Best Practices White Papers

Best Practice is a management idea which asserts that there is a technique, method, process, activity, incentive or reward that is more effective at delivering a particular outcome than any other technique, method, process, etc. The idea is that with proper processes, checks, and testing, a project can be rolled out and completed with fewer problems and unforeseen complications.
Results 1 - 25 of 852Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Oct 21, 2014

This paper provides new perspectives enabling today's operators to deliver quad play services and more in the face of intense competition

Tags : telco services, virtualization, application automation, quad play services, application integration, application performance management, best practices, business process automation
    
By: CA Technologies     Published Date: Oct 21, 2014

In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.

Tags : devops, software, training, project management, software development, application integration, application performance management, best practices
    
By: CA Technologies     Published Date: Oct 21, 2014

In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.

Tags : devops, software, training, project management, software development, application integration, application performance management, best practices
    
By: CA Technologies     Published Date: Oct 21, 2014

In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.

Tags : devops, software, training, project management, software development, application integration, application performance management, best practices
    
By: CA Technologies     Published Date: Oct 21, 2014

In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.

Tags : devops, software, training, project management, application integration, application performance management, best practices, performance testing
    
By: IBM     Published Date: Oct 14, 2014

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, it security, resilience investments, enhanced brand value, security, it management, best practices, business intelligence
    
By: IBM     Published Date: Oct 10, 2014

Agile Development and DevOps emphasize quick feedback cycles. But how do we test non-trivial applications with many components? What do we do when some components are outside of our control, expensive to access, or simply not ready to test against? Delaying integration testing or running the tests infrequently is can cause problems to linger, quality to fall, and delivery delays.

Tags : agile development, composite applications, integration testing, it management, knowledge management, application integration, best practices, business analytics
    
By: IBM     Published Date: Oct 10, 2014

Todayís competitive marketplace requires the organization to frequently release and deploy applications at the pace of user demands, with reduced cost, risk, and increased quality.

Tags : application release, application control, application deployment, it management, best practices, business intelligence, business management
    
By: IBM     Published Date: Oct 10, 2014

Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.

Tags : release management, application management, market trends, application deployment, it management, knowledge management, best practices, business intelligence
    
By: IBM     Published Date: Oct 10, 2014

This book gives you insight into what it means to leverage service virtualization in your testing environments.

Tags : ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
By: IBM     Published Date: Oct 10, 2014

Forrester Research has just completed a Total Economic Impact study for a large financial services institution to quantify the actual return on investment for service virtualization. Read Forresterís analysis to learn how service virtualization is eliminating testing bottlenecks and significantly reducing the cost of testing.

Tags : ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
By: IBM     Published Date: Oct 10, 2014

Get the essentials about agile testing and service virtualization from several different perspectives Ė get an analystís take from Diego Lo Giudice of Forrester Research on how to remove agile testing bottlenecks and ways to calculate your potential return on investment for Service Virtualization

Tags : ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
By: IBM     Published Date: Oct 10, 2014

This paper will explore best practices for identifying and eliminating seven types of waste: Waiting, handoffs and task switching, motion, extra processes, extra features, partially completed work and defects.

Tags : ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

Mobile device Management was just the beginning of the enterprise journey towards complete mobility. Learn why enterprise mobility management is now needed for all devices and data for work.

Tags : mobile device management, mobility, enterprise mobility, mobile security, application management, it management, knowledge management, best practices
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

As a retail security professional, you are challenged with maintaining a constant state of PCI compliance and keeping your infrastructure safe using best-of-breed security solutions that help, rather than hinder, your quest to validate your systems. Endpoint protection that is based on detecting known malware is demonstrably ineffective óand has the potential to create numerous inefficiencies across your organization. In addition, constant updating of security patches and antivirus software libraries can slow response times and leave endpoints vulnerable to APT attacks. Besides potential breaches of your customersí personal information, as well as damage to your brand, a lack of endpoint control can also put you at risk for steep PCI noncompliance and regulatory penaltiesófines that can range anywhere from $10,000 to $100,000 per month.

Tags : retail security, pci compliance, infrastructure security, endpoint protection, security, knowledge management, best practices, project management
    
By: Bit9     Published Date: Sep 30, 2014

Recent high-profile data breaches at brand name retailers, highlight the need to protect your companyís reputation and your customerís personal information. The consequences of suffering a data breach are numerous, and none of them are positive ó consumer mistrust, a drop in traffic and a decrease in sales, to name just a few.

Tags : data breach protection, it security, infrastructure protection, pci compliance, security, knowledge management, best practices, business activity monitoring
    
By: Bit9     Published Date: Sep 30, 2014

Most organizations must comply with multiple standards covering privacy, corporate financial data, Protected Health Information and credit card data. Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure. However, GRC requirements do not exist in a vacuum. Organizational objectives must also be supported. Critical functions can be disrupted if business needs are not considered when establishing compliance activities. In addition, providing evidence that the appropriate controls are in place and enforced is a requirement of any audit. Investing in selecting the right policies, controls and solutions leads to more successful audits and security that is more reliable.

Tags : security controls, risk compliance, it auditor, security, it management, best practices, business activity monitoring, risk management
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock? The good news is IT can embrace BYOD with security and confidence given the right preparation and technology??

Tags : byod, device discovery, self-service portals, end users, knowledge management, mobile data systems, best practices
    
By: Raritan     Published Date: Sep 24, 2014

Why Color Rack PDU's? Make it east for Technicians working on your IT rack and Reduce Lighting In Your Datacenter. Download now to find out the other benefits.

Tags : raritan, rack, data center, power, data center power, power and cooling, pdu, small business networks
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.