PMO Reports

Who needs security orchestration, automation and response?
sponsored by TechTarget Security
EBOOK: Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

TechTarget Security

Accelerating Time to Market Using SOA
sponsored by Infosys Technologies Limited
CASE STUDY: Infosys partnered with the client to define and implement a SOA framework to accelerate legacy revitalization, leading to a nine-month reduction in time-to-market and savings of US $12 million in the first year.
Posted: 13 Nov 2006 | Published: 01 Apr 2006

Infosys Technologies Limited

Ten Key Steps to Effective Succession Planning
sponsored by Halogen Software
WHITE PAPER: Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.
Posted: 21 Aug 2008 | Published: 20 Aug 2008

Halogen Software

Application Lifecycle Management for the Enterprise: Serena's Approach to ALM 2.0
sponsored by SERENA Software, Inc.
WHITE PAPER: ALM has made software development projects more successful over the past twelve years, but statistics show there is still room for improvement. See how Serena's ALM approach can help your organization overcome the shortcomings of traditional ALM tools.
Posted: 07 May 2007 | Published: 01 Apr 2007

SERENA Software, Inc.

Replication for Dummies
sponsored by Sybase, an SAP company
EBOOK: IT organizations face many data challenges. Data distribution rates and the quantity of data that consumers use is expanding exponentially in the global marketplace. Read this e-book to gain an understanding of the Sybase Replication Server and learn a series of best practices to consider when implementing a database replication strategy.
Posted: 08 Mar 2010 | Published: 05 Mar 2010

Sybase, an SAP company

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012

SmartBear Software

Smarter system development: a systems engineering trade study to support green initiatives with model-driven development
sponsored by IBM
WHITE PAPER: Trade study analysis is an effective method of comparing potential solutions to a given problem. Using a model-driven approach allows you to perform trade studies before development or implementation begins and saves time, money, and development headaches. Read on to learn more.
Posted: 14 May 2009 | Published: 01 Apr 2009

IBM

Dell Deployment Design and Implementation
sponsored by Dell, Inc. and Microsoft Windows 7
DATA SHEET: The Dell Project and Program Management approach enables the alignment of all elements of a client deployment. This standardized and easy-to-understand framework can be tailored as necessary to complement and integrate with existing customer processes.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

Dell, Inc. and Microsoft Windows 7

Build Your Agile Business - The Sourcebook: Agile at the Program Level
sponsored by Rally Software
WHITE PAPER: This resource provides guidance for groups of Agile teams to work successfully towards continuous value delivery at the Program Level. This guide contains content, agendas, and real-world advice from experts and peers on how to effectively organize around enterprise value streams, and align to a common mission.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

Rally Software

Incident response playbook in flux as services, tools arrive
sponsored by TechTarget Security
EBOOK: The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TechTarget Security