Plans Basel 2Welcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Plans Basel 2 returned the following results.
RSS What is RSS?
Related Categories

 •   Business Planning
 •   Business Intelligence Solutions
 •   Business Process Management (BPM)
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Testing and Analysis
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Service Oriented Architecture (SOA)
 •   Technology Planning and Analysis
 •   Treasury / Cash / Risk Management

Related Searches
 •   Information Plans Basel
 •   Plans Applications
 •   Plans Basel 2 Capture
 •   Plans Basel Basics
 •   Plans Buy
 •   Plans Products
 •   Programs Plans Basel
 •   Research About Plans Basel
 •   Server Plans Basel
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Rules, risk and the potential for profit in the world of Basel III by IBM

September 30, 2013 - (Free Research)
Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III 
(WHITE PAPER) READ ABSTRACT |

Enterprise Risk Management in the Financial Services Industry: International Benchmark Survey May 2007 by SAS

September 2008 - (Free Research)
This report presents the 2007 results of SAS' annual international benchmark survey on enterprise risk management (ERM) in the financial services industry. 
(WHITE PAPER) READ ABSTRACT |

Facilitating “sound practices” in risk management with IBM OpenPages ORM by IBM

February 2012 - (Free Research)
This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee. 
(WHITE PAPER) READ ABSTRACT |

InfoSphere Optim Data Growth Solution for Application Retirement by IBM

August 2011 - (Free Research)
Data retention regulations, such as Sarbanes-Oxley, Basel II and HIPAA, require organizations to retain historical data in its original business context for specified periods of time. Non-compliance could result in costly penalties and fines. Learn about a data retention approach that archives critical business information. 
(WHITE PAPER) READ ABSTRACT |

Financial Services Report: Reshaping ICT, Reshaping Business by ComputerWeekly.com

November 2012 - (Free Research)
This report from Fujtsu assesses the IT trends and prioirties in the financial services industry. 
(IT BRIEFING) READ ABSTRACT |

RSA SecurID extension for the IBM System i by Safestone Technologies

October 2010 - (Free Research)
White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk Management and Compliance (GRC) by ComputerWeekly.com

February 2014 - (Free Research)
Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. 
(ANALYST REPORT) READ ABSTRACT |

Laws, regulations and compliance: Top tips for keeping your data under your control by Sophos, Inc.

December 2008 - (Free Research)
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution. 
(WHITE PAPER) READ ABSTRACT |

Deliver Effective Governance for Identity and Access Management by IBM

June 2009 - (Free Research)
Organizations should consider a thorough approach to IAM governance that meets the requirements of discovering, documenting and analyzing user access; establishing a process for user access governance; ensuring that constraints help manage business conflict; enforcing policies; and continuous monitoring. 
(WHITE PAPER) READ ABSTRACT |

A Framework for 2.0 Adoption in the Enterprise by NewsGator

May 2010 - (Free Research)
This report draws from the knowledge of full‐time practitioners who orchestrate enterprise‐wide rollouts in their organizations. We outline patterns of adoption and highlight practical insight that will help your company and your clients plan for the process and help set realistic expectations for a successful 2.0 rollout. 
(WHITE PAPER) READ ABSTRACT |

Load Testing 2.0 - The Next Generation of Load Testing for the Web 2.0 World by Gomez

July 2009 - (Free Research)
Read this paper to learn why Load Testing 2.0 solutions are needed and who benefits. Learn best practices to get business value out of advanced load testing features, the limits of load testing 1.0 solutions, how today's approach complements existing 1.0 solutions, and what factors are important for selecting successful Load Testing 2.0 solutions. 
(WHITE PAPER) READ ABSTRACT |

Epicor ICE 2.0: Introducing Next-Generation Business Architecture by Epicor Software Corporation

November 2008 - (Free Research)
Epicor Internet Component Environment (ICE) 2.0 is a modern business architecture and application framework which utilizes a 100% service-oriented architecture (SOA) and Web 2.0 technologies for a new breed of enterprise solution. 
(WHITE PAPER) READ ABSTRACT |

Preparing for the Web 2.0 World: How Enterprises Need to Think About Emerging Social Technologies by Sun Microsystems, Inc.

April 2009 - (Free Research)
IDC expects that the significant adoption of Enterprise 2.0 technologies in the enterprise will have a dramatic impact on how organizations capture, discuss, distribute, and protect their information. If companies are not already planning for this change, they will find themselves increasingly exposed and vulnerable. 
(ANALYST REPORT) READ ABSTRACT |

Private Cloud E-Zine Vol. 2 No.2 Cloud Capacity Planning for the Future and Navigating Cloud SLAs by SearchCloudComputing.com

April 2012 - (Free Research)
Explore the latest cloud computing trends and gain exclusive tips for how you can successfully define SLAs, plan for capacity, and more in this expert e-zine. 
(EZINE)

2011–2012 IT Budget Benchmarks by ComputerWeekly.com

November 2011 - (Free Research)
The Corporate Executive Board IT Budget Benchmarking Survey assess IT spending,  staffing, and outsourcing levels at more than 175 organizations globally, representing roughly US$38 billion in IT spend. Download for the latest IT budget trends. 
(IT BRIEFING) READ ABSTRACT |

Business Process Management, Service-Oriented Architecture, and Web 2.0: Business Transformation or Train Wreck? (Spanish version) by Oracle Corporation

August 2008 - (Free Research)
Read this white paper for a discussion of the benefits and risks associated with the solution provided by the convergence of business process management, service-oriented architecture, and Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

Business Process Management, Service-Oriented Architecture, and Web 2.0: Business Transformation or Train Wreck? by Oracle Corporation

August 2008 - (Free Research)
Read this white paper for a discussion of the benefits and risks associated with the solution provided by the convergence of business process management, service-oriented architecture, and Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

Business Management in the Age of Enterprise 2.0 by Oracle Corporation

December 2008 - (Free Research)
In this analysis, Frank Buytendijk examines what information management means, and describes a complete spectrum of business cases, ranging from tactical cost reduction to transformational impact on the organization’s business model. 
(WHITE PAPER) READ ABSTRACT |

Converting Linux and Windows Physical and Virtual Machines to Oracle VM Virtual Machines by Oracle Corporation

December 2008 - (Free Research)
This document describes the virtual machine conversion functions built into Oracle VM in Release 2.1.2, and how you can plan and execute the virtual machine conversions using Oracle VM. 
(WHITE PAPER) READ ABSTRACT |

HP TruClient technology: Accelerating the path to testing modern applications by Hewlett-Packard Company

December 2010 - (Free Research)
This paper explores testing Web 2.0 applications and looks into reasons why traditional testing solutions aren’t a good fit for testing applications built with Ajax and other Web 2.0 technologies. It introduces the HP TruClient technology, and discusses how this revolutionary technology helps advance, accelerate, and simplify performance testing. 
(WHITE PAPER) READ ABSTRACT |

The Challenges of Automated Application Assessments in a Web 2.0 World by Hewlett-Packard Company

February 2010 - (Free Research)
This white paper describes the challenges of automated penetration testing or application scanning of Web 2.0 applications. The features that security experts should expect in a black box or dynamic application scanner are also outlined here. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 22 January 2013: Technology takes off at Heathrow Terminal 2 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the building of Heathrow's high-tech Terminal 2 and hear from its CIO about the IT innovations. John Lewis saw 44% online sales growth over Christmas – we find out how the IT team delivered. And News International talks about moving its IT to Amazon's public cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

HP Data Protector 6.2 software integration with HP 3PAR Storage System by HP

September 2011 - (Free Research)
This white paper provides detailed information on how to integrate HP Data Protector software with HP 3PAR Storage Systems. The solution is based on Data Protector Zero Downtime Backup concept. The 3PAR InServ version mentioned and tested here is 2.3.1. 
(WHITE PAPER) READ ABSTRACT |

The Definitive Guide to Windows Application Server and Backup 2.0 - Chapter 3: Whole Server Backups by AppAssure Software, Inc.

September 2009 - (Free Research)
Ready to start ensuring solid backups in your environment, the Backup 2.0 way? That's what this chapter is all about, and what I call "whole server backups" is definitely the right place to begin. In this chapter, we'll discuss all the most common types of servers, what their native solutions look like, and assemble a Backup 2.0 wishlist. 
(WHITE PAPER) READ ABSTRACT |

SV 2 min chalk ‘n’ Talk on HP Service Virtualization by Hewlett-Packard Limited

November 2013 - (Free Research)
This brief webcast looks at how service virtualization can help software development every step of the way. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts