Techniques Risks ProcessingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Techniques Risks Processing returned the following results.
RSS What is RSS?
Related Categories

 •   Treasury / Cash / Risk Management
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Enterprise Information Integration/ Metadata Management
 •   Security Monitoring
 •   Virtualization
 •   Application Security
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions

Related Searches
 •   Documents Techniques Risks
 •   File Techniques Risks Processing
 •   Provider Techniques Risks
 •   Solution Techniques Risks
 •   Techniques Issues
 •   Techniques Package
 •   Techniques Risks Outsourcing
 •   Techniques Risks Processing Conversions
 •   Techniques Risks Processing Integrated
 •   Techniques Risks Processing Introduction
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Being Agile in a non agile world by Ivar Jacobson Consulting

March 2008 - (Free Research)
Learn how to effectively combine agile development techniques with traditional SDLC and other software engineering techniques. Explore the basic concepts behind agile thinking and the three perspectives associated with this process. 
(WEBCAST) READ ABSTRACT |

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Management Excellence: Leveraging Technology and Techniques by Oracle Corporation UK Ltd

November 2008 - (Free Research)
One in a series of white papers about management excellence, this white paper describes the techniques and technologies that organizations should master on their way to management excellence. 
(WHITE PAPER) READ ABSTRACT |

Strategy Guide to Risk Mitigation for Midsize Businesses by HP & Intel®

June 2010 - (Free Research)
This strategy guide offers concrete risk mitigation techniques specifically designed for midsize organizations. Learn how to proactively manage physical and virtual systems and see the early signs of infrastructure trouble to avoid outages. 
(WHITE PAPER) READ ABSTRACT |

Management Excellence: Leveraging Technology & Techniques by Oracle Corporation

November 2008 - (Free Research)
This white paper describes a set of six management processes that lead organizations to become smarter, more agile, and better aligned—the key attributes of management excellence. 
(WHITE PAPER) READ ABSTRACT |

Getting Started with Business Process Management by SoftwareAG Inc., USA

February 2009 - (Free Research)
In this whitepaper, you will learn about the different entry points for BPM, ways of ramping up process initiatives, organizational and cultural challenges that BPM practitioners face, and the critical success factors for BPM. 
(WHITE PAPER) READ ABSTRACT |

The Netweaver Upgrade: Ensuring Performance While Balancing Cost with Risk by HyPerformix

July 2008 - (Free Research)
This paper discusses critical factors every IT decision maker needs to know when upgrading to NetWeaver, to ensure system performance and availability, and to balance cost with the risks of downtime. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Pragmatic Data Security by Websense, Inc.

March 2010 - (Free Research)
This presentation transcript busts through hype, hyperbole, and complexity and details a pragmatic approach to information-centric security for nearly any organization. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies by FTI Technology

November 2009 - (Free Research)
In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set. 
(WHITE PAPER) READ ABSTRACT |

Surviving the Perfect Storm in the Food Industry by CDC Software - Ross Enterprise

April 2008 - (Free Research)
This paper presents an executive perspective on the underlying challenges in the food industry. 
(WHITE PAPER) READ ABSTRACT |

Turning Virtual Sprawl into a Good Thing by Hewlett-Packard Company

December 2009 - (Free Research)
This white paper discusses how HP Discovery and Dependency Mapping can be the key to the effective management of your virtual infrastructure, helping to make sure that you can gain the benefits of virtualization without increasing costs and risks. 
(WHITE PAPER) READ ABSTRACT |

Pod Slurping - An Easy Technique for Stealing Data by GFI Software

March 2008 - (Free Research)
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches. 
(WHITE PAPER) READ ABSTRACT |

Tips and Techniques for Building a Converged Data Center Presentation Transcript by Dell, Inc. and Intel®

September 2012 - (Free Research)
There are a variety of options when it comes to data center convergence. Finding a best-fit solution for your organization can be difficult. Learn more about how your business can optimize their virtualization process with an in-depth exploration of tips and techniques for building a converged data center. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Five Myths of Agile Development by VersionOne Inc.

September 2008 - (Free Research)
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization. 
(WHITE PAPER) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Enforcing IT Change Management Policy by Tripwire, Inc.

March 2009 - (Free Research)
Read this white paper to learn how to enforce IT Control Management policies effectively by fostering a culture of change and enforcing change management processes resulting in greater auditability, improved quality, and IT infrastructure integrity. 
(WHITE PAPER) READ ABSTRACT |

Protect people, processes and technology from web application threats by IBM

November 2013 - (Free Research)
This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues. 
(WHITE PAPER) READ ABSTRACT |

5 Easy Steps For Reducing Information Management Costs by Iron Mountain

March 2012 - (Free Research)
Cutting costs is a priority for organizations of all sizes, but most companies often overlook ways they could save money when it comes to information management. Read this white paper and learn five tips for cutting the costs of your information management techniques to significantly improve your bottom line. 
(DATA SHEET) READ ABSTRACT |

Garnering Executive Support: Building Your Business Plan for Strategic Meetings Management by StarCite

March 2009 - (Free Research)
In this white paper, brought to you by StarCite, corporate travel and meetings professionals will learn why executive support is vital to a strategic meetings management effort and how to garner that support - even if it requires investment and resources from upper management. 
(WHITE PAPER) READ ABSTRACT |

Journal of Management Excellence: Building Trust by Oracle Corporation

July 2009 - (Free Research)
It is crucial for businesses to build trust with their customers, partners, investors, and with society at large. This journal article discusses building trust through modern performance management techniques, sustainability initiatives, managing reputation risk, end-to-end approaches to financial reporting and compliance, and more. 
(JOURNAL ARTICLE) READ ABSTRACT |

Maximizing the ROI of procurement technology by Ariba, Inc.

November 2010 - (Free Research)
Procurement technology brings buyers and sellers together in virtual marketplaces, letting manufacturers aggregate purchases of goods and services to earn volume discounts and negotiate better prices. In this E-Book, experts discuss techniques for managing supplier risk and gaining more control over direct spend on raw materials. 
(EBOOK) READ ABSTRACT |

Optimized Licence Management for the Datacenter by Flexera Software

November 2011 - (Free Research)
Read this white paper and learn some of the datacentre licence management challenges, including heterogeneous and multi-platform environments, complex licence models, virtualization and more. 
(WHITE PAPER) READ ABSTRACT |

InfoSphere Optim Data Redaction by IBM

August 2011 - (Free Research)
As data continues to expand and organizations find new ways to collaborate with partners and customers, the question arises: How secure is your sensitive information?  In addition, organizations must also ensure that the right information stays private. Learn how organizations are striving to support information governance programs. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Security is Well Suited for Agile Development by IBM

June 2011 - (Free Research)
View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts