Learning About Requirement ActivityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Learning About Requirement Activity returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Business Activity Monitoring (BAM)
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Databases
 •   Network Security
 •   Requirements Management

Related Searches
 •   Learning About Alabama
 •   Learning About Examples
 •   Learning About Market
 •   Learning About Requirement Pay
 •   Learning Article
 •   Learning Multi
 •   Learning Tutorials
 •   Operational Learning About
 •   Questions Learning
 •   Report Learning About Requirement
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments by Centrify Corporation

September 20, 2012 - (Free Research)
This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities. 
(WHITE PAPER) READ ABSTRACT |

Delivering Value through Best Practice for Systems Engineering by IBM

February 25, 2010 - (Free Research)
View this webcast to learn how to ensure that stakeholder requirements are met effectively and efficiently; how to achieve early verification through systems model execution; how to ensure effective hand-off to design and implementation activities and much more. 
(WEBCAST)

Information Governance Perspectives from RSD: E-mail Archiving by RSD

August 17, 2009 - (Free Research)
With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions 
(WHITE PAPER) READ ABSTRACT |

The State of Database Management by IBM

June 2008 - (Free Research)
Data managers are concerned about managing the explosion of data, and are looking for ways to manage the process. In this survey from IDUG, learn about improving database performance and overall corporate performance. 
(WHITE PAPER) READ ABSTRACT |

Oracle Data Guard with Oracle Database 11g Release 2 by Oracle Corporation UK Ltd

September 2009 - (Free Research)
Read this white paper to learn about a unique data protection and recovery solution that provides the management, monitoring, and automation software to create synchronized standby databases that protect data from failures and other disasters. 
(WHITE PAPER) READ ABSTRACT |

PCI-Compliant Cloud Reference Architecture by HyTrust

March 2011 - (Free Research)
This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

Ten Steps to Better Requirements Management by IBM

October 2008 - (Free Research)
Requirements definition and management is an activity that has the potential to deliver a high, fast ROI. This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management. Read on to learn how better requirements translate into easier, higher quality projects. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Essential Guide to Identity & Access Management by Information Security Magazine

May 2009 - (Free Research)
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more. 
(EGUIDE) READ ABSTRACT |

Conquer the I/O demands posed by storage by Dell, Inc.

November 2013 - (Free Research)
Learn how to boost storage performance for I/O-intensive enterprise applications by optimizing workloads in virtual desktop, messaging and database environments. 
(WHITE PAPER) READ ABSTRACT |

Boosting storage performance for I/O-intensive enterprise applications by Dell, Inc.

October 2013 - (Free Research)
Learn how to boost storage performance for I/O-intensive enterprise applications by optimizing workloads in virtual desktop, messaging and database environments. 
(WHITE PAPER) READ ABSTRACT |

Agile ALM: Automation for the application lifecycle by Hewlett-Packard Company

May 2012 - (Free Research)
Read this expert e-guide to learn about both open source and commercially available application lifecycle management (ALM) automation tools for requirements traceability, for design and for test. Then, learn a three-step process that will improve the flow of the software delivery process. 
(EGUIDE) READ ABSTRACT |

Business Activity Monitoring: Process Control for the Enterprise by SL Corporation

May 2008 - (Free Research)
This whitepaper discusses how lessons can be taken from traditional process monitoring applications and applied in today's more complex multi-dimensional environments. 
(WHITE PAPER) READ ABSTRACT |

ArcSight IdentityView: Increasing Security and Compliance with a 360-Degree View of User Activity by ArcSight, an HP Company

June 2010 - (Free Research)
This paper describes ArcSight IdentityView, a new application designed to leverage the power of the ArcSight SIEM Platform and apply it to user monitoring, for security and compliance purposes. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012 by Symantec Corporation

June 2012 - (Free Research)
In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Webcast - Closing the Four Security Risk Gaps of Mainframe Console Access by I/O Concepts Inc.

December 2008 - (Free Research)
The information presented in this webcast can help you be sure your company's commitment to security includes all levels of mainframe access. 
(WEBCAST) READ ABSTRACT |

When ERP is Not the Right Choice by IBM Cognos

February 2007 - (Free Research)
This white paper summarizes the results of a Ventana Research initiative about enterprise resource planning (ERP) systems. Learn the breadth of ERP, identify the appropriate times to use ERP systems and when to identity better alternatives. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Distributed Data Capture: Reducing the Cost of Remote Business Processes by Kofax, Inc.

March 2011 - (Free Research)
In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process. 
(WHITE PAPER) READ ABSTRACT |

Integrating Use Cases, Storyboarding and Prototyping by Ivar Jacobson Consulting

June 2008 - (Free Research)
This white paper discusses how to optimize requirements gathering and documentation through the integration of use case, storyboarding and prototyping. 
(WHITE PAPER) READ ABSTRACT |

The Financial Edge™: Fund Accounting Software for Nonprofits by Blackbaud

The Financial Edge gives you all the information you need to make the best financial decisions for today and tomorrow. Think of it as insurance for your organization’s future. 
(ASP & SOFTWARE PRODUCT)

Tips on Implementing Database Auditing to Address Security & Compliance Requirements  by IBM

December 2010 - (Free Research)
Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements. 
(BOOK) READ ABSTRACT |

How to tackle trust management by ComputerWeekly.com

November 2010 - (Free Research)
Trust, or the placing of it, is one of the key activities at the core of our human endeavours. The process of placing trust is simpler when the process is physical and proximal - that is when you can see, feel and touch that which you are about to trust. 
(WHITE PAPER) READ ABSTRACT |

Behavior Driven Development: Agile Testing with Red Hat JBoss BRMS by Red Hat

June 2013 - (Free Research)
In this resource, discover how a software development process known as behavior-driven development, combined with a tool that integrates business rules management, business process management (BPM), and complex event processing (CEP), enables you to speed up and improve the application delivery lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Nimble employers turn to agile project management by ComputerWeekly.com

November 2010 - (Free Research)
In spirit, both traditional and agile project delivery embody similar principles and practices that aim to deliver measurable results 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts