IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Spiral Model

RSS Feed    Add to Google    Add to My Yahoo!
Spiral Model Reports
 
Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort

How High Quality APIs Equates to Exemplary Services
sponsored by Parasoft Corporation
EGUIDE: Access this expert e-guide for advice on API best practices, problems to be prepared for, and essential advice. Read on to find out 3 general principles that should be applied to creating REST or JSON APIs.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Parasoft Corporation

La-Z-Boy Incorporated
sponsored by Zscaler
CASE STUDY: This case study describes how La-Z-Boy partnered with Zscaler to reduce bandwidth costs and complexity while increasing the visibility of web activity.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

Top Advice for Implementing Mobile ERP
sponsored by Epicor Software Corporation
EGUIDE: Access this in-depth, expert e-guide to learn more about mobile and cloud technologies and how these technologies can ease ERP woes.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Epicor Software Corporation

Reduce Cost, Complexity with HP Structured Data Manager
sponsored by Hewlett-Packard Company
CASE STUDY: HP needed an integrated data management and archiving platform. Find out why HP Structured Data Manager was the answer.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

TOPICS:  IT Management
Hewlett-Packard Company

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Corporation
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Transform Your Risk, Security, and Compliance Results into Business Insight
sponsored by Allgress
WHITE PAPER: This concise white paper introduces an IT GRC suite that enables risk, security, and compliance professionals to efficiently manage their enterprise's risk posture with quick time-to-value.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Allgress

Why You Need a Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the reasons why enterprises benefit from implementing next-generation firewalls (NGFWs) and lays out a path to success.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Company

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Corporation
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Corporation

Best Practices Brief – The 4 Pillars of Business Analytics Framework
sponsored by Actuate
WHITE PAPER: Access the following white paper to learn how to leverage the 4 pillars of business analytics to understand your application needs and design and build better overall applications.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Actuate
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement