California Security Breach Information Act Reports

Computer Weekly – 21 March 2023: The risks of an imbalance in AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.
Posted: 17 Mar 2023 | Published: 21 Mar 2023

TechTarget ComputerWeekly.com

IT Transformation Consulting Services: Align your technology direction
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief resource introduces an IT transformation consulting service as a means of achieving effective, value-driven change. Read on now to learn how you can ensure business and IT alignment, spur business growth, and more.
Posted: 09 Oct 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Building a Robust Business Case for High Quality Master Data
sponsored by Melissa
WHITE PAPER: This white paper explains the key elements for building a proper, quantified business case. It presents the measures that are favored by corporate finance departments, and helps develop a strong business case for data quality and MDM projects. A number of real-life examples with quantifiable benefits are also included.
Posted: 19 Apr 2010 | Published: 01 Feb 2010

Melissa

The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

TechTarget Security

IBM Business Process Manager -- Powerfully Simple
sponsored by IBM
WHITE PAPER: IBM Business Process Manager provides the simplicity, efficiency, visibility and collaboration needed to manage highly dynamic and networked business environments. IBM Business Process Manager is easy to deploy and use straight out of the box or in an easily customizable configuration - providing rapid time to value and improved user productivity.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

Advancing Healthcare through the Application of Predictive Knowledge Management
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper examines how the health care industry can proactively support patient-focused care through the use of technology services that enable predictive analysis.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Total Financing for Small and Midsized Businesses
sponsored by Hewlett Packard Company and Intel
RESEARCH CONTENT: Learn about HP's 0% financing for your company or project. Lease and lease to own options are available.
Posted: 09 Jul 2009 | Published: 09 Jul 2009

Hewlett Packard Company and Intel

Best Practices for Managing the Increasing Depth of Compliance Regulation
sponsored by IBM
EGUIDE: According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations.
Posted: 18 May 2011 | Published: 18 May 2011

IBM

Storage strategies for the health IT professional
sponsored by EMC Isilon
PRESENTATION TRANSCRIPT: In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

EMC Isilon