Research Library

Powered by

Standards Research

  • Stay in Compliance: Clinical Standards Data Management

    Sponsored by: Cambridge Semantics

    In this short video explore the capabilities clinical data standards management systems, and discover how your organization can stay in compliance come December 2016.

  • Database Security Tools: Purchasing Advice

    Sponsored by: TechTarget

    The appeal of database security tools is that they don't alter the database or application, and they result in only minimal performance impacts. This expert guide compares the strengths and weaknesses of database security tools while offering 9 keys steps for procuring the right database security software for your enterprise.

  • Top 10 Measurement and Planning Mistakes and How to Avoid Them

    Sponsored by: Information Builders

    Access this white paper to review the 10 most common planning and measurement errors that businesses commit. In addition to examining these blunders, discover real-world examples of how an enterprise can avoid or correct them. Learn strategic solutions, such as setting sensible goals.

  • The Open Group - Cloud Computing guide to interoperability and portability

    Sponsored by:

    This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.

  • Open Trusted Technology Provider Standard (O-TTPS)

    Sponsored by:

    This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.

  • An Introduction to Quantum Lifecycle Management

    Sponsored by:

    This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.

  • Business Continuity Management Systems

    Sponsored by:

    Brush-up you knowledge of the practical aspects of business continuity management with this book extract.

  • Multiple Country Implementation — Influencing Factors and Approaches

    Sponsored by:

    This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by:

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • The Banking Industry Architecture Network and TOGAF

    Sponsored by:

    This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.

  • SOA Reference Architecture

    Sponsored by:

    Download the Open Group Service-Oriented Architecture reference architecture.

  • TOGAF® and SABSA® Integration

    Sponsored by:

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • Video conferencing standards and interoperability considerations

    Sponsored by:

    Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.

  • Security Report Card: Do You Meet NIST Standards?

    Sponsored by: LogRhythm, Inc.

    The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.

  • One Click Away: Where Does the Data Come From?

    Sponsored by: LANSA

    Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.

  • Solving the Scalability Problem with Big Data

    Sponsored by: WANdisco

    A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.

  • Beyond the Balance Sheet: Assessing the Impact of the New Lease Accounting Standard

    Sponsored by: IBM

    This white paper will help CFOs deal with the 2015 FASB and IASB changes, which eliminate all operating leases from the income statement and move them onto the balance sheet as a capital expense.

  • Facilitating “sound practices” in risk management with IBM OpenPages ORM

    Sponsored by: IBM

    This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.

  • Virtualization Roadmap: Twists, Turns, and Key Considerations

    Sponsored by: Dell, Inc. and Intel®

    This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.

  • Compliance Policy Management: Continuous Compliance with Tripwire Enterprise

    Sponsored by: Tripwire, Inc.

    Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.

  • E-Book: Standardizing Business Continuity

    Sponsored by: IBM

    Download this e-book, brought to you by, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

  • Cisco and Standards: Opening the Door to Borderless Networks

    Sponsored by: Cisco Systems, Inc.

    This white paper details the need for standards adoption and adherence in order to reap the rewards in the following areas: Integration and testing, deployment, operations, problem resolution, availability, security, accessibility, open systems, cost savings, and choice.

  • Dirk Hohndel on Intel and the Linux Foundation

    Sponsored by: Intel

    In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • IBM Rational Build Forge Demos

    Sponsored by: IBM

    Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.

Browse by Report Type: Standards White Papers | Standards Multimedia | Standards IT Downloads

See more topics related to: Standards

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.