Source RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Source Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Open Source
 •   Application Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Treasury / Cash / Risk Management
 •   Application Management and Maintenance
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Application Integration
 •   Vulnerability Assessment
 •   Strategic Sourcing Solutions

Related Searches
 •   Conversions Source Risk
 •   Resource Source Risk
 •   Source Print
 •   Source Risk Colorado
 •   Source Risk Computing
 •   Source Risk Licenses
 •   Source Risk Reviews
 •   Source Us
 •   Statistics Source Risk
 •   Tools Source Risk
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Open Trusted Technology Provider Standard (O-TTPS) by ComputerWeekly.com

April 10, 2013 - (Free Research)
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk. 
(WHITE PAPER) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 27, 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

BeyeNETWORK Research Report: Open Source Solutions: Managing, Analyzing and Delivering Business Information by Pentaho Corporation

March 18, 2010 - (Free Research)
This survey report examines the usage of open source solutions within the BI and data warehousing market, describes what software is being deployed and presents the benefits and challenges of adopting open source technologies. Learn the rationale, practices and benefits that are driving use of open source as an alternative to traditional vendors. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Taking the RISK out of RISC Migrations by Red Hat/Cisco/Intel

June 07, 2011 - (Free Research)
You know it’s time to migrate but how do you make the move to open source? Access this exclusive resource to discover how to successfully migrate from Unix to open source on Cisco UCS platforms, allowing for a mitigation of risk while maximizing ROI. 
(WEBCAST) READ ABSTRACT |

Open Source, Commercial Software, or Coexistance Strategy? by IBM

October 28, 2010 - (Free Research)
This white paper examines the benefits of using open source software, along with some of the potential risks, to help you determine whether your company should turn to an open source solution, a commercial application, or a combination of both. 
(WHITE PAPER) READ ABSTRACT |

The Department of Defense and Open Source Software by Oracle Corporation

January 01, 2008 - (Free Research)
This white paper looks at the pros and cons of open-source software and helps organizations understand how to build a business case that is based on cost, schedule, performance and risks across the entire program lifecycle not just up-front program inception costs and considerations.  
(WHITE PAPER) READ ABSTRACT |

Is an Open Source Business Process Management Solution Right for You? by Red Hat

October 14, 2013 - (Free Research)
In this informative white paper, learn about how increased availability of highly functional enterprise open source business process management (BPM) technology is bringing the benefits of BPM solutions within reach of more companies and projects, and discover how you can reap these benefits as well! 
(WHITE PAPER) READ ABSTRACT |

SearchManufacturingERP.com Tip Guide: E-Sourcing tools to help turn strategic suppliers into partners by Ariba, Inc.

February 08, 2012 - (Free Research)
Read this guide to learn best practices to become strategic partners with your suppliers and understand how a sourcing strategy can make or break a company. 
(EGUIDE) READ ABSTRACT |

The Department of Defence and Open Source Software by Oracle Corporation UK Ltd

March 31, 2009 - (Free Research)
Is open source software a viable strategy for large-scale SOA deployments, especially at the U.S. Department of Defence? 
(WHITE PAPER) READ ABSTRACT |

Ethical Hacking and Risk Assessments by Global Knowledge

December 2008 - (Free Research)
Attend this webcast to learn about risk assessment process and tools used by ethical hackers. 
(WEBCAST) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

Social Recruiting Guide: How to Effectively Use Social Networks and Avoid Legal Risks by Oracle Corporation

July 2012 - (Free Research)
Social networking sites are some of the most powerful tools available to recruiters today. If you're not sure where to start with a social recruiting strategy, this paper will outline why social recruiting is becoming an imperative for companies today, what considerations you need to be aware of, and what first steps you can take. 
(WHITE PAPER) READ ABSTRACT |

Is an Open Source Business Process Management Solution Right for You? by Red Hat

July 2013 - (Free Research)
Not all companies can afford proprietary business process management (BPM) tools. Fortunately, open-source BPM can change that, making the benefits of BPM accessible to more businesses than ever before. View this informative resource to learn if an open-source BPM strategy is right for your organization. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Leading Bank Chooses DataFlux to Create More Accurate, Complete Risk Reports by DataFlux Corporation

January 2009 - (Free Research)
Read how one of the largest banks in the southeast chose DataFlux dfPower® Studio to review and compare multiple data sources simultaneously through data quality and data integration workflows. 
(CASE STUDY) READ ABSTRACT |

What is Oracle Compatibility? by EnterpriseDB Corporation

November 2009 - (Free Research)
Watch this 10 minute video and discover what Oracle compatibility means for your business from a technical, and skills point of view. This video also offers multiple low risk strategies for using Postgres Plus Advanced Server to lower your Oracle costs and utilize the advantages of the most advanced open source database available. 
(VIDEO) READ ABSTRACT |

SearchCIO.com eBook: Unlock Outsourcing Potential and Change by SearchCIO.com

May 2009 - (Free Research)
The key to unlocking outsourcing potential lies in targeting the right projects, choosing your suppliers wisely and then managing them with an eye on economic conditions at that global site. Here's a step-by-step plan for optimizing savings. 
(EBOOK) READ ABSTRACT |

On-Demand Webcast: Got Big Data? Learn Tricks to Combine Data from Traditional and Untraditional Sources by Dell Software

February 2013 - (Free Research)
In this on-demand video, renowned big-data expert Guy Harrison discusses tricks for using the Toad® Business Intelligence Suite to easily access, integrate, cleanse, and analyze data from nearly any source. Then, see how one company used Toad to save time, reduce risk and improve customer server. 
(WEBCAST) READ ABSTRACT |

SL Enterprise RTView for Operational and Strategic Dashboards by SL Corporation

February 2008 - (Free Research)
SL Enterprise RTView is a business information delivery platform that is used by IT Managers to rapidly configure, deploy, maintain and extend real-time and other critical enterprise information systems. 
(WHITE PAPER) READ ABSTRACT |

Data Protection Solutions at Midsize Organizations by Trend Micro, Inc.

February 2008 - (Free Research)
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more. 
(WHITE PAPER) READ ABSTRACT |

Balancing Risk and Innovation with Sourcing Alternatives: Helping IT managers and CIOs raise the ROI of IT by IBM

December 2010 - (Free Research)
This paper explains how clients can balance risk and innovation through the use of services from IBM. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Managing Supply Chain Risk by SAP America, Inc.

January 2006 - (Free Research)
Download this white paper and explore new thinking on potential risk to global supply chains and how companies are adopting the statistical methods more commonly associated with finance and insurance. Learn how identifying and profiling risk variables, quantifying risk and using IT solutions can create higher resilience for supply chain management. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts