data across the enterprise
sponsored by IBM
WHITE PAPER: This resource examines the value of metadata in business intelligence, and introduces a metadata modeling tool for managing access to all existing data sources and ensuring data trustworthiness.
Posted: 15 Jan 2014 | Published: 31 Oct 2010

IBM

MDM: 5 Steps to Implementing a Successful Program
sponsored by Triniti
EGUIDE: Companies will typically begin MDM efforts in one domain area before expanding to a multi-domain program model. When taking the multi-domain leap, it's critical to keep key elements in mind. In an excerpt from a MDM book, experts explain how to identify MDM domains and your master data. Plus, learn 5 steps to implementing a MDM program.
Posted: 20 Mar 2017 | Published: 13 Mar 2017

Triniti

Who's Afraid of the Big (Data) Bad Wolf?
sponsored by IBM
WHITE PAPER: By automating information integration and governance and deploying it at the point of data creation, organizations can boost big data confidence. Access this whitepaper now to discover the importance of data integration, and how your business will benefit from such a methodology.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

IBM

Business Information ANZ May 2014
sponsored by TechTarget Data Management
EZINE: This ezine looks at how businesses in the ANZ are attempting to harness Big Data.
Posted: 28 May 2014 | Published: 29 Apr 2014

TechTarget Data Management

Cybersecurity and Privacy Compliance: The Delicate Balance
sponsored by TechTarget Security
EBOOK: This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

TechTarget Security