Standards Processes ForWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Standards Processes For returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Storage Security
 •   Virtualization
 •   Storage Management
 •   Enterprise Resource Planning (ERP)
 •   Business Process Automation
 •   Managed Security Services

Related Searches
 •   Buying Standards Processes For
 •   Computer Standards Processes
 •   Developments Standards Processes For
 •   Directory Standards
 •   Procedures Standards Processes
 •   Schemas Standards Processes
 •   Standards Processes For Batch
 •   Standards Processes For Documents
 •   Standards Processes For It
 •   Standards Virginia
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

How to Make Indirect Procurement Outsourcing Work Effectively by SAP America, Inc.

March 12, 2010 - (Free Research)
Consider how procurement outsourcers have helped customers improve strategic sourcing, contract negotiations and operational procurement. Yet they need to connect these areas with integrated, sourcing-to-settlement procurement processes by providing customers with standard processes and platforms. 
(WHITE PAPER) READ ABSTRACT |

Strategic Meeting Management: Best Practices for Success: A Tips and Tools Guide to Effective Implementation by StarCite

August 2008 - (Free Research)
In studying the best practices in strategic meeting management, there's proven evidence that a "managed" meetings program can generate significant and immediate cost savings for corporations of all sizes. 
(WHITE PAPER) READ ABSTRACT |

Bridging the Gap: Security, Operations & Compliance by eIQnetworks

February 2009 - (Free Research)
Read this white paper to see why SecureVue delivers the most cost effective and comprehensive technical solution on the market today to manage security, operations and compliance requirements. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates. 
(WHITE PAPER) READ ABSTRACT |

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

Using XML and Databases: W3C Standards in Practice by EMC Corporation

August 2008 - (Free Research)
This paper describes the challenges faced in managing information in robust systems that enable reuse of XML-encoded data objects and support their efficient processing. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage by IBM

March 2011 - (Free Research)
In this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage. 
(EGUIDE) READ ABSTRACT |

Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards® by Advent Software, Inc

April 2010 - (Free Research)
Whether you are just starting a compliance program or need to fine-tune your existing process, this document will help you understand the steps involved in becoming GIPS compliant. It is not a substitute for the Standards themselves. It is designed to help you understand the value of compliance, what’s needed to achieve it, pitfalls to avoid. 
(WHITE PAPER)

SOA Best Practices: The BPEL Cookbook by Oracle Corporation

August 2007 - (Free Research)
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 2008 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards by Advent Software, Inc

July 1967 - (Free Research)
This whitepaper, written in conjunction with Ashland Partners, explains the steps to becoming Global Investment Performance Standards compliant. 
(WHITE PAPER)

RFID Basics for Retailers by Intermec

March 2009 - (Free Research)
This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations. 
(WHITE PAPER) READ ABSTRACT |

Modelling the Insurance Enterprise by ComputerWeekly.com

February 2013 - (Free Research)
This report from the Open Group is aimed at managers, architects, and designers that serve the insurance industry or have an interest in integrating the TOGAF and ArchiMate standards. 
(ESSENTIAL GUIDE) READ ABSTRACT |

BPM E-Guide: Part I: The rise of BPM for Process Modeling, Part II: BPMN 2.0: The emerging star of business process modeling by TechTarget

May 2014 - (Free Research)
Process modeling standards have grown more important over time, especially given that businesses have sought tools that could enhance their ability to create models and build systems. Take this 2 min survey to access this expert guide on BPMN's evolution and why BPMN use is increasing and where the standard is likely to be headed. 
(RESOURCE) READ ABSTRACT |

EVault Remote Disaster Recovery by i365, makers of Evault

November 2009 - (Free Research)
EVault Remote Disaster Recovery Service (RDR) is a hosted service to help you quickly recover your key servers and data after a site disaster, and remotely access them in a secure virtual environment. 
(PRODUCT REVIEW) READ ABSTRACT |

PCI-Compliant Cloud Reference Architecture by HyTrust

March 2011 - (Free Research)
This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications by Intermec

March 2009 - (Free Research)
This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations. 
(WHITE PAPER) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Achieving ISO 27001 Compliance using Titus Solutions by TITUS

November 2010 - (Free Research)
This paper provides IT professionals with a high level overview of ISO 27001 and 27002, along with their implications for security of email and digital documents. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Standardizing Business Continuity by IBM

December 2010 - (Free Research)
Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more! 
(EBOOK) READ ABSTRACT |

SAP® Support of the Healthecare Supply Chain's Ongoing Effort to Ensure Patient Safety and Drive Business Value by SAP AG

June 2009 - (Free Research)
The Center for Healthcare Supply Chain Research (formerly the HDMA Research & Education Foundation) recently published an important study concerning data management and data sharing in the healthcare supply chain. This whitepaper discusses the key conclusions of their study. 
(WHITE PAPER) READ ABSTRACT |

The Best PCI Audit of Your Life by Lumension

August 2009 - (Free Research)
This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life. 
(WHITE PAPER) READ ABSTRACT |

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension

March 2009 - (Free Research)
Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions. 
(WHITE PAPER) READ ABSTRACT |

Improving Data Quality Through Data Modeling by CA ERwin from CA Technologies

April 2011 - (Free Research)
Enterprise data is largely falling short of a standard that makes it possible to utilize in how business will be conducted in the next decade. Most enterprise data is “adequate” for basic operational needs today. Download this paper to learn how to get the most out of your enterprise data. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts