This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.
This paper explains how social networking and the next generation of handheld devices will improve business decision-making through efficient, unified communications and location awareness.
This webcast presentation transcript reviews the pros and cons of a hosted messaging approach for an Exchange environment. Hosted offerings can help shrink IT budgets, but there are many things to consider for optimal results for your unique company.
The HP Integrity NonStop NB50000c-cg BladeSystem (NB50000c-cg) platform is designed specifically for the telecommunications environment as well as communications, media and entertainment (CME) industries.
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
This document looks at the various considerations for messaging in the cloud and the immediate requirements that need to be considered if you have a future vision for messaging in the cloud.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines