Program Management Office Reports

MicroScope – May 2023: Vendors need to listen and learn
sponsored by MicroScope
EZINE: In this month's MicroScope ezine, we look at why it is vital that vendors listen to partners and act on the feedback. We also look at what's next for HP's advancing sustainability programme, Amplify Impact. Read the issue now.
Posted: 04 May 2023 | Published: 05 May 2023

MicroScope

A Computer Weekly buyer's guide to secure coding
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.
Posted: 07 Jul 2023 | Published: 07 Jul 2023

TechTarget ComputerWeekly.com

Pacbase™ Transformation Factory Extending the life of your Critical Business Applications
sponsored by Hewlett-Packard Enterprise
PRESENTATION: Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
Posted: 18 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Enterprise

Accelerating Time to Market Using SOA
sponsored by Infosys Technologies Limited
CASE STUDY: Infosys partnered with the client to define and implement a SOA framework to accelerate legacy revitalization, leading to a nine-month reduction in time-to-market and savings of US $12 million in the first year.
Posted: 13 Nov 2006 | Published: 01 Apr 2006

Infosys Technologies Limited

The Capital Delivery Revolution and Technology: Connecting Capital Planning, Construction, and Everything in Between
sponsored by Oracle Corporation
WHITE PAPER: This white paper recognizes three principal solution areas in the capital project delivery lifecycle: project design, project execution, and organizational governance. In particular, it addresses the area of project execution and the means available today to drive successful project delivery on a consistent basis.
Posted: 08 Oct 2009 | Published: 01 Jan 2009

Oracle Corporation

Dell Deployment Design and Implementation
sponsored by Dell, Inc. and Microsoft Windows 7
DATA SHEET: The Dell Project and Program Management approach enables the alignment of all elements of a client deployment. This standardized and easy-to-understand framework can be tailored as necessary to complement and integrate with existing customer processes.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

Dell, Inc. and Microsoft Windows 7

Can a zero-trust approach fill the security perimeter void?
sponsored by TechTarget Security
EBOOK: Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

TechTarget Security

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012

SmartBear Software

Incident response playbook in flux as services, tools arrive
sponsored by TechTarget Security
EBOOK: The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TechTarget Security

Who needs security orchestration, automation and response?
sponsored by TechTarget Security
EBOOK: Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

TechTarget Security