Best Practices White Papers

Best Practice is a management idea which asserts that there is a technique, method, process, activity, incentive or reward that is more effective at delivering a particular outcome than any other technique, method, process, etc. The idea is that with proper processes, checks, and testing, a project can be rolled out and completed with fewer problems and unforeseen complications.
Results 1 - 25 of 813Sort Results By: Published Date | Title | Company Name
By: AtTask     Published Date: Oct 07, 2014

Agile methodologies and the DevOps movement promise faster time-to-deployment, higher quality code, more engaged, productive workers, and happier customers. But there are two sides to every story. In this webinar, we will examine the reasons why businesses might choose one methodology over another and suggest concrete steps businesses can take to get the most out of each methodology while removing friction.

Tags : attask, agile management, productivity, software development, project management, best practices, quality assurance, web development
    
By: Bit9     Published Date: Sep 30, 2014

As a retail security professional, you are challenged with maintaining a constant state of PCI compliance and keeping your infrastructure safe using best-of-breed security solutions that help, rather than hinder, your quest to validate your systems. Endpoint protection that is based on detecting known malware is demonstrably ineffective —and has the potential to create numerous inefficiencies across your organization. In addition, constant updating of security patches and antivirus software libraries can slow response times and leave endpoints vulnerable to APT attacks. Besides potential breaches of your customers’ personal information, as well as damage to your brand, a lack of endpoint control can also put you at risk for steep PCI noncompliance and regulatory penalties—fines that can range anywhere from $10,000 to $100,000 per month.

Tags : retail security, pci compliance, infrastructure security, endpoint protection, security, knowledge management, best practices, project management
    
By: Bit9     Published Date: Sep 30, 2014

Recent high-profile data breaches at brand name retailers, highlight the need to protect your company’s reputation and your customer’s personal information. The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few.

Tags : data breach protection, it security, infrastructure protection, pci compliance, security, knowledge management, best practices, business activity monitoring
    
By: Bit9     Published Date: Sep 30, 2014

Most organizations must comply with multiple standards covering privacy, corporate financial data, Protected Health Information and credit card data. Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure. However, GRC requirements do not exist in a vacuum. Organizational objectives must also be supported. Critical functions can be disrupted if business needs are not considered when establishing compliance activities. In addition, providing evidence that the appropriate controls are in place and enforced is a requirement of any audit. Investing in selecting the right policies, controls and solutions leads to more successful audits and security that is more reliable.

Tags : security controls, risk compliance, it auditor, security, it management, best practices, business activity monitoring, risk management
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : data center security, server security, targeted attacks, data breaches, security, it management, knowledge management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

Regardless of how they initially enter the organization, most attackers today still aim to compromise internal servers to steal user credentials, steal sensitive data, and turn compromised servers into hosting platforms used to help attackers steal even more assets. This SANS whitepaper discusses the methodology of internal and external attacks on data center servers and the applications running on them. It also discusses why, even with our layers of security in place today, servers are still vulnerable, and how organizations can leverage application controls to permit what is known and trusted while denying everything else.

Tags : server security, platform protection, data center servers, server vulnerability, security, knowledge management, best practices, project management
    
By: IBM     Published Date: Sep 16, 2014

In a world that demands scalability, modularity, quality, fast performance and a best practices approach is key to ensuring predictable results for the business. IBM’s PowerLinux Open Source Infrastructure Services solution is a workload-optimized system that meets or exceeds best practices for a virtualized infrastructure at a reasonable price point. The PowerLinux solution can help turn today’s IT infrastructure into a well-tuned utility, providing a more flexible, scalable and valuable asset to the business.

Tags : virtualized infrastructure, it infrastructure, deployment options, it management, best practices, business intelligence
    
By: IBM     Published Date: Sep 15, 2014

Join Eric Minick of IBM for a look at what a DevOps toolchain is made of. While IBM is a vendor that provides tools that can fit into this tool chain, this webinar will not be a product demo. Instead, he will be taking a broader view of the software delivery lifecycle.

Tags : software delivery, idea tracking, monitoring, software development, application performance management, best practices, business activity monitoring
    
By: IBM     Published Date: Sep 15, 2014

In this white paper, IDC examines how IBM's Storwize family of storage offerings is changing the game by delivering a robust enterprise grade virtualization platform that is efficient, cost-effective, and optimized.

Tags : enterprise storage, big data, cloud computing, virtualization platform, best practices, business analytics, business intelligence, business management
    
By: Micro Focus     Published Date: Sep 12, 2014

The corporate end-user community provides vital cogs in the wheel of a healthy organization. Users include the call centers, the retail assistants, the service desks, the sales offices and the people who deal with order processing. Yet many of these users are often faced with outdated user interfaces (UIs), and struggle to cope with the levels of efficiency and throughput needed. Worse still, these old systems typically only run on a connected terminal - or ‘green screen’ - but more and more these days, users need web and mobile access. Micro Focus Rumba+ dramatically improves business efficiency by providing a better user experience. It can also now be accessed from a variety of devices. Let’s take a look at five top reasons to move to Rumba+.

Tags : user experience, user interfaces, mainframe apps, business efficiency, best practices, business intelligence, business management
    
By: Tripp Lite     Published Date: Sep 11, 2014

Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. Users may assume that they need to increase cooling capacity, but this is expensive and often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.

Tags : cooling, efficiency, heat-related, server rooms, data center, computing, equipment, performance
    
By: Logicalis     Published Date: Sep 10, 2014

Video solutions eliminate geographic boundaries and allow you to sit across a conference table from fellow participants, regardless of where they are in the world. By using unified video collaboration solutions for a virtually unlimited number of applications, you can boost productivity and communication throughout your organization, even across the largest of enterprises—allowing you to become more agile and responsive to changing needs. Download this white paper to learn how.

Tags : logicalis, cisco, cisco systems, video communication, video solutions, enterprise video technologies, enterprise applications, employee collaboration
    
By: Neustar     Published Date: Aug 27, 2014

The chorus starts every year before the first carol is sung: “Load test before the holidays! If you don’t, you’ll be sorry!” Good advice, but wouldn’t it be nice to get some concrete tips? In the spirit of giving, Neustar’s engineers have identified 3 best practices.

Tags : load testing, cloud-based platform, business practice, distributed computing, network performance, best practices
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Global Knowledge     Published Date: Apr 24, 2014

Nearly every WebSphere administrator has desired a deeper understanding of how passwords are created, used, stored, and encrypted. Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

Tags : global knowledge, websphere application server, password security, security, best practices
    
By: Global Knowledge     Published Date: Apr 08, 2014

Microsoft no longer supports Windows XP (or Office 2003), so now it's decision time for many organizations. Remarkably, Windows XP in early 2014 still holds somewhere between 15% and 25% of the overall PC operating system market, depending on whose analysis you read. Find out what to consider when upgrading from Windows XP to a new operating system.

Tags : global knowledge, windows xp, windows 7, windows 8, end of life, support lifecycle policy, best practices, product lifecycle management
    
By: Global Knowledge     Published Date: Apr 08, 2014

AWS has introduced Auto Scaling so that you can take advantage of cloud computing without having to incur the costs of adding more personnel or building your own software. You can use Auto Scaling to scale for high availability, to meet increasing system demand, or to control costs by eliminating unneeded capacity. You can also use Auto Scaling to quickly deploy software for massive systems, using testable, scriptable processes to minimize risk and cost of deployment.

Tags : global knowledge, amazon auto scaling, cloud computing, security, best practices, productivity, project management
    
By: Dyn     Published Date: Mar 27, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: Dyn     Published Date: Mar 27, 2014

If your ads are slow to load, chances are, consumers aren’t going to wait around to see them. Just the smallest amount of latency can cost you thousands of views, clicks, and conversions. By following these 5 guidelines, you can reduce your overall network latency and keep those clicks coming.

Tags : dyn, network latency, customer retention, serve content, combating latency, own network, global network, anycast
    
By: Dyn     Published Date: Mar 27, 2014

DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them.

Tags : dyn, dns, security risks, arbor networks survey, ddos attacks, dns amplification, amplification exploits, network performance
    
By: Box     Published Date: Mar 13, 2014

This recorded webinar discusses the latest challenges with BYOD (Bring Your Own Device) faced by today's organizations and recommendations on how to move forward with a BYOD workforce.

Tags : box, byod, mobile devices, iphone, android, mobile workers, mobile workforce, remote management
    
By: Imprivata     Published Date: Dec 06, 2013

Ensure that you have the right single sign-on vendor with this easy to use vendor selection evaluator’s guide.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: IFS     Published Date: Dec 27, 2012

Realize the benefits of consolidating your ERP products down to one.

Tags : erp, enterprise resource planning, enterprise, integration, process management, project management, application integration, application performance management
    
By: IFS     Published Date: Dec 27, 2012

Learn how an ETO manufacturer can go about selecting ERP software that truly meets their needs.

Tags : erp, enterprise resource planning, enterprise, integration, process management, project management, eto, application integration
    
By: Singlehop     Published Date: Oct 01, 2014

DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.

Tags : ddos attacks, it security, data breaches, security, it management, best practices, business activity monitoring, risk management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.