Data Content Quality Reports

CW APAC, June 2020: Trend Watch - data protection
sponsored by TechTarget ComputerWeekly.com
EZINE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 08 Feb 2021 | Published: 11 Jun 2020

TechTarget ComputerWeekly.com

CW APAC, April 2021: Trend Watch: IoT in India
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.
Posted: 26 Apr 2021 | Published: 26 Apr 2021

TechTarget ComputerWeekly.com

Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017

TechTarget ComputerWeekly.com

Who's Afraid of the Big (Data) Bad Wolf?
sponsored by IBM
WHITE PAPER: By automating information integration and governance and deploying it at the point of data creation, organizations can boost big data confidence. Access this whitepaper now to discover the importance of data integration, and how your business will benefit from such a methodology.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

IBM

A Computer Weekly buyer’s guide to data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

Good Data Governance Programs: Why the Urgency?
sponsored by TechTarget Data Management
EZINE: Companies aren't gaining enough value from big data. That's why there's a greater need to establish data handling policies and procedures that only good data governance programs can provide. Explore good use vs. abuse of customer data (Wells Fargo, Target, and Bank of America), 4 data governance concerns and best practices, and much more.
Posted: 13 Jun 2017 | Published: 06 Jun 2017

TechTarget Data Management

Identifying Cloud and Data Quality Opportunities for Big Data
sponsored by IBM
WHITE PAPER: Managing and analyzing data in the cloud has many benefits, but adoption levels remain relatively low, despite the potential benefits. Get the numbers behind leveraging the cloud for business intelligence and big data analytics, and find out how maximizing analytics' potential relies on the quality of your data.
Posted: 30 Jun 2016 | Published: 29 Jun 2016

IBM

CW APAC, June 2020: Trend Watch - data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

TechTarget ComputerWeekly.com

Information Empowerment for Your Evolving Data Ecosystem
sponsored by IBM
WHITE PAPER: This whitepaper discusses the new features of IBM's InfoSphere Information Server V11.5, which helps you understand data and cleanse, monitor, transform, and deliver it.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

IBM

MDM: 5 Steps to Implementing a Successful Program
sponsored by Triniti
EGUIDE: Companies will typically begin MDM efforts in one domain area before expanding to a multi-domain program model. When taking the multi-domain leap, it's critical to keep key elements in mind. In an excerpt from a MDM book, experts explain how to identify MDM domains and your master data. Plus, learn 5 steps to implementing a MDM program.
Posted: 20 Mar 2017 | Published: 13 Mar 2017

Triniti