DG Reports

10 steps to building a data catalog
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Building a data catalog is an important initiative for many IT and data management teams. But organizations shouldn't undertake a data catalog project without getting input from business users. In this e-guide, learn why data catalogs have become a core component of the data management environment, and the 10 steps to build a data catalog.
Posted: 29 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

The Ultimate Guide to Enterprise Content Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
Posted: 05 Oct 2022 | Published: 05 Oct 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to big data
sponsored by TechTarget ComputerWeekly.com
EBOOK: Companies are switching on to the advantages of big data. In this 13-pagebuyer's guide, Computer Weekly looks at data analytics, how to get value out it and the benefits of process mining.
Posted: 08 Feb 2021 | Published: 06 Jun 2018

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 08 Feb 2021 | Published: 20 Aug 2019

TechTarget ComputerWeekly.com

Infographic: 6 information governance best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management. Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.
Posted: 05 May 2022 | Published: 05 May 2022

TechTarget ComputerWeekly.com

Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016

TechTarget ComputerWeekly.com

CIO Trends #10: Benelux
sponsored by TechTarget ComputerWeekly.com
EGUIDE: If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.
Posted: 08 Feb 2021 | Published: 16 Jan 2020

TechTarget ComputerWeekly.com

GDPR: Risk, opportunity and what it means for security professionals
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Big data security management embraces governance, privacy
sponsored by TechTarget Data Management
EBOOK: Cyberattacks, GDPR and CCPA compliance, and the COVID-19 pandemic present serious challenges to big data security management practices. Data managers look to a combination of governance policies and evolving data security tools to protect the quality and integrity of their data stores.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

TechTarget Data Management