IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Spiral Model

RSS Feed    Add to Google    Add to My Yahoo!
Spiral ModelWhite Papers (View All Report Types)
 
Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort

Rethinking People Costs in Enterprise IT
sponsored by Rackspace
WHITE PAPER: In this white paper, learn how to assess your IT people spend and position IT as a central driver of business growth. Discover how to cut costs while increasing efficiency with an effective outsourcing strategy that includes a hybrid cloud environment with server virtualization.
Posted: 15 Oct 2014 | Published: 12 Aug 2014

Rackspace

Red Hat Enterprise Linux Developer Subscriptions: Maximize Developer Speed and Productivity with Essential Development Tools
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Enterprise Linux support app development by providing access to industry leading tools, instructional resources, reference architectures, dedicated developer forums and more.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Red Hat

All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Your Company
sponsored by IBM
WHITE PAPER: You've decided to make the leap to the cloud, but with so many different configurations offered by multiple providers representing different degrees of benefits and risks, how do you even begin to determine the approach that will best suit your organisation's unique needs? Read this white paper to find guidance to help you make sense of the cloud.
Posted: 07 Oct 2014 | Published: 01 Feb 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

A Simple Way to Connect and Manage Computing in the Data Center
sponsored by CISCO & INTEL®
WHITE PAPER: Access this white paper to learn how you can provide an exceptionally easy, intelligent, and efficient way to connect and manage computing in the data center.
Posted: 30 Sep 2014 | Published: 30 Aug 2013

CISCO & INTEL®

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Stop the Finger-Pointing: Managing Tier 1 Applications with VMware vCenter™ Operations Management Suite™
sponsored by VMware, Inc.
WHITE PAPER: This exclusive whitepaper will show you how to take a new approach the operations management that will help IT identify the source of problems and end the constant finger pointing.
Posted: 10 Oct 2014 | Published: 11 Oct 2012

VMware, Inc.

Maximize XenApp Global High Availability and Security with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This exclusive whitepaper explores an infrastructure solution that will allow you to effectively deploy virtualized applications.
Posted: 26 Sep 2014 | Published: 10 Sep 2010

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement