Driving Information-led Business Innovation with IBM Information Server
By: IBM Software Group View more from IBM Software Group >>
Download this next:
Top 10 information management stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
Consolidation and acquisition marked the supplier side of the IT industry in respect of information management in 2019. The question of how modern BI and analytics software shapes up to non relational big data is addressed and suggests that data integration is the enduring, difficult problem for CIOs to solve. Here are Computer Weekly’s top 10 information management stories of 2019.
These are also closely related to: "Driving Information-led Business Innovation with IBM Information Server"
-
Infographic: 6 information governance best practices
By: TechTarget ComputerWeekly.com
Type: Infographic
Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management.
To ensure appropriate content management, organizations need to have controls, permissions and acceptable use policies for data assets. However, as organizations rely more on cloud storage to streamline remote access to content amid the pandemic, content management professionals should reexamine their information governance policies.
Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.
-
Big Data and Analytics Applied to Oil and Gas
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Informational value is the most important commodity throughout the oil and gas industry – from upstream operators to pipelines that deliver products to world markets.
Newly embedded devices and sensors make it easier to collect data at an ever-increasing rate; while cloud storage technologies make it simpler to store the data. However, real value is created from data when informational context and associations are made inside and outside of an organisation.
Find more content like what you just read:
-
How data transforms distributed energy resources
By: Aveva
Type: eGuide
As distributed energy resources (DERs) grow, managing their data becomes critical for effective operations. This white paper explores how a robust, hybrid data infrastructure can help power companies collect, organize, and leverage DER data to improve decision-making and grid integration. Read the full white paper to learn more.
-
How to tackle information overload
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.
-
Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
By: TechTarget ComputerWeekly.com
Type: Resource
Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
-
Information siloed is not information at all - It is just data
By:
Type: Video
In any organization and in any setting, whether it be the intelligence game or internal risk management and governance, siloed information is nothing more than bits and bytes taking up space. To break down information silos requires a place to store the information, interlink it and display it, and brave party to lead the discovery of that means for their information. Instead of focusing on the different aspects of the information we hold, we need to focus on what our part contributes to enriching a greater view. This presentation looks at the evolving story of one client with Archer and how it is starting to attract other areas outside of its silo to share their information and work from a common base or tool.
-
Information siloed is not information at all - It is just data
By:
Type: Replay
In any organization and in any setting, whether it be the intelligence game or internal risk management and governance, siloed information is nothing more than bits and bytes taking up space. To break down information silos requires a place to store the information, interlink it and display it, and brave party to lead the discovery of that means for their information. Instead of focusing on the different aspects of the information we hold, we need to focus on what our part contributes to enriching a greater view. This presentation looks at the evolving story of one client with Archer and how it is starting to attract other areas outside of its silo to share their information and work from a common base or tool.
-
CW APAC, February 2021: Buyer’s guide to data management
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on data management in the Asia-Pacific region, Computer Weekly looks at best practices, Alibaba’s use of databases, the role of artificial intelligence in handling information and data trends to look out for
-
Infographic: Four emerging data integration trends
By: TechTarget ComputerWeekly.com
Type: Infographic
To build up an effective data and analytics architecture, enterprises should look at leveraging new approaches in data integration. In this infographic, we take a look at four emerging data technologies to consider for future data integration projects.
-
Data discovery: how to pick the right software
By: TechTarget ComputerWeekly.com
Type: eGuide
In this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.
-
Combine your IG and BI programs for a 1-2 punch of data value
By: Veritas
Type: eGuide
Use this expert guide to explore the myriad of benefits that an information governance system can provide your business. Discover how records management can be improved when used alongside newer technologies such as analytics and BI.
-
What is PHI (Protected Health Information)?
By:
Type: Video
Protected health information, or PHI -- sometimes also referred to as personal health information -- is any information collected via healthcare services that can potentially identify an individual. This includes medical histories, test results, insurance information, and more. PHI is important for treating individuals and aids in research initiatives, but is also a target for hackers. If not secured properly, PHI can be stolen, sold, or encrypted.
-
How do cybercriminals steal credit card information?
By: TechTarget ComputerWeekly.com
Type: eGuide
Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
Overview of Office 365
By: CDW Corporation
Type: Webcast
This exclusive webcast details the key features of Microsoft Office 365 and will help you work through the implementation process.
-
Object Storage 101
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.
-
Data classification tools: What they do and who makes them
By: TechTarget ComputerWeekly.com
Type: eGuide
Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.
-
3 tips for improved information risk management
By: Tanium
Type: White Paper
Many businesses have identified a gap between their ideas of information risk management strategies and the maturity of their implementations. Through considering the experiences of 12 security professionals, the “Information Risk Management—Expectations Versus Reality” report explores this gap. Continue reading to unlock insights.
-
Business Benefits on Information Security Frameworks
By:
Type: Replay
The speed at which technology and cybercrime rapidly evolve makes it increasingly difficult for organisations to remain cyber-secure and compliant. Consequently, the need to implement effective Information Security frameworks has heightened. With these frameworks in place, organisations can define the processes and procedures to assess, monitor, and mitigate cyber risk. Our upcoming webcast, ‘Business Benefits of Information Security Frameworks’, explores the business value of Information Security frameworks and how to build a robust cyber security strategy. This 45-minute webcast will discuss: • The why and what of standards, regulations, policies, and frameworks • Business benefits associated with Information Security frameworks • Pitfalls to watch out for when engaging with Information Security frameworks • How to best approach ISO 27001 certifications
-
Business Benefits on Information Security Frameworks
By:
Type: Replay
The speed at which technology and cybercrime rapidly evolve makes it increasingly difficult for organisations to remain cyber-secure and compliant. Consequently, the need to implement effective Information Security frameworks has heightened. With these frameworks in place, organisations can define the processes and procedures to assess, monitor, and mitigate cyber risk. Our upcoming webcast, ‘Business Benefits of Information Security Frameworks’, explores the business value of Information Security frameworks and how to build a robust cyber security strategy. This 45-minute webcast will discuss: • The why and what of standards, regulations, policies, and frameworks • Business benefits associated with Information Security frameworks • Pitfalls to watch out for when engaging with Information Security frameworks • How to best approach ISO 27001 certifications
-
Improve customer experience with good customer data
By: Microsoft
Type: eGuide
Learn how you can build customer loyalty and improve customer experiences via quality and effective customer data collection and analysis. In addition, tap into how companies like 7-Eleven, Walgreens, and Mazda are improving customer journeys by enabling mobile loyalty programs.
-
Infographic: Comparing CRM to CX
By: TechTarget ComputerWeekly.com
Type: Infographic
CXM and CRM systems help organizations boost customer satisfaction, but CXM focuses on how customers perceive a brand, while CRM helps employees understand their customers. In this article, we compare these platforms to help you decide which one is best for your business.
-
Where to find MyPension365 information
By:
Type: Video
Where to find MyPension365 information for Advisors, Employers and Employees.
-
From Technical Writer To Information Architect
By:
Type: Talk
In this episode of Coffee and Content, we chat with Brendon Paucek, an Information Architect at Jamf. Brendon will share his professional journey, transitioning from a technical writer to an information architect. We plan to explore the steps involved in moving from creating product documentation to designing information experiences. We'll chat with Paucek about the skills that connect tech writing and information architecture (IA), and how these roles work together to enhance customer experiences. We'll invite him to share real-life examples that illustrate the synergy between technical writing and IA. Additionally, we'll ask for his insights on how both disciplines enhance content strategy and boost customer satisfaction. Can’t make it? Register, and we’ll send you a link you can use to watch a recording when it’s convenient for you. Coffee and Content is brought to you by The Content Wrangler and sponsored by Heretto, a powerful component content management (CCMS) platform to deploy help and API docs in a single portal designed to delight your customers.
-
The components and objectives of privacy engineering
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
-
GDPR: Risk, opportunity and what it means for security professionals
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
-
Coffee and Content: How Information Fuels Exponential Growth
By:
Type: Talk
Join Patrick Bosek and Scott Abel with angel investor and serial entrepreneur, Salim Ismail, co-founder of Singularity University for a chat about the role that information plays in exponential business growth. You'll learn how organizations that aim to grow exponentially value and utilize the information and data they produce to fend off competition from disruptive competitors and you'll discover new and exciting ways organizations around the globe are turning the information they create into new products and services. You'll leave with a solid understanding of why the world's leading institutions are working to transform themselves into information-enabled organizations. Coffee & Content is brought to you by The Content Wrangler and Heretto.
-
Why Data Management is vital for Freedom of Information
By:
Type: Talk
Freedom of Information requests are becoming commonplace in today’s world but what about the data people who ultimately have to action them and provide the answers? This webinar will explain who the Campaign for Freedom of Information are, outline the type of question that may be presented, and consider the effecting on the receiving organisation staff tasked to respond. We will look at what options the data person tasked with producing the answers may have and why properly organised and controlled data is vital. Lee Edwards is a retired Data Architect who has served on the DAMA UK and International boards. She now volunteers as a board member for the Campaign for Freedom of information.
-
Demystifying the Tradecraft of a Threat Informed Defense
By:
Type: Talk
Traditionally, threat hunting and intelligence are reliant on what has already happened: where the adversary has been, what they deployed, and how they got in. We’re following in their tracks and usually, this results in a wild goose chase that can go on for days and weeks at a time. As adversaries continue to get stronger, faster, and smarter, it is no longer enough to reactively chase down the latest threat of the week. That’s where threat-informed defense comes in. Understanding your defensive posture and vulnerabilities (everyone has them) and the exigent threats preying on them (everyone has those too) takes you from chasing the adversary two steps behind to blocking them out before they even get in. In Demystifying the Tradecraft of a Threat Informed Defense, join our panel of threat hunting and secops experts as they divulge what threat-informed defense means to them and how to turn analysis into action so that you can truly grasp where your security posture stands from the adversary’s perspective. Because once you know that you can begin to fill in gaps and mobilize a more strategic defense posture. Some points the panelists will touch on include: - Challenges to achieving threat-informed defense and how to overcome them - The necessary skills and maturity it takes to action threat intelligence - Emerging trends that must be integrated into a SOC - How to utilize and adapt traditional and emerging purple team exercises for your organization Register now to join the conversation and learn how to prepare your organization for any and every threat that comes your way. Speakers Robert Wallace, Senior Director, Mandiant Paul Caiazzo, Chief Growth Officer, SnapAttack Arve Kjoelen, Vice President & Global Chief Security Officer, SnapAttack
-
Network and Information Security Directive (NIS2)
By: NCC Group
Type: White Paper
Prepare for the EU's new Network and Information Security Directive (NIS2) with this comprehensive guide. Learn about the key requirements, consequences of non-compliance, and how to ensure your organization is ready. Get the white paper now to understand the steps to achieve NIS2 compliance.
-
HSBCnet Account Information and Reporting
By:
Type: Video
HSBCnet Account Information and Reporting for larger CMB customers. Pre-recorded demo and Q&A
-
Prising Open Today's Information Operation Threat Landscape in EMEA
By:
Type: Replay
Join Dr Jamie Collier who will prise open today's information operation landscape. We have traditionally focused on only a narrow subset of information operations and with the majority of attention concerned about Russian interference in electoral processes. Yet, today's information operation landscape demonstrates that there is now a greater variety of players involved, a wider spread of victims, and a rich spectrum of aims and objectives. This webinar will explore how the landscape has evolved and the links between information operations and cyber security.
-
Transitioning From Tech Writing To Information Architecture
By:
Type: Talk
Join us for a presentation from Rob Hanna, co-founder of Precision Content, on transitioning from a career in technical writing to a career as an information architect. Rob Hanna has achieved notable recognition in his field, including the Fellow rank from the Society for Technical Communication (STC) and the Enterprise Content Management Specialist (ECMs) designation from AIIM. In 2013, he became an Information Mapping® Certified Consultant™ (IMCC) through Information Mapping International and also holds a Certified Information Professional (CIP) certification from AIIM. Currently, Rob serves as the President and Chief Information Architect at Precision Content Authoring Solutions Inc. in Toronto, Canada. His active involvement extends to being a member of the OASIS DITA Technical Committee, focusing on the Technical Documentation Subcommittee. Additionally, Rob has contributed as a national director for the STC and as the vice-chairman of the STC Certification Commission. Can’t make it? Register, and we’ll send you a link you can use to watch a recording when it’s convenient for you. This educational webinar is brought to you by The Content Wrangler and Precision Content and is sponsored by Heretto, a powerful component content management system (CCMS) platform to deploy help and API documentation in a single portal designed to delight your customers.
-
The Future of Document Processing & Information Management
By:
Type: Talk
In a world rapidly embracing digital transformation, the paradigms of document processing and information management are evolving at an unprecedented pace. Dive into the forefront of this evolution in our upcoming webinar, where we’ll explore the transformative power of intuitive AI and Workflow Automation, and how it redefines the way businesses unlock value from data. Joining us is the esteemed Tori Miller Liu, CEO of The Association for Intelligent Information Management (AIIM). With her vast experience and visionary leadership at AIIM, Tori will share insights on today's information management practices and tomorrow's innovative possibilities. Key Highlights: The Evolving Landscape: A look into the dynamic shifts in document processing and information management, propelled by technological advancements. AI at the Helm: Understanding how AI is not just an addition but is becoming central to information management strategies. Smarter Document Processing: See how KnowledgeLake is delivering on the promise of helping companies easily and cost-effectively modernize their legacy document processing and make the most out of their data. Interactive Q&A Session: Gain clarity on how best to position your organization for the future. This webinar promises to provide invaluable insights, equipping you with the knowledge to navigate the challenges and opportunities of the coming era. Limited spots available!
-
Fast Cash: The Many Faces of Information theft
By:
Type: Talk
Information is everything, especially to a cybercriminal. Things like credit card numbers and credentials are worth cash but on the darkweb medical records can be worth ten times as much. Step into the bizarre world of information theft and trading where nothing is useless in the wrong hands. Find out some of the top ways data leaves an organisation and what steps you can take to stop it.
-
The Golden Triangle: How Data Should Inform Controls
By:
Type: Video
Data is at the heart of the golden triangle. So, shouldn't we use it to inform controls? Join Jack Poller, Senior Analyst at Enterprise Strategy Group (ESG), and Ari Weil to learn: How Cloud migration has changed the data security landscape The impact of Cloud migration on technology, people, and processes How to use this knowledge to inform security controls
-
Ethical Challenges and Intriguing Opportunities for Information Developers
By:
Type: Talk
Join Megan Gilhooly and Scott Abel in a chat with digital transformation guru, Ray Gallon, about the challenges facing information developers today. Gallon, president of the Information 4.0 Consortium, and co-founder of the Transformation Society, will discuss why he believes the opportunities awaiting information developers are "our time to shine." The Content Advantage is brought to you by Zoomin Software — helping customers find the product answers they need while empowering support agents to deliver fast, relevant and efficient support.
-
Information technology skills guide
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.
-
State of Secure Information Management
By:
Type: Video
This survey of 300 industry participants and decision makers reveals what secure information management looks like in 2024 and beyond.
-
Global Information Management Trends in 2023 & Finding the Right Cloud Strategy
By:
Type: Talk
Good information management is essential in our digital-first age. Recent trends encourage increased cloud deployment. But how does this affect information management at your organization? Join our webinar to: • Learn more about global information management trends in 2023. • Understand why the cloud is not just about cost reduction. • Discover how to create a cloud strategy for today’s challenges. Don’t miss your chance to get expert advice on the cloud and other trends in information management.
-
Beyond Information Delivery: Why You Need to Become a Learning Organization
By:
Type: Talk
The concept of a "learning organization" has been around for some time. Organizations that adopt a learning culture are proven to be more competitive, gain more market share, and adapt to changes more efficiently than do their competitors. Learning reduces risk and increases business longevity. However, many organizations focus on the delivery of the information and do not go the extra essential mile to ensure that the information becomes knowledge, and is successfully absorbed into the organization. By embracing the concepts of the learning organization those working in information development and management can create long-lasting positive change within the business, and move from information delivery to knowledge creation. Attend this webinar to discover: • What is a learning organization • Information vs knowledge - what is the difference • Real-life case studies of learning organizations • 5 key tips for creating a knowledge-powered learning culture • How technology can enable (and hinder) learning across an organization This webinar is brought to you by The Content Wrangler and sponsored by Paligo.
-
PEX Network Webinar
By: SAP America, Inc.
Type: Video
Watch this short video and learn how AI can help drive business application intelligence, deliver business information reliably and responsibly, anticipate and automate computer systems' capabilities, improve the user experience, do predictive analytics, and get insights into solving new types of problems.
-
UK police unlawfully processing over a million people's data on Microsoft 365
By: TechTarget ComputerWeekly.com
Type: eGuide
The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
-
Understanding Information Governance, Data Privacy, and Data Breach Exposure
By:
Type: Video
Organizations today, both private and public, should be excited about what is happening with their data and their networks, as advancements in technology have finally caught up with the requirements necessary to handle and manage via controls and classification, any volume of data, regardless of magnitude, in any repository, in any geography, behind the firewall or in the cloud or in a hybrid environment. Organizations can get more value from information assets now due to technology and data mining. However, the rewards of data value must be considered with the risk of a network compromise and the related data privacy and cybersecurity obligations. In this expert presentation a panel of cybersecurity, information governance, and eDiscovery experts will present and describe a framework for deploying and enhancing organizational information governance programs. These programs, when adequately implemented, should ensure cyber-incident preparedness and help organizations demonstrate reasonable security measures for sensitive assets. Webcast Highlights + Balancing Risk and Value: Obligations and Opportunities + A Programmatic Approach to Information Governance: From NIST to IG Integration Hub + Anywhere and Anytime: Considering Network Vulnerability + To Trust or Not to Trust: Working Toward the Zero Trust Architecture + Defensible Data Disposition and Remediation: From Development to Framework + Sanitized for Your Protection: NIST Guidelines for Media Sanitization + Avoid Boiling the Ocean: A Reasonable Cybersecurity Framework + Tying It All Together: Questions to Ask Your Vendors Expert Speakers + Matthew Miller – Senior Vice President of Information Governance and Data Privacy, HaystackID + Ashish Prasad – Vice President and General Counsel, HaystackID + Michael Sarlo – Chief Innovation Officer and President of Global Investigation Services, HaystackID + John Wilson Chief Information Security Officer and President of Forensics, HaystackID
-
Panel Discussion: Enabling Data Driven Supply Chains through Information Sharing
By:
Type: Talk
Access to on-demand, real time and end-to-end data is key to unlocking the full potential of logistics and supply chains. From Manufacturers, Logistic Service Providers (LSP)/Third Party Logistics providers (3PLs), port authorities and terminal operators through to regulatory bodies, Beneficial Cargo Owners (BCO) financiers and the end consumer; all stand to benefit from information sharing. In this session our panel of industry experts discuss -The supply chain data and information landscape -The top supply chain opportunities with information sharing -Information sharing bottlenecks and challenges -What can logistics and supply chain professionals do about it? Join this session to learn how business intelligence and information leaders will maximise the RoI of, and unlock new business models through, information sharing for data driven logistics and supply chains.
-
6 data preparation best practices for analytics applications
By: TechTarget ComputerWeekly.com
Type: eGuide
Amid issues of data sources, data silos and data quality, the process of collecting and prepping data for analytics applications requires a practical and effective approach. In this infographic, we put together 6 data preparation best practices for analytics applications to help enterprises master their data.
-
People continue to be wary of AI chatbots in healthcare and false information
By: XtelligentMedia Healthcare
Type: eGuide
Although more than half of patients don't trust AI chatbots in healthcare, just under a fifth use the tools regularly.
-
GDPR Training Lesson 2 - Collecting Personal Information
By:
Type: Video
Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss the six core principles of the GDPR and how it affects how you collect and process personal information.
-
Implement RAG Architectures for Enhanced Information Retrieval
By:
Type: Video
Retrieval augmented generation (RAG) is a technique for improving the accuracy of large language models (LLM) by combining information retrieval from proprietary data sources with text generation. This session explores how to implement the RAG architecture, a powerful framework for the RAG technique that integrates the strengths of open LLMs—such as Llama 3—and vector databases to improve contextual relevance and accuracy of information retrieval. This session shows how to: Use open source models and tools to create a robust retrieval system that can efficiently process and generate natural language responses. Set up a vector database to efficiently store and retrieve embeddings. Integrate RAG systems into existing infrastructure, including the hardware and software requirements for deploying these advanced models. Apply best practices for fine-tuning and customizing RAG models and vector databases for specific industry use cases through demos of practical applications. Skill level: Intermediate
-
Does a Microsoft Only Approach to Information Governance Make Sense?
By:
Type: Talk
There’s no universal approach to information governance. Strategies are diverse and, because they dictate your information governance policies and procedures, getting it right matters. One popular option is a Microsoft-based setup. But how effective is that? This webinar can help! Michael Sampson of Osterman Research and Laurence O’Brien from Micro Focus lead a discussion around the pros and cons of using Microsoft 365 to manage your information governance. Among other topics, we’ll cover: • Correctly classifying every information type in an organization’s data landscape. • Discerning the data requiring special protections from more expendable files. • Deciding how to store and otherwise manage data from the point of creation. • Ensuring only those authorized can access different groupings of data. • Using automated mechanisms to audit access and mitigate over-exposure. • Providing the ability to audit communication for compliance. • Filtering repositories to identify data potentially responsive to eDiscovery requests. • Excluding irrelevant data before creating a collection for external review. Don’t miss this research-driven discussion. Register for our webinar now.