HIT Consultant Insightful coverage of healthcare innovation
 

requirements management

Results 151 - 175 of 185Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 27, 2014
If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for you. This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, cut costs, systems engineering for dummies, revolutionizing requirements
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : 
quality management approaches, compliance requirements, health sector, regulatory requirements, risk management
    
IBM
Published By: Marketo     Published Date: Feb 07, 2017
Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on lead management functionality, thriving partner ecosystem, and roadmap. Marketo's easy and powerful lead management capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 400 technology and service providers that offer best-of-breed solutions for today’s marketers. The full report includes: Market evaluation and analysis of 17 CRM lead management vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying lead management systems Download the report to learn about these topics and more.
Tags : 
gartner, crm lead management, marketo, crm, launchpoint, vendor selection
    
Marketo
Published By: IBM     Published Date: Oct 10, 2014
Requirements definition and management is recognized as a necessary step for the successful delivery of systems and software projects; the discipline is also required by standards, regulations and quality improvement initiatives like Capability Maturity Model Integration (CMMI).
Tags : 
ibm, requirements management, cmmi, successful delivery, distinctively identified, specific solutions, defined requirement, managing requirements
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : 
ibm, requirements management, risk analysis, conformance assessments, addressing complexity, manage requirements, manage compliance
    
IBM
Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
    
AlienVault
Published By: IBM     Published Date: Mar 10, 2015
Using productivity tools for requirements management is like using a hammer to open a bottle. It gets the job done, but at what cost? IBM Rational DOORS NG offers effective requirements management capabilities by including the ability to capture relationships and manage dependencies.
Tags : 
ibm, systems engineering, productivity tools, project data
    
IBM
Published By: IBM     Published Date: Mar 10, 2015
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : 
ibm, oil industry, gas industry, requirements management, risk analysis, conformance assessments
    
IBM
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies
    
Aventail
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food
    
IBM
Published By: IBM     Published Date: Mar 17, 2009
Download this webcast replay to learn more about: Integrating Software Development and System Engineering, Integrated Requirements Engineering, Cross-Discipline Change and Configuration Management
Tags : 
ibm, telelogic, automotive system designs, mechatronics, electronic and software engineering, ptc, ibm rational, integrated requirements engineering
    
IBM
Published By: Sanbolic     Published Date: Aug 21, 2009
Enterprise data requirements grow at 50 - 100 percent a year, creating a constant storage infrastructure management challenge. As new storage is brought into the environment, it is typically added within inflexible single server-silos.
Tags : 
storage, storage area network, storage area networks, san, sans, ip san, ip networks, ip storage
    
Sanbolic
Published By: IAG Consulting     Published Date: Aug 23, 2010
Find the path to success in business requirements definition and management. Technology pervades almost every aspect of corporate competitiveness from customer experience to the products and services offered. Companies that do a poor job at requirements definition and management have trouble communicating needs between the business and technology operations. This inability to clearly and efficiently communicate business needs will eventually show up in the fiscal results of even the largest publicly traded companies.
Tags : 
iag, project management, project management, maturity, benchmark, microcast, consulting, business requirements
    
IAG Consulting
Published By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : 
quocirca, business service management, bsm, service management, business management
    
Quocirca
Published By: GFI     Published Date: Jun 08, 2007
This white paper examines the requirements to adhere to the Payment Card Industry Data Security Standard (PCI DSS), the implications of non-compliance and how effective event log management and network vulnerability management can help achieve compliance.
Tags : 
pci, credit card, payment card, compliance, mastercard, database security, privacy, consumer
    
GFI
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : 
storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san
    
TeraCloud
Published By: IFS     Published Date: Aug 11, 2011
Learn to select ERP for Aerospace and Defense Manufacturing, including requirements like PBL, government reporting, and government-owned inventory management.
Tags : 
ifs, defense manufacturing business, erp, enterprise resource planning, aerospace, pbl, government inventory management, mro
    
IFS
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
    
LogRhythm
Published By: SAS     Published Date: Aug 03, 2016
The financial crisis that began in 2007 highlighted the major shortcomings of the regulatory framework around minimum capital requirements and liquidity requirements. In response, the Basel Committee on Banking Supervision made substantial revisions to its guidelines - specifically, by including more demanding capital and liquidity requirements now commonly referred to as Basel III framework. National banking authorities around the world are adopting the new Basel III framework as a way to eliminate systemic liquidity risk and promote greater transparency of risk management practices.
Tags : 
optimization, finance, financial crisis, liquidity requirements, banking, framework, risk management
    
SAS
Published By: MKAdvantage     Published Date: Feb 03, 2011
This paper describes some best practices around how to gather requirements for an upcoming ITSM project
Tags : 
itsm assessment, itsm requirements, itsm planning, monitoring and management
    
MKAdvantage
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.