Governance White Papers

(View All Report Types)
Steer Safely into the Cloud
sponsored by Layer 7 Technologies
WHITE PAPER: Despite the many benefits, cloud computing also introduces new security risks and compromises the traditional control of IT, hindering many business from adoption. This paper offers insight into cloud governance, that helps tackle cloud security concerns and provides a path that will guide businesses to the cloud in a controlled and secured manner.
Posted: 18 Jul 2011 | Published: 18 Jul 2011

Layer 7 Technologies

Business Management in the Age of Enterprise 2.0
sponsored by Oracle Corporation
WHITE PAPER: In this analysis, Frank Buytendijk examines what information management means, and describes a complete spectrum of business cases, ranging from tactical cost reduction to transformational impact on the organization’s business model.
Posted: 03 Feb 2010 | Published: 01 Dec 2008

Oracle Corporation

Own your process, own your information, own your business with SOA
sponsored by IBM
WHITE PAPER: This white paper details why building in business process management, information management and SOA governance across the enterprise is critical to SOA success. It also presents real-world examples of IBM customers that have done so and are now reaping the benefits of SOA, including service reuse, business agility and business transformation.
Posted: 07 Jul 2011 | Published: 01 Dec 2010

IBM

Keep Users Happy by Integrating IT Operations and IT Support
sponsored by BMC Software, Inc.
WHITE PAPER: This white paper discusses the need to bridge the gap between sides of an IT staff and how it can help a business.
Posted: 08 Oct 2013 | Published: 09 Oct 2012

BMC Software, Inc.

A Governance Framework for Adopting SOA
sponsored by Infosys Technologies Limited
WHITE PAPER: SOA initiatives have gathered momentum in the past year with more enterprises either implementing or considering implementing SOA in the near future.
Posted: 13 Nov 2006 | Published: 01 Sep 2006

TOPICS:  IT Governance | SOA
Infosys Technologies Limited

Essential UXP Guide: MarketScope Helps Buyers Identify Top Priorities
sponsored by IBM
WHITE PAPER: The following MarketScope white paper explores the current state of user experience platforms and what you need to know about the market when moving forward. Learn how to choose the right solution for your organization and gain access to a comprehensive comparison of many of the leading UXP vendors.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

IBM

Solution Brief: Five IT Projects for Business Agility
sponsored by IBM
WHITE PAPER: This white paper discusses taking a pro-active approach to business agility. Learn how this strategy can create "operational dexterity" to deal with changing conditions and business complexity, as well as drive innovation by encouraging growth and flexibility.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

The Perfect Storm - Why Now Is The Time For Open Source
sponsored by Red Hat and Intel
WHITE PAPER: Open source is recognized for its ease of use, high performance, and affordability, especially amidst turbulent economic conditions. The high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions.
Posted: 19 Jun 2009 | Published: 01 Jun 2009

Red Hat and Intel

Keep Your BI Tools Running Smoothly with Intelligent Automation
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to discover intelligent automation tools that free your IT team from the labor-intensive and time-consuming tasks that are associated with the administration of the SAP NetWeaver BW Accelerator appliance while accelerating time-to-insight with easily-accessible, timely, accurate business intelligence (BI) data.
Posted: 01 Mar 2012 | Published: 23 Feb 2012

Cisco Systems, Inc.

Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance
sponsored by IBM
WHITE PAPER: This paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor...
Posted: 19 Nov 2007 | Published: 01 Mar 2007

IBM