IT Management  >  

System Development

RSS Feed    Add to Google    Add to My Yahoo!
System Development Reports
 
IT Project Management: Guide to estimating timescales and resources.
sponsored by ComputerWeekly.com
BOOK: Learn how to estimate the effort and timescales required for IT projects with this extract from Project management for IT-related projects.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

IBM Rational Workbench for Systems and Software Engineering
sponsored by IBM
WHITE PAPER: This white paper illustrates how proven methodologies and best-of-breed tools, such as Rational DOORS, Rational Rhapsody, Rational Team Concert, and Rational Quality Manager, can help you design high-quality products that meet customer requirements.
Posted: 07 Sep 2010 | Published: 30 Jun 2010

IBM

Airflow Uniformity through Perforated Tiles in a Raised-Floor Data Center
sponsored by Schneider Electric
WHITE PAPER: In this paper, the impact of data center design parameters on perforated tile airflow is quantified and methods of improving the uniformity are discussed.
Posted: 01 Jun 2006 | Published: 01 Jan 2005

Schneider Electric

CIC Guide: Agile Deployment for Embedded Software & Complex Systems
sponsored by IBM
WHITE PAPER: In this informative resource, learn exactly how Agile principles apply to the product delivery lifecycle of an embedded software product or complex safety critical system. Discover the most effective implementation strategy, and get guiding principles for agile success.
Posted: 07 Nov 2013 | Published: 31 Mar 2013

IBM

Applying agile and lean principles to the governance of software and systems development
sponsored by IBM
WHITE PAPER: This paper presents eighteen best practices for leaner, more agile software development project governance.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

IBM

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
sponsored by Information Security Magazine
EZINE: November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010

Information Security Magazine

Address System-on-Chip Development Challenges with Enterprise Verification Management
sponsored by IBM
WHITE PAPER: This white paper addresses the multidimensional challenges posed by verification management and offers a compelling solution known as enterprise verification management solution (EVMS) based on over a decade of development and in-house experience at IBM. 
Posted: 02 Nov 2010 | Published: 01 Sep 2009

IBM

Integrated Systems and Streamlined Practices Propel New, Responsive IT Organizations
sponsored by IBM
WHITE PAPER: Access this report for Forrester to discover how organizations are responding to the need to transform. Discover some of the challenges faced with the transformation, and how the change is far more fundamental than previously anticipated.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

IBM

Workload-Optimized Systems For Superior Business Value
sponsored by IBM
WHITE PAPER: This brief white paper examines why making the right server choices can help solve many challenges. It contrasts x86 multi-cores with Power Systems and mainframes. Read on to learn how making the right server choices can help an enterprise realize greater ROI while also helping extracting greater business value from the servers that it buys.
Posted: 14 Feb 2012 | Published: 14 Feb 2012

IBM

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle
sponsored by iTKO LISA
WHITE PAPER: This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

iTKO LISA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement