e-Records Reports

Setting the Stage for the Data Governance: A CIO's Guide
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Benefits of Enterprise File-Sync-and-Share Tools
sponsored by Dropbox
EGUIDE: Neither transparency nor security can suffer at the expense of the other, which means IT and security teams could benefit from file-sync-and-share tools. This expert guide details the benefits of enterprise file-sync-and-share software, and the 10 risks you run when you don't use them.
Posted: 06 Jun 2018 | Published: 29 May 2018

Dropbox

Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
sponsored by Iron Mountain
WEBCAST: This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
Posted: 29 Jan 2014 | Premiered: Nov 19, 2013

Iron Mountain

E-Book: Storage for PACS - Infrastructure and Implementation Decisions for Managing Digital Image Storage
sponsored by TechTarget Health IT and TechTarget Storage
EBOOK: For many medical institutions, the expense and management burdens of storing the big files created by picture archiving and communications systems (PACS) are fast growing beyond control. In response, some hospital IT executives are turning to data storage outsourcers.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

All resources sponsored by TechTarget Health IT and TechTarget Storage

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

Record Management is Getting a Facelift
sponsored by TechTarget Data Management
EZINE: Access this expert resource to learn why technology trends, and the consumerization of IT services, have opened record managers up to a host of daunting expectations – with digitizing records topping the list.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

TechTarget Data Management

KishHealth System speeds delivery of medical records with HP Converged Storage
sponsored by HP and Intel® Xeon® processors
CASE STUDY: This case study demonstrates how one organization improved the response time of its electronic health records system and provided scalability for its PACS with converged storage.
Posted: 01 Aug 2013 | Published: 23 Aug 2012

HP and Intel® Xeon® processors

Important Versus Vital Records: The Magic 5% You Can't Live Without
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn the steps it takes to properly identify and protect your vital records. Also gain a deeper understanding of the risks associated with inadequate preservation, how to evaluate storage options, and more.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Iron Mountain

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 10 Mar 2014 | Published: 31 Dec 2013

Iron Mountain

Data Management Guidelines: Four Records Retention Issues To Address
sponsored by Symantec Corporation
EGUIDE: This e-guide details data management guidelines to help you determine what you should keep when implementing a records retention policy. Learn about four issues that can occur if you retain too much unnecessary data, including access trouble, cost influx, and more.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Symantec Corporation