EPMO Reports

Can a zero-trust approach fill the security perimeter void?
sponsored by TechTarget Security
EBOOK: Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

TechTarget Security

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012

SmartBear Software

Ten Key Steps to Effective Succession Planning
sponsored by Halogen Software
WHITE PAPER: Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.
Posted: 21 Aug 2008 | Published: 20 Aug 2008

Halogen Software

Who needs security orchestration, automation and response?
sponsored by TechTarget Security
EBOOK: Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

TechTarget Security

Incident response playbook in flux as services, tools arrive
sponsored by TechTarget Security
EBOOK: The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TechTarget Security

Application Lifecycle Management for the Enterprise: Serena's Approach to ALM 2.0
sponsored by SERENA Software, Inc.
WHITE PAPER: ALM has made software development projects more successful over the past twelve years, but statistics show there is still room for improvement. See how Serena's ALM approach can help your organization overcome the shortcomings of traditional ALM tools.
Posted: 07 May 2007 | Published: 01 Apr 2007

SERENA Software, Inc.

Replication for Dummies
sponsored by Sybase, an SAP company
EBOOK: IT organizations face many data challenges. Data distribution rates and the quantity of data that consumers use is expanding exponentially in the global marketplace. Read this e-book to gain an understanding of the Sybase Replication Server and learn a series of best practices to consider when implementing a database replication strategy.
Posted: 08 Mar 2010 | Published: 05 Mar 2010

Sybase, an SAP company

The Capital Delivery Revolution and Technology: Connecting Capital Planning, Construction, and Everything in Between
sponsored by Oracle Corporation
WHITE PAPER: This white paper recognizes three principal solution areas in the capital project delivery lifecycle: project design, project execution, and organizational governance. In particular, it addresses the area of project execution and the means available today to drive successful project delivery on a consistent basis.
Posted: 08 Oct 2009 | Published: 01 Jan 2009

Oracle Corporation

Accelerating Time to Market Using SOA
sponsored by Infosys Technologies Limited
CASE STUDY: Infosys partnered with the client to define and implement a SOA framework to accelerate legacy revitalization, leading to a nine-month reduction in time-to-market and savings of US $12 million in the first year.
Posted: 13 Nov 2006 | Published: 01 Apr 2006

Infosys Technologies Limited

A Computer Weekly buyer's guide to secure coding
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.
Posted: 07 Jul 2023 | Published: 07 Jul 2023

TechTarget ComputerWeekly.com