ComputerWeekly.com Research Library

Powered by Bitpipe.com

StandardsWhite Papers

  • CFO Research Study - Linking Numbers and Narratives

    Sponsored by: IBM

    This white paper explains the importance of understanding financial numbers and how to get the most out of your narrative analysis.

  • The Open Group - Cloud Computing guide to interoperability and portability

    Sponsored by: ComputerWeekly.com

    This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.

  • Open Trusted Technology Provider Standard (O-TTPS)

    Sponsored by: ComputerWeekly.com

    This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.

  • An Introduction to Quantum Lifecycle Management

    Sponsored by: ComputerWeekly.com

    This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.

  • Business Continuity Management Systems

    Sponsored by: ComputerWeekly.com

    Brush-up you knowledge of the practical aspects of business continuity management with this book extract.

  • Multiple Country Implementation — Influencing Factors and Approaches

    Sponsored by: ComputerWeekly.com

    This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features.

  • The Banking Industry Architecture Network and TOGAF

    Sponsored by: ComputerWeekly.com

    This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.

  • SOA Reference Architecture

    Sponsored by: ComputerWeekly.com

    Download the Open Group Service-Oriented Architecture reference architecture.

  • TOGAF® and SABSA® Integration

    Sponsored by: ComputerWeekly.com

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • Video conferencing standards and interoperability considerations

    Sponsored by: SearchSecurity.com

    Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.

  • One Click Away: Where Does the Data Come From?

    Sponsored by: LANSA

    Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.

  • Solving the Scalability Problem with Big Data

    Sponsored by: WANdisco

    A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: Coverity

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • Facilitating “sound practices” in risk management with IBM OpenPages ORM

    Sponsored by: IBM

    This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.

  • Virtualization Roadmap: Twists, Turns, and Key Considerations

    Sponsored by: Dell, Inc. and Intel®

    This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.

  • Compliance Policy Management: Continuous Compliance with Tripwire Enterprise

    Sponsored by: Tripwire, Inc.

    Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.

  • E-Book: Standardizing Business Continuity

    Sponsored by: IBM

    Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

  • Cisco and Standards: Opening the Door to Borderless Networks

    Sponsored by: Cisco Systems, Inc.

    This white paper details the need for standards adoption and adherence in order to reap the rewards in the following areas: Integration and testing, deployment, operations, problem resolution, availability, security, accessibility, open systems, cost savings, and choice.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • Securing the Foundation of Information Technology (IT) Systems

    Sponsored by: Trusted Computer Solutions

    This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.

  • Industry Intelligence: International Financial Reporting Standards for Hedge Funds

    Sponsored by: Advent Software, Inc

    This paper introduces hedge funds and hedge fund service providers to IFRS.

  • IFRS in the Life Sciences: Broad implications

    Sponsored by: Deloitte

    This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.

  • Seven Steps to Achieving Better Requirements Engineering in Your Organization

    Sponsored by: IBM

    Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.

  • SOA Best Practices: The BPEL Cookbook

    Sponsored by: Oracle Corporation

    The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.

  • RFID Basics for Retailers

    Sponsored by: Intermec

    This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.

Browse by Report Type: Standards White Papers | Standards Multimedia | Standards IT Downloads

See more topics related to: Standards

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.