RecruitingBlogscom

Follow Us:

 

characteristics

Results 101 - 125 of 137Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 09, 2016
The clear benefits of agile development—better collaboration, incremental delivery, early error detection and the elimination of unnecessary work—have made it the default approach for many teams. Agile methods are also being adopted by systems engineering teams to deliver the same benefits. Some developers have questioned whether requirements fall into the category of unnecessary work, and can be cut down or even completely eliminated. Meanwhile, teams developing complex products, systems and regulated IT continue to have requirements-driven legacy processes. So how does requirements management fit in an agile world? This paper argues that requirements management can bring significant value to agile development in regulated IT and complex product development projects, and sets out the characteristics of an effective requirements management approach in an agile environment.
Tags : 
ibm, watson, iot, internet of things, continuous engineering, agile, agile development, business technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
Topics to be discussed include: - The need for new RAS characteristics in next-gen applications - The benefits of having an agile and scalable platform for workloads running SUSE Linux Enterprise Server on IBM Power Systems
Tags : 
ibm, hardware, systems hardware, linux, linux on power, security, software development, enterprise applications
    
IBM
Published By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : 
iag, project management, project management, maturity, consulting, business requirements
    
IAG Consulting
Published By: Mentor Graphics     Published Date: Sep 11, 2009
"As the number of enhancements to various Hardware Description Languages (HDLs) has increased over the past year, so too has the complexity of determining which language is best for a particular design. Many designers and organizations are contemplating whether they should switch from one HDL to another. This paper compares the technical characteristics of three, general-purpose HDLs.
Tags : 
comparison of vhdl, verilog and systemverilog, mentor graphics, hardware description languages (hdls), vhdl (ieee-std 1076), verilog (ieee-std 1364), ieee standard, accellera
    
Mentor Graphics
Published By: IBM     Published Date: Apr 26, 2013
This Magic Quadrant assesses the APM market. First, we will define the market and explain why it's important to treat the five functional dimensions that together constitute its technology foundation in an integrated manner and to distinguish the APM market from others that are closely related to it. Next, we will set out the qualifying criteria for inclusion in this research and then survey some general characteristics of each of the resulting quadrants. This research will then conclude with a brief study of each participating vendor's APM strengths and weaknesses.
Tags : 
gartner, magic, quadrant, application, performance, monitoring, apm, market
    
IBM
Published By: IBM     Published Date: Apr 18, 2014
Infrastructure matters. Today’s business environment is increasingly dominated by mobile and cloud-based platforms, and by the skyrocketing volume of new data. And with 70 percent of the average organization's IT budget being spent on operations and maintenance, infrastructure must be simplified, adaptive and responsive. Those are the characteristics of the software defined environment: IBM’s optimized, customized, virtualized IT platform designed to replace systems that assign server, storage and network resources manually. This eBook serves as an essential introduction to SDEs: what they are, and why your organization needs them now more than ever.
Tags : 
ibm, software defined environments, sde, it infrastructure, workloads, it operations, optimization, software
    
IBM
Published By: Epicor     Published Date: Mar 19, 2015
As we move through 2015, the subject of the future of the supply chain has come back into focus. There are three main trends and technologies that will continue to have an enormous impact on the supply chain: • Dynamic networking and connectivity • Mobility in manufacturing • Modern collaboration Explore this whitepaper to learn how manufacturers are tackling these three critical areas, and how you can prepare your organization for the future of the manufacturing supply chain.
Tags : 
manufacturing supply chain, supply chain characteristics, collaboration, mobile, it management, enterprise applications
    
Epicor
Published By: Epicor Software     Published Date: Mar 18, 2015
As we move through 2015, the subject of the future of the supply chain has come back into focus. What does the future supply chain look like, and what do we expect some of the essential characteristics to be? Although this requires a degree of speculation, there are also some trends and technologies that clearly are having, and will continue to have, an enormous impact on the supply chain.
Tags : 
manufacturing supply chain, supply chain characteristics, collaboration, mobile, it management, enterprise applications
    
Epicor Software
Published By: CrowdTwist     Published Date: Jun 30, 2016
Learn 20 key characteristics to include in a loyalty program that customers will love and keep them coming back for more.
Tags : 
loyalty, acquisition, branding, consumers, strategy, search marketing, email marketing, website development
    
CrowdTwist
Published By: IBM     Published Date: Oct 14, 2014
This white paper, based on original IBM research with analysis by IDC, offers a Mobile Infrastructure Maturity Model and documents the best practices and characteristics of organizations that are leaders.
Tags : 
mobile technology, it strategies, mobile infrastructure, it management
    
IBM
Published By: IBM     Published Date: Jan 14, 2015
Cloud-delivered big data analytics presents an enormous opportunity for organizations that want to become more agile, more efficient and more competitive. To capitalize on the full potential of this opportunity, businesses need cloud-enabled big data analysis solutions that are flexible, simple, secure and open.
Tags : 
big data, data management, the cloud, cloud solutions, data, data analytics, client engagement, computing model
    
IBM
Published By: Citrix     Published Date: Feb 22, 2013
An enterprise cloud network is one that embodies the characteristics and capabilities that define public cloud services. These include being 'elastic' so that performance can be scaled and etc. Read on to learn more about Citrix Triscale Technology.
Tags : 
revolution in cloud networking, triscale technology, triscale technology, application management, capability management, business technology, data center
    
Citrix
Published By: Cisco     Published Date: Apr 04, 2016
This IDC study represents the vendor assessment model called the IDC MarketScape. This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of 12 of the top enterprise wireless LAN (WLAN) vendors. This evaluation is based on a comprehensive framework and a set of parameters expected to be most conducive to success in providing enterprise WLAN solutions, during both the short term and the long term.
Tags : 
cisco systems, idc marketscape, worldwide enterprise wlan, vendor assessment, idc study, wlan solutions, networking, it management
    
Cisco
Published By: Jigsaw     Published Date: Apr 12, 2011
This paper will discuss how to judge the quality of your business data and define the characteristics of your target customer and review how to craft marketing messages that resonate with your target customer.
Tags : 
quality business data, jigsaw, marketing campaign, sales, lead data, lead generation, roi, b2b lead
    
Jigsaw
Published By: Citrix     Published Date: Sep 10, 2013
This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of many client virtualization software vendors.
Tags : 
citrix, xendesktop, virtualization, virtual desktop, idc study, virtualization software, independent research
    
Citrix
Published By: Viavi Solutions     Published Date: Mar 21, 2016
With the increasing adoption of hybrid IT, organizations are seeking ways to manage these new “bimodal” environments. One proven way to manage a hybrid IT environment is to use a monitoring solution to ensure service, availability, and performance. Here we discuss five characteristics you should seek in a hybrid IT monitoring solution.
Tags : 
viavi solutions, it services, it monitoring, hybrid it, bimodal environments, monitoring solutions, best practices, networking
    
Viavi Solutions
Published By: Riverbed     Published Date: Aug 22, 2014
The performance of RecoverPoint continuous remote replication can be impacted by characteristics common to wide-area networks, including packet loss, latency and limited bandwidth. SteelHead WAN optimization appliances can be leveraged to overcome the negative effects of these impairments, delivering LAN-like performance for RecoverPoint and all other business applications traversing the WAN. In this paper you will learn about performance benefits of the combined EMC RecoverPoint and Riverbed SteelHead solution, as measured through collaborative testing from EMC and Riverbed.
Tags : 
performance, benefits, best-practices, networks, emc recoverpoint, collaborative testing, business technology
    
Riverbed
Published By: HP     Published Date: May 14, 2014
This Enterprise Strategy Group paper introduces the common characteristics and abilities of flash implementations and categorizes different approaches.  It also considers HP’s offerings from the perspective of a “flash-optimized” storage system while representing both IT and business implications.
Tags : 
flash optimized storage, it implications, business implications, enterprise strategy group, it management, enterprise applications
    
HP
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: Act-On     Published Date: Sep 19, 2014
From Facebook and Twitter to blogs and videos, social media has become part and parcel of modern marketing efforts. However, convincing the C-suite to spend resources on social media can be a tough task for marketing trailblazers. Some executives have yet to be convinced that social media is a worthy marketing strategy; some wonder if it’s not just the latest black hole for marketing dollars. A marketer’s best course of action is managing social efforts to generate demonstrable return on investment. In this whitepaper, we’ll cover five best practices to help you do just that.
Tags : 
marketing content, business, solve, information, prospects, customers, educate, inform
    
Act-On
Published By: Act-On     Published Date: Sep 19, 2014
Over the last 12 years, a massive amount of material has been written about Search Engine Optimization (SEO). Much of this material remains applicable today; However, there are a growing amount of out-dated tactics still being touted as best practices (exact match domain names, keyword density targets, exact anchor text, and so on). In this eBook, you’ll learn the current best practices in SEO that companies of all sizes can use to increase site visibility, increase traffic, and most importantly, improve conversion rates.
Tags : 
marketing content, business, solve, information, prospects, customers, educate, inform
    
Act-On
Published By: Act-On     Published Date: Sep 19, 2014
Content drives business, and at any given moment buyers are searching for information that will inform them, educate them, or help them solve a problem. Marketing content needs to speak to the needs of your prospects and customers while being geared to targeted points in your sales process. This guide gives you the top seven characteristics - and also gives you the seven best practices for developing content that resonates with your target audience, no matter where they are in the buying cycle.
Tags : 
marketing content, business, solve, information, prospects, customers, educate, inform
    
Act-On
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag
    
VisiStat
Published By: IBM     Published Date: Sep 02, 2009
This webcast presents an easy to follow process that you can use to capture requirements and specify a system architecture.
Tags : 
modeling, embedded software, ibm, sysml, seamless transition, model execution, dr. hoffman, rational harmony
    
IBM
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top