IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Spiral Model

RSS Feed    Add to Google    Add to My Yahoo!
Spiral ModelReports
 
Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort

Info-Tech Research declares IBM a Champion in Systems Management
sponsored by IBM
WHITE PAPER: Access this guide to examine an evaluation of 13 competitors in the systems management market. You'll be able to compare products based on functionality and price and get insight into where the market is going. On top of this, you'll learn what sets IBM apart from the competition in the systems management market.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

Enplug Migrates from Rackspace to Peak Hosting
sponsored by Peak Hosting
CASE STUDY: Explore this white paper to learn Enplug's journey from a cloud hosting provider to choosing a managed hosting service. Follow their logic, delve into their thoughts, and discover why a managed hosting service made the most sense for them, such as saving 50% in monthly hosting fees.
Posted: 11 Nov 2014 | Published: 29 Oct 2014

Peak Hosting

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Rethinking People Costs in Enterprise IT
sponsored by Rackspace
WHITE PAPER: Explore this white paper and discover new options and avenues to reallocating people costs more strategically. Tackle customer-facing technologies without increasing your spending by making your IT members partners in the experience.
Posted: 13 Nov 2014 | Published: 11 Jul 2014

Rackspace

Fundamentals of Managing the Data Center Life Cycle for Owners
sponsored by APC by Schneider Electric
WHITE PAPER: View this white paper to gain an understanding of leading and managing mission critical facility projects in the conext of the data centre life cycle. Download and use this guide as a reference to the 5 phases of a data centre's life cycle as well as the steps within each and how they intertwine.
Posted: 10 Nov 2014 | Published: 01 Nov 2013

APC by Schneider Electric

Implement a More Secure Network to Keep Up with Shadow IT
sponsored by Verizon
WHITE PAPER: This white paper examines the ramifications of the growth of shadow IT and examines how you can protect against potential issues. Read on to learn how you can implement a more secure network to keep up with evolving IT demands.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

Verizon

Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Pragmatic Approach to Data Center Management – Control and Manageability
sponsored by Avocent
WHITE PAPER: This white paper explores a pragmatic view of data center management and examines the best practices in real-world data centers for over-arching management solutions. Read on to learn how you can control costs and manage complex technology environments while achieving core objectives for availability and security.
Posted: 24 Nov 2014 | Published: 30 Sep 2010

Avocent

Embracing bring your own device (BYOD)
sponsored by Dell, Inc.
WHITE PAPER: Achieve the ideal balance between user freedom and corporate control by viewing this white paper to learn insightful recommendations. Download this resource and discover the steps to maximising the benefits of BYOD and minimising the risks to boost productivity in your organisation.
Posted: 17 Nov 2014 | Published: 04 Nov 2014

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement