Qualified Dublin Core Reports

IT Priorities 2021 - European Topics Infographic
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This year, a survey was conducted quizzing nearly 500 European IT sector professionals to gather what topics they identified as being imperative for 2021. In this infographic see whether remote working is here to stay, if there will be shifts in information management trends and what infrastructure tools will be deployed by most in 2021.
Posted: 08 Feb 2021 | Published: 14 Dec 2020

TechTarget ComputerWeekly.com

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

Missing PDF Fonts: How Metadata Affects Text Optimization
sponsored by Amyuni Technologies
WHITE PAPER: This document is the second in a series of white papers that will explore the problem of missing font information in PDFs. Since its inception, the PDF has revolutionized the way individuals and businesses communicate and exchange information. The promise to maintain informational integrity and display content consistently across many platforms.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

Amyuni Technologies

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures
sponsored by Sybase, an SAP company
WHITE PAPER: Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk!
Posted: 17 Jun 2011 | Published: 15 Jun 2011

Sybase, an SAP company

E-Guide: Prioritizing Application Security Concerns
sponsored by TechTarget Security
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Security

Presentation Transcript: Enabling The Business Governance Of Data
sponsored by ASG Software Solutions
PRESENTATION TRANSCRIPT: In this presentation transcript, Scott McCurdy, SVP of Business Solutions at ASG and featured guest Rob Karel, Principal Analyst at Forrester Research, discuss how enterprises are linking technical metadata to the formal management of business terms to achieve true enterprise data governance.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

ASG Software Solutions

Business Continuity Management Systems
sponsored by TechTarget ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

TechTarget ComputerWeekly.com

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Information Governance Perspectives from RSD: E-mail Archiving
sponsored by RSD
WHITE PAPER: With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions
Posted: 17 Aug 2009 | Published: 17 Aug 2009

RSD

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.