ComputerWeekly.com Research Library

Powered by Bitpipe.com

Standards White Papers

  • Database Security Tools: Purchasing Advice

    Sponsored by: TechTarget

    The appeal of database security tools is that they don't alter the database or application, and they result in only minimal performance impacts. This expert guide compares the strengths and weaknesses of database security tools while offering 9 keys steps for procuring the right database security software for your enterprise.

  • Top 10 Measurement and Planning Mistakes and How to Avoid Them

    Sponsored by: Information Builders

    Access this white paper to review the 10 most common planning and measurement errors that businesses commit. In addition to examining these blunders, discover real-world examples of how an enterprise can avoid or correct them. Learn strategic solutions, such as setting sensible goals.

  • The Open Group - Cloud Computing guide to interoperability and portability

    Sponsored by: ComputerWeekly.com

    This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.

  • Open Trusted Technology Provider Standard (O-TTPS)

    Sponsored by: ComputerWeekly.com

    This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.

  • An Introduction to Quantum Lifecycle Management

    Sponsored by: ComputerWeekly.com

    This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.

  • Business Continuity Management Systems

    Sponsored by: ComputerWeekly.com

    Brush-up you knowledge of the practical aspects of business continuity management with this book extract.

  • Multiple Country Implementation — Influencing Factors and Approaches

    Sponsored by: ComputerWeekly.com

    This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: SearchSecurity.com

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • The Banking Industry Architecture Network and TOGAF

    Sponsored by: ComputerWeekly.com

    This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.

  • SOA Reference Architecture

    Sponsored by: ComputerWeekly.com

    Download the Open Group Service-Oriented Architecture reference architecture.

  • TOGAF® and SABSA® Integration

    Sponsored by: ComputerWeekly.com

    This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.

  • Video conferencing standards and interoperability considerations

    Sponsored by: SearchSecurity.com

    Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.

  • Security Report Card: Do You Meet NIST Standards?

    Sponsored by: LogRhythm, Inc.

    The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.

  • One Click Away: Where Does the Data Come From?

    Sponsored by: LANSA

    Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.

  • Solving the Scalability Problem with Big Data

    Sponsored by: WANdisco

    A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.

  • Beyond the Balance Sheet: Assessing the Impact of the New Lease Accounting Standard

    Sponsored by: IBM

    This white paper will help CFOs deal with the 2015 FASB and IASB changes, which eliminate all operating leases from the income statement and move them onto the balance sheet as a capital expense.

  • Facilitating “sound practices” in risk management with IBM OpenPages ORM

    Sponsored by: IBM

    This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.

  • Virtualization Roadmap: Twists, Turns, and Key Considerations

    Sponsored by: Dell, Inc. and Intel®

    This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.

  • Compliance Policy Management: Continuous Compliance with Tripwire Enterprise

    Sponsored by: Tripwire, Inc.

    Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.

  • E-Book: Standardizing Business Continuity

    Sponsored by: IBM

    Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

  • Cisco and Standards: Opening the Door to Borderless Networks

    Sponsored by: Cisco Systems, Inc.

    This white paper details the need for standards adoption and adherence in order to reap the rewards in the following areas: Integration and testing, deployment, operations, problem resolution, availability, security, accessibility, open systems, cost savings, and choice.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • Securing the Foundation of Information Technology (IT) Systems

    Sponsored by: Trusted Computer Solutions

    This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.

  • Industry Intelligence: International Financial Reporting Standards for Hedge Funds

    Sponsored by: Advent Software, Inc

    This paper introduces hedge funds and hedge fund service providers to IFRS.

  • IFRS in the Life Sciences: Broad implications

    Sponsored by: Deloitte

    This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.

Browse by Report Type: Standards White Papers | Standards Multimedia | Standards IT Downloads

See more topics related to: Standards

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.