Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
IBM Cloud Services: How IBM is shortening the gap between customers and development value
sponsored by IBM
WHITE PAPER:
This white paper explores various cloud test and development offerings and provides exclusive advice to help you choose the right option for your business.
Posted: 02 Mar 2012 | Published: 01 Dec 2011
|
|
|
Tools and Frameworks for Collaborative Development Communities in the Enterprise A New Model for Distributed Teams
sponsored by CollabNet
WHITE PAPER:
Collaboration has become an operational necessity for organizations. To succeed in today’s intensely competitive markets, an enterprise must enable collaboration among all members of its global development organization. This requires new tools and processes. Read this paper for insight into deploying an enterprise-class ALM platform.
Posted: 05 Oct 2010 | Published: 04 Oct 2010
|
|
|
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER:
This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012
|
|
|
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER:
This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012
|
|
|
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER:
Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011
|
|
|
One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER:
Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
|
|
|
Is GMO Product Information on Your Radar?
sponsored by LANSA
WHITE PAPER:
This brief resource explores the need for food manufacturers to disclose GMO information before the upcoming Global Data Synchronization Network (GDSN) is introduced, and describes how the right product information management and data aggregation systems can help you get there.
Posted: 19 Feb 2014 | Published: 19 Feb 2014
|
|
|
Compliance Standards for Data Governance
sponsored by Smarsh
EGUIDE:
This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
Posted: 26 Feb 2016 | Published: 22 Feb 2016
|
|
|
Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:
Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
|
|
|
eBook - Email Retention: Standards and Practices
sponsored by TechTarget Security
EBOOK:
Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009
|
|
|
Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022
|
|
|
CW Benelux - May-July 2019: A new vision for hackers
sponsored by TechTarget ComputerWeekly.com
EZINE:
With canal bridges, healthcare products, bicycles, ship components, buildings and even prosthetic body parts already in the scope of 3D printing, it's facinating to imagine how far the technology can go. Printing spaceships is no longer a fantasy. Read the issue now.
Posted: 03 May 2019 | Published: 03 May 2019
|
|
|
eFax Corporate Sets the Standard for Reliable Cloud Fax Service
sponsored by Consensus Cloud Solutions
WHITE PAPER:
Maintaining your company's fax capability should be a high priority. However, this may be a large task, particularly if you're still holding together a system of on-site fax machines and fax servers.
Posted: 22 Feb 2023 | Published: 22 Feb 2023
|
|
|
Web Application Security Trends Report Q3-Q4, 2008
sponsored by Cenzic
WHITE PAPER:
Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.
Posted: 20 May 2009 | Published: 20 May 2009
|
|
|
CW Buyer's Guide: infrastructure on demand
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This 10 page Computer Weekly Buyer's Guide offers advice for organisations looking at infrastructure on demand in the cloud.
Posted: 30 Nov 2012 | Published: 30 Nov 2012
|
|
|
How Will the Transition to ICD-10 codes affect Health IT?
sponsored by Virtusa Corporation
EGUIDE:
As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.
Posted: 31 Mar 2011 | Published: 29 Mar 2011
|
|
|
February Technical Guide on Cloud Compliance
sponsored by TechTarget Security
EGUIDE:
In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.
Posted: 27 Feb 2012 | Published: 24 Feb 2012
|
|
|
Presentation Transcript: Vulnerability Scanning and Compliance
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT:
In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011
|
|
|
Practical tips for deploying sustainable supply chains
sponsored by IQMS
EGUIDE:
In this e-guide, explore expert tips for developing an effective sustainability model for your supply chain, factors and obstacles you'll need to consider, and two case studies detailing the real-world challenges and successes of manufacturers identified as "leaders in sustainability" by the analyst firm IDC Manufacturing Insights.
Posted: 16 Jan 2013 | Published: 08 Jan 2013
|
|
|
Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
Posted: 28 Jan 2022 | Published: 01 Feb 2022
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019
|
|
|
May Technical Guide on PCI DSS Guidance
sponsored by TechTarget Security
EGUIDE:
This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Posted: 08 May 2012 | Published: 07 May 2012
|
|
|
MicroScope E-Zine March 2015
sponsored by Kaseya
EZINE:
An issue looking at just where the channel can make its money from the cloud in 2015.
Posted: 12 Mar 2015 | Published: 11 Mar 2015
|
|
|
Computer Weekly – 13 November 2012: Government commits to open standards
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now.
Posted: 09 Nov 2012 | Published: 13 Nov 2012
|
|
|
What an Impending Marriage of IoT and 5G Means for the Future
sponsored by T-Mobile for Business
EGUIDE:
One area that will greatly benefit from 5G is the Internet of Things. However, 5G is also adding some confusion in the market today as there are existing private and public solutions being deployed now while 5G is a couple years away from adoption. In this e-guide, learn what the impending marriage of IoT and 5G means for the future.
Posted: 05 Mar 2020 | Published: 03 Mar 2020
|
|
|
E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE:
Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010
|
|
|
Using EHRs to Achieve Meaningful Use
sponsored by TechTarget Health IT
EBOOK:
As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.
Posted: 17 Jun 2013 | Published: 17 Jun 2013
|
|
|
Video collaboration usage policies should consider user experiences
sponsored by TechTarget Security
EGUIDE:
Evaluate the pros and cons of video collaboration in this expert e-guide, and discover how businesses can overcome key user experience challenges with the right policies and management tactics.
Posted: 18 Jul 2012 | Published: 18 Jul 2012
|
|
|
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
sponsored by TechTarget Security
EBOOK:
Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
Posted: 05 Feb 2010 | Published: 05 Feb 2010
|
|