Standards Bodies White Papers

(View All Report Types)
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Tools and Frameworks for Collaborative Development Communities in the Enterprise A New Model for Distributed Teams
sponsored by CollabNet
WHITE PAPER: Collaboration has become an operational necessity for organizations. To succeed in today’s intensely competitive markets, an enterprise must enable collaboration among all members of its global development organization. This requires new tools and processes. Read this paper for insight into deploying an enterprise-class ALM platform.
Posted: 05 Oct 2010 | Published: 04 Oct 2010

CollabNet

IBM Cloud Services: How IBM is shortening the gap between customers and development value
sponsored by IBM
WHITE PAPER: This white paper explores various cloud test and development offerings and provides exclusive advice to help you choose the right option for your business.
Posted: 02 Mar 2012 | Published: 01 Dec 2011

IBM

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

Is GMO Product Information on Your Radar?
sponsored by LANSA
WHITE PAPER: This brief resource explores the need for food manufacturers to disclose GMO information before the upcoming Global Data Synchronization Network (GDSN) is introduced, and describes how the right product information management and data aggregation systems can help you get there.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

LANSA

Compliance Standards for Data Governance
sponsored by Smarsh
EGUIDE: This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

Smarsh

Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

eBook - Email Retention: Standards and Practices
sponsored by TechTarget Security
EBOOK: Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

TechTarget Security

Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.
Posted: 10 Oct 2023 | Published: 10 Oct 2023

TechTarget ComputerWeekly.com

CW Benelux - May-July 2019: A new vision for hackers
sponsored by TechTarget ComputerWeekly.com
EZINE: With canal bridges, healthcare products, bicycles, ship components, buildings and even prosthetic body parts already in the scope of 3D printing, it's facinating to imagine how far the technology can go. Printing spaceships is no longer a fantasy. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 May 2019

TechTarget ComputerWeekly.com

CW Buyer's Guide: infrastructure on demand
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This 10 page Computer Weekly Buyer's Guide offers advice for organisations looking at infrastructure on demand in the cloud.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

TechTarget ComputerWeekly.com

Web Application Security Trends Report Q3-Q4, 2008
sponsored by Cenzic
WHITE PAPER: Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.
Posted: 20 May 2009 | Published: 20 May 2009

Cenzic

How Will the Transition to ICD-10 codes affect Health IT?
sponsored by Virtusa Corporation
EGUIDE: As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.
Posted: 31 Mar 2011 | Published: 29 Mar 2011

Virtusa Corporation

A Study on Secure Coding Training
sponsored by Security Journey
RESEARCH CONTENT: Increasingly, governing bodies are introducing compliance regulations with the hope of better securing code. This study, conducted by the Ponemon Institute, consulted 621 IT security professionals with the goal of understanding the state of secure coding training. Download this white paper to unlock the findings of this study.
Posted: 23 Jan 2024 | Published: 24 Jan 2024

TOPICS:  .NET
Security Journey

February Technical Guide on Cloud Compliance
sponsored by TechTarget Security
EGUIDE: In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

TechTarget Security

Presentation Transcript: Vulnerability Scanning and Compliance
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

How the City of Williamsburg Uses Auvik to Empower a Small IT Team
sponsored by Auvik Networks, Inc.
CASE STUDY: A governmental body like the City of Williamsburg, Virginia, needs a network that can support critical missions like providing public health access and emergency services. Read this case study to explore how Williamsburg’s IT team improved networking capabilities.
Posted: 12 Dec 2023 | Published: 13 Dec 2023

TOPICS:  .NET
Auvik Networks, Inc.

Designing For The Intelligent Edge
sponsored by Wind River
WHITE PAPER: The intelligent edge has created myriad opportunities for business but comes with its own challenges. The Wind River Professional Services organization has the experience to help you navigate this potentially challenging technological shift and has designed this white paper to guide you through the intelligent edge. Read on to learn more.
Posted: 25 Aug 2023 | Published: 25 Aug 2023

TOPICS:  .NET
Wind River

Compliance Report 2023
sponsored by Coalfire
ANALYST REPORT: While in the past compliance was seen as a bureaucratic necessity, many have now realized the full potential of compliance. In this report, experts from Coalfire discuss the state of compliance, taking a deeper look at how compliance has grown into the preferred method for fighting threats at scale. Read on to learn more.
Posted: 02 Jun 2023 | Published: 03 Jun 2023

TOPICS:  .NET
Coalfire

VxWorks Cert Edition
sponsored by Wind River
PRODUCT OVERVIEW: By leveraging VxWorks Cert Edition, you can provide your organization with the assurance that you will have a strong OS foundation to meet the most demanding safety certification standards. Read on to learn about an integrated development suite equipped with the tools you need to enable standardization across your enterprise.
Posted: 26 Aug 2023 | Published: 26 Aug 2023

TOPICS:  .NET
Wind River

Practical tips for deploying sustainable supply chains
sponsored by IQMS
EGUIDE: In this e-guide, explore expert tips for developing an effective sustainability model for your supply chain, factors and obstacles you'll need to consider, and two case studies detailing the real-world challenges and successes of manufacturers identified as "leaders in sustainability" by the analyst firm IDC Manufacturing Insights.
Posted: 16 Jan 2013 | Published: 08 Jan 2013

IQMS

What is risk management and why is it important?
sponsored by ServiceNow
EGUIDE: Risk management refers to the practices and systems an organization employs to identify, monitor and remediate this risk. To shed light on risk management TechTarget has provided this article-guide, which will take you through the ins and out of risk management, as well as its importance for modern IT. Read on to learn more.
Posted: 29 Jan 2024 | Published: 25 Jan 2024

TOPICS:  .NET
ServiceNow

Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
Posted: 28 Jan 2022 | Published: 01 Feb 2022

TechTarget ComputerWeekly.com

MicroScope E-Zine March 2015
sponsored by Kaseya
EZINE: An issue looking at just where the channel can make its money from the cloud in 2015.
Posted: 12 Mar 2015 | Published: 11 Mar 2015

Kaseya

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

May Technical Guide on PCI DSS Guidance
sponsored by TechTarget Security
EGUIDE: This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Posted: 08 May 2012 | Published: 07 May 2012

TechTarget Security