Databases Cycles Risks InWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Databases Cycles Risks In returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Data Security
 •   Application Lifecycle Management(ALM)
 •   Database Administration
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Warehousing
 •   Treasury / Cash / Risk Management
 •   Data Center Management

Related Searches
 •   Building Databases Cycles Risks
 •   Databases Cycles Risks Productivity
 •   Databases Cycles Risks Reviews
 •   Databases Cycles Unix
 •   Databases Outsource
 •   Manufacturing Databases Cycles Risks
 •   Outsource Databases Cycles
 •   Supplier Databases Cycles
 •   Test Databases Cycles
 •   Tools Databases Cycles Risks
Advertisement

ALL RESULTS
1 - 25 of 442 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Managing Risk in Outsourced Manufacturing by E2open

December 2008 - (Free Research)
This white paper looks at some of the management risks and challenges associated with outsourced manufacturing strategies and summarizes the proven ways used by companies that have successfully resolved or mitigated these risks. 
(WHITE PAPER) READ ABSTRACT |

Enabling Continuous Compliance Across the Enterprise by IBM

June 2011 - (Free Research)
Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions. 
(WHITE PAPER) READ ABSTRACT |

Handle with Care: Calculating and managing risk is tricky business by SearchSecurity.co.UK

March 2011 - (Free Research)
In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape. 
(EZINE)

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions by BeyondTrust Corporation

February 2009 - (Free Research)
This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important. 
(ARTICLE) READ ABSTRACT |

Discovering Vulnerable Web Applications by Qualys

August 2012 - (Free Research)
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program. 
(WHITE PAPER) READ ABSTRACT |

Join Levi Strauss & Company and SAP: Drive Innovation, Reduce Project Risk with SAP Application Life cycle Management Solutions by SAP America, Inc.

May 2012 - (Free Research)
Your company’s success relies heavily on the quality of its core  business applications. Watch this webcast to see how Levi Strauss & Company cut costs and improved their operational efficiency with SAP’s application life cycle management solution (ALM). 
(WEBCAST) READ ABSTRACT |

Innovative Business Continuity Solutions with Syncsort BEX Advanced Recovery. by Syncsort

August 2008 - (Free Research)
This paper describes a single, fifth generation data protection model that assures 24 x 7 uninterrupted business continuity for your organization's mission-critical applications in all information-related disaster scenarios. 
(WHITE PAPER) READ ABSTRACT |

Exploiting IT Networks to Create Sticky Services by Alcatel-Lucent

January 2008 - (Free Research)
This paper has examined the kinds of sticky services deployable today over advanced IP networks. 
(WHITE PAPER) READ ABSTRACT |

SOA Best Practice Report - Governance Led Practices to Deliver Effective Semantic Integration by Progress

February 2011 - (Free Research)
Poor quality data can spell disaster for SOA or BPM initiatives. Enterprise-wide data initiatives cross many boundaries, both technical and departmental, and are often high risk. This paper describes how a governance led approach can progressively deliver semantic integration with minimum short term cost, less complexity and reduced maintenance. 
(WHITE PAPER) READ ABSTRACT |

9 Questions Decision Makers Will Ask About Infrastructure Performance Management by Virtual Instruments

October 2013 - (Free Research)
This resource provides in-depth answers to 9 questions decision-makers will ask when evaluating infrastructure performance management. 
(WHITE PAPER) READ ABSTRACT |

Demystifying Big Data: Facts vs. Hype by HP & Intel®

January 2013 - (Free Research)
Access this guide as Gartner explores big data's hype cycle, which includes a heady definition, as well as 47 technologies and terms related to big data- everything from data scientist and cloud-based grid computing, to predictive analytics and open government data. 
(EGUIDE) READ ABSTRACT |

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by Tripwire, Inc.

May 2010 - (Free Research)
This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Manage Enterprise Data with Integrated Data Management White Paper by IBM

March 2010 - (Free Research)
Adopting an Integrated Data Management strategy can be a highly effective way to help IT support business growth, facilitate data governance and manage costs. It is also key to helping ensure that the enterprise derives maximum competitive advantage from its data. 
(WHITE PAPER) READ ABSTRACT |

Practical Approaches for Securing Web Applications across the Software Delivery Lifecycle by IBM

July 2009 - (Free Research)
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don’t understand, is how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Breaking the Business Intelligence Log Jam by ParAccel

May 2009 - (Free Research)
In an ongoing business intelligence project, the new required updates pile up at a steady or accelerating rate, while the effort to make each change grows as the system grows more complex. The inevitable result is a growing backlog of unmet business needs. That build-up is the BI Log Jam. Read this analyst report to learn how to break the cycle. 
(ANALYST REPORT) READ ABSTRACT |

Improving Order-To-Cash Cycle by Wipro Technologies

January 2009 - (Free Research)
Order to Cash cycle--the sequential steps from acquisition of a customer's order up to the customer's money reaching the operator's bank account represents the financial lifeblood of any communications company. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

Software Quality Optimization: Business Transformation and Risk by IBM

March 2009 - (Free Research)
Information technology is undergoing constant innovation. To keep pace, software development organizations need to release business-critical software in less time, but this increases risk and often results in compromised quality. So the question becomes: How can you save time and reduce costs without sacrificing quality? Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Shorten release cycles by bringing developers to application lifecycle management by Hewlett-Packard Company

November 2011 - (Free Research)
This white paper explores the capabilities and benefits that the next phase of application lifecycle management (ALM) must deliver in order to overcome the challenges of application delivery. 
(WHITE PAPER) READ ABSTRACT |

Driving Storage Efficiency with Real-time Compression by IBM Real-time Compression

December 2010 - (Free Research)
This podcast outlines the steps that the Insurance company took to achieve their IT spend objective and also their long term storage efficiency goals. 
(PODCAST) READ ABSTRACT |

Why CRM Implementations Fail….And What To Do About It by Scribe Software Corporation

March 2011 - (Free Research)
Companies are scrambling to implement CRM systems, but they might not be getting what they bargained for if they're not careful. Up to 80% are reporting they're not getting what they were promised. Read this paper and learn how to avoid pitfalls, develop a strategy for your CRM system, and much more. 
(WHITE PAPER) READ ABSTRACT |

Streamlining SAP Upgrades with VMware Infrastructure 3 by VMware and Intel

November 2008 - (Free Research)
In this Webcast, speakers from VMware and SAPwill show you how VMware Infrastructure can help you upgrade your SAP applications and efficiently manage your SAP infrastructure. 
(WEBCAST) READ ABSTRACT |

Predictable Performance for Dynamic Oracle Databases by Hitachi Data Systems

November 2013 - (Free Research)
Check out this short paper to examine how to control capital and operational storage costs, while increasing performance, data protection and flexibility in your Oracle environment. Read on now to learn more. 
(DATA SHEET) READ ABSTRACT |

Mom, Apple Pie, and the Office of Comptroller of the Currency by Iron Mountain

February 2014 - (Free Research)
Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 442 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts