Project EventWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Project Event returned the following results.
RSS What is RSS?
Related Categories

 •   Event Automation
 •   Data Security
 •   Business Process Management (BPM)
 •   Security Policies
 •   Business Intelligence Solutions
 •   Project Management Solutions
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Business Process Automation
 •   Enterprise Resource Planning (ERP)

Related Searches
 •   Backup Project
 •   Consulting Project Event
 •   Evaluation Project
 •   Examples Of Project
 •   Project Basic
 •   Project Event Code
 •   Project Event Firm
 •   Project Event Procurement
 •   Project Event Projects
 •   Project Terms
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Computer Weekly 6 September 2011: Download the latest issue of the UK’s leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 06, 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at HP's strategic shake-up, and ask what it means for the supplier's customers and the UK IT industry as a whole. We also discuss a major research study into why IT projects go wrong, and start our latest Buyer's Guide, about business intelligence. Download the new issue now. 
(EZINE)

Avoiding BPM Project Hiccups by OpenText

May 22, 2013 - (Free Research)
When it comes to business process management (BPM), there are many pitfalls you could come across that can lead to failure. Read this expert resource today to learn how to avoid BPM project hiccups from key experts in the space and find an analysis on the future of BPM. 
(EGUIDE) READ ABSTRACT |

Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry by Oracle Corporation

February 23, 2011 - (Free Research)
In this webcast, discover key findings from The Economist Intelligence Unit's new research paper, “Mitigating the Impact of Project Failure in the Financial Services Industry.” 
(WEBCAST) READ ABSTRACT |

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle by Global Knowledge Network, Inc.

December 2005 - (Free Research)
This white paper will help you better understand the Project Management Life Cycle by introducing the Project Management Network Diagram (PM Network Diagram) from Global Knowledge. This diagram provides a visual illustration of the life cycle and can help you prepare for the PMP exam. 
(WHITE PAPER) READ ABSTRACT |

Greater Strategic Effectiveness through Perpetual Planning by CA Technologies.

August 2013 - (Free Research)
The rapid adoption of new technologies and changing customer demands make it increasingly difficult for companies to act on strategic opportunities. Learn about the benefits of shifting to a more agile perpetual planning approach, you can work toward your five year plan while incorporating strategic planning into daily activities. 
(WHITE PAPER) READ ABSTRACT |

Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain. 
(WHITE PAPER) READ ABSTRACT |

Workflow, Rules, and CEP Combine to Drive New Business Value by Red Hat

October 2012 - (Free Research)
In BPM projects, rules, events, and workflow are equally important, so it's critical to have a platform that incorporates all of these components. View this IDC report to get an in-depth look at how combining workflow, rules, and complex event processing (CEP) can help drive more business value from BPM efforts. 
(ANALYST REPORT) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

IT Briefing: SIEM 3.0: The Next Generation of Security and Compliance Monitoring by ArcSight, an HP Company

October 2008 - (Free Research)
Read this IT briefing to learn more about interesting trends in the security information and event monitoring (SIEM) industry. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Improve PeopleSoft Quality by Leveraging a Quality Assurance Center of Excellence Model by HP and FocusFrame

February 2009 - (Free Research)
Read this webcast transcript and learn how to leverage industry-leading quality management software and best practices to reduce test cycle time, decrease project risk, and increase the quality of your PeopleSoft applications. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Requirements Engineering for the Automotive Industry by IBM

March 2009 - (Free Research)
This white paper explores requirements engineering and its groundbreaking role in product development and engineering for the industrial segment. It discusses the best practices and benefits of requirements engineering, and how automotive manufacturers can overcome today's quality and cost challenges using those best practices. 
(WHITE PAPER) READ ABSTRACT |

Sybase CEP Implementation Methodology for Continuous Intelligence by Sybase, an SAP company

October 2010 - (Free Research)
This paper discusses the Sybase CEP Implementation Methodology, which offers analytic developers a set of best practices for implementing Continuous Intelligence using Complex Event Processing. Sybase CEP provides a structured yet flexible approach to rapidly build Continuous Intelligence projects and deliver more analytic modules over time. 
(WHITE PAPER) READ ABSTRACT |

IFS Enterprise Asset Management - EAM / CMMS by IFS

IFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit. 
(SOFTWARE PRODUCT)

Client Case Study: LAENDmarKS Enables Targeted Recalls With Traceability Technology by IBM

March 2011 - (Free Research)
KEIPER, a large automotive industry supplier, pulled together a consortium of German automakers, suppliers, software companies and academia and spearheaded their collective efforts in a project known as LAENDmarKS. 
(WHITE PAPER) READ ABSTRACT |

iLog to JBoss BRMS Migration Guide by Red Hat

April 2012 - (Free Research)
Every business rules management system (BRMS) migration project requires detailed planning to ensure success. When you are ready to embark on your BRMS migration, read this technical white paper to arm yourself with the necessary information and tools for planning and implementing your move successfully. 
(WHITE PAPER) READ ABSTRACT |

CIO Thought Leadership: The Sum of all brands by ComputerWeekly.com

March 2014 - (Free Research)
This article by Ade McCormack looks at the impact customer-centricity has on organisations. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Agile Checklist by VersionOne Inc.

July 2009 - (Free Research)
This paper presents a set of agile meeting and facilitation checklists that offer an easy framework to help guide software development teams through the various agile cycles. Read on to learn about the Agile Development Rhythms and start using the checklists presented herein to help get through the various agile cycles. 
(WHITE PAPER) READ ABSTRACT |

The new need for BI speed: Strategies, technologies and best practices for delivering real-time BI analytics by Tableau Software

September 2011 - (Free Research)
In this eBook, you'll get an overview of real-time BI plus insight and advice on planning and executing a real-time BI strategy. 
(EBOOK)

We've Got to Have a Meeting. How Do We Ensure that It Is Productive? by Global Knowledge Network, Inc.

February 2005 - (Free Research)
A meeting will only be successful if it is managed effectively. This paper introduces the four stages of meeting management: planning, preparation, process management, and follow-up. It will explain deficiencies that can result during each stage and how to ensure each stage is effective. 
(WHITE PAPER) READ ABSTRACT |

Workflow, Rules, and CEP Combine to Drive New Business Value by Red Hat

October 2012 - (Free Research)
Read this whitepaper to see why today's BPM projects involve a shift from manual to automated tasks, back-end orchestration, extensive use of rules, event-driven problem detection, and more dynamic capabilities that support knowledge workers. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 15 April 2014: Spies in the VPN by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now. 
(EZINE) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Video Surveillance Economics: The New Picture of Quality and Economy by Motorola, Inc.

August 2009 - (Free Research)
As the world becomes increasingly security conscious, municipalities, institutions and enterprises of all sizes are discovering that there's safety in sight. Real-time video surveillance systems are proving to be one of the most effective methods of addressing a wide range of security challenges in both the public and the private sectors. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Data Security by Imperva

November 2010 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts