Time RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Time Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Treasury / Cash / Risk Management
 •   Enterprise Financial Management Solutions
 •   Budgeting, Financial Planning and Analysis
 •   Statistical Data Analysis
 •   Enterprise Information Integration/ Metadata Management
 •   Business Intelligence Solutions
 •   Trading Partner Management
 •   Event Automation
 •   Data Quality
 •   Data Mining

Related Searches
 •   Function Time
 •   Reservation Time
 •   Sample Time Risk
 •   Samples Time Risk
 •   Time Change
 •   Time General
 •   Time Monitoring
 •   Time Researching
 •   Time Risk Open
 •   Time Risk Publishing
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 15, 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

Real-Time Risk Monitoring by Sybase, an SAP company

November 02, 2011 - (Free Research)
Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk. 
(WHITE PAPER) READ ABSTRACT |

Key Challenges in Risk Management: How Immediate Access to Integrated Information Can Mitigate Risk by Sybase, an SAP company

April 30, 2012 - (Free Research)
<p>This white paper reveals the findings of a recent survey of senior risk and IT decision-makers in international financial institutions, exploring their current risk management capabilities and their plans for introducing integrated technologies, and examining the relationship between data management and risk mitigation in depth.</p> 
(WHITE PAPER) READ ABSTRACT |

Software Quality Optimization: Business Transformation and Risk by IBM

March 10, 2009 - (Free Research)
Information technology is undergoing constant innovation. To keep pace, software development organizations need to release business-critical software in less time, but this increases risk and often results in compromised quality. So the question becomes: How can you save time and reduce costs without sacrificing quality? Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

How to Beat the Cost of Compliance by Optimizing your Data Across its Lifecycle with IBM System z® by IBM

March 01, 2011 - (Free Research)
In this webcast you’ll learn how to lower costs through optimizing your organization’s data, thereby improving the efficiency of your business processes and applications. With intelligent archiving and thorough backup-and-restore strategies, you can further reduce costs and risks to your business. 
(WEBCAST)

Monitoring for SAP: High-Risk Financial Transactions in Real Time by Security Weaver

February 2009 - (Free Research)
For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Time and Attendance - Build Vs. Buy by Infor

January 2007 - (Free Research)
Explore the advantages, disadvantages, costs and risks of buying and building an enterprise time and attendance solution. 
(WHITE PAPER) READ ABSTRACT |

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk by Pitney Bowes Group 1 Software

April 2008 - (Free Research)
What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates. 
(WHITE PAPER) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

Preparation by Automation: Reducing the Cost, Pain, Time, and Risk of IT Security Audits by TraceSecurity

March 2008 - (Free Research)
This white paper explains how IT organizations can use automation to better prepare themselves for IT security audits, thereby significantly reducing the cost, pain, time, and risk associated with them. 
(WHITE PAPER) READ ABSTRACT |

Cisco Continuous Data Protection for Files by Cisco Systems, Inc.

March 2009 - (Free Research)
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software. 
(WHITE PAPER) READ ABSTRACT |

Sybase Customer Success: Barclays Capital by Sybase, an SAP company

June 2011 - (Free Research)
Through increased information visibility and data accuracy, Barclays Capital was able to mitigate exposure to operational and reputational risk. Read the entire case study now, compliments of Sybase. 
(CASE STUDY) READ ABSTRACT |

SL Enterprise RTView for Operational and Strategic Dashboards by SL Corporation

February 2008 - (Free Research)
SL Enterprise RTView is a business information delivery platform that is used by IT Managers to rapidly configure, deploy, maintain and extend real-time and other critical enterprise information systems. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: The Top Four Business Risks of Social Media by BlueCoat

September 2011 - (Free Research)
Social networks are changing the way people interact, communicate, form opinions, and purchase. And businesses must support social media to drive their business. However, this medium can also pose new security risks. View now to explore the top four risks of social networking and discover various ways to protect against and mitigate these risks. 
(WHITE PAPER) READ ABSTRACT |

Is Time to Market King? by IBM

November 2011 - (Free Research)
The common thread of successful software development is enabling collaboration in context - making the process transparent so stakeholders remain informed and empowered to contribute. Once this thread is established, technology can be implemented that provides the glue for stakeholders to collaborate and meet their time to market or goals. 
(WHITE PAPER) READ ABSTRACT |

Optimize Data Management for Smarter Banking and Financial Markets E-Book by IBM

March 2011 - (Free Research)
This e-book explains how smarter banks can anticipate customer needs and deliver innovative products faster, more consistently and more nimbly than the competition. They have full visibility of their risk position and customer needs. And they respond quickly to both challenges and opportunities. Read on to learn how to become a smarter bank. 
(EBOOK) READ ABSTRACT |

The Connection Imperative: How to Realize Your Cloud Potential by SnapLogic

January 2014 - (Free Research)
A major challenge for modern organizations is successfully managing the technology risks of delivering real-time data. Access this informative paper today to learn how to properly manage consistent integration struggles and better understand the importance of integrating data both in the cloud and on the ground. 
(WHITE PAPER) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Delivering Value Through Quality Management and Best Practices: Strategies for Reducing Cost and Risk by IBM Rational

January 2011 - (Free Research)
Read this presentation transcript from IBM as it explores quality management strategies that can deliver a positive ROI while at the same time improving delivered quality and reducing risk and uncertainty in development projects. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Streamline Software Asset Management, Compose a software Management Symphony by CDW Corporation

February 2014 - (Free Research)
View this webcast to explore a software asset management solution with customized application inventory reporting that enables you to easily assess software licenses and reduce compliance risks and costs. 
(WEBCAST) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Mobile device protection: tackling mobile device security risks by Juniper Networks, Inc.

June 2012 - (Free Research)
The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated. 
(EGUIDE) READ ABSTRACT |

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts