System Engineering Reports

Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

A Guide to Systems Planning for Data Center Management
sponsored by Schneider Electric
WHITE PAPER: In this paper, you will learn how to eliminate systems planning problems with an orderly sequence of tasks that progressively transform and refine information from initial concept to final data center design.
Posted: 04 Feb 2009 | Published: 03 Feb 2009

Schneider Electric

The Hitchhiker's Guide to Hadoop 2
sponsored by TechTarget Data Management
EBOOK: With the introduction of Hadoop 2, ending the reliance on MapReduce and introducing HDFS federation and high availability, this is a big step toward maturity for the technology. In this Hadoop 2 guide, explore new possibilities; determine how your business can take advantage of these increased options.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

TechTarget Data Management

IT Project Management: Guide to estimating timescales and resources.
sponsored by TechTarget ComputerWeekly.com
BOOK: Learn how to estimate the effort and timescales required for IT projects with this extract from Project management for IT-related projects.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

TechTarget ComputerWeekly.com

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle
sponsored by iTKO LISA
WHITE PAPER: This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

iTKO LISA

Reducing the risk of development failure with cost-effective capture and management of requirements
sponsored by IBM
WHITE PAPER: In this paper from Bloor research, explore the key success factors of effective requirements management, and discover some of the tools offered to help you achieve your goal. Learn the business value of these requirements management tools, and how your organization can enjoy some of the benefits that real-world companies experienced.
Posted: 08 Nov 2013 | Published: 31 Jul 2013

IBM

Solitaire Interglobal: Comparing Virtualization Methods for Business - Executive Summary
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Software Integrity for Agile Environments
sponsored by Coverity by Synopsys
WHITE PAPER: While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Coverity by Synopsys

Smarter system development: a systems engineering trade study to support green initiatives with model-driven development
sponsored by IBM
WHITE PAPER: Trade study analysis is an effective method of comparing potential solutions to a given problem. Using a model-driven approach allows you to perform trade studies before development or implementation begins and saves time, money, and development headaches. Read on to learn more.
Posted: 14 May 2009 | Published: 01 Apr 2009

IBM

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
sponsored by Information Security Magazine
EZINE: November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010

Information Security Magazine