Standards  >   Information Standards  >   Metadata Standards  >  

Qualified Dublin Core

RSS Feed    Add to Google    Add to My Yahoo!
Qualified Dublin Core Reports
 
FM, IT and Data Centres
sponsored by ComputerWeekly.com
ANALYST REPORT: Are Facilities and IT data centre managers implacable enemies, or is it a case of different work priorities, asks analyst Clive Longbottom.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Ensuring the Quality of Data in Motion: The Missing Link in Data Governance
sponsored by Infogix
WHITE PAPER: This white paper outlines a framework for ensuring the integrity of both transactional and non-transactional data using automated information controls and continuous monitoring. Click through now to discover how this system can help you detect and prevent information errors.
Posted: 24 Feb 2016 | Published: 24 Feb 2016

Infogix

E-Guide: Prioritizing Application Security Concerns
sponsored by SearchSecurity.com
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

SearchSecurity.com

Skills Forecast: Big Data Analytics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report analyses the projected demand for IT professionals with Big Data Analytic skills in the UK over the next five years.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

ComputerWeekly.com

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

Presentation Transcript: Enabling The Business Governance Of Data
sponsored by ASG Software Solutions
PRESENTATION TRANSCRIPT: In this presentation transcript, Scott McCurdy, SVP of Business Solutions at ASG and featured guest Rob Karel, Principal Analyst at Forrester Research, discuss how enterprises are linking technical metadata to the formal management of business terms to achieve true enterprise data governance.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

ASG Software Solutions

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Iron Mountain

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement