Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
IT Project Risk Assessment
Information technology project risk often comes from non-technical aspects of the initiative. Assessing the impact of technology on people, management systems and other initiatives is essential to assure project success.
: IT Project Risk Assessment IT Project Risk Assessment J. Dowling - August 22, 2002 Read Comments J. Dowling - August 22, 2002 Introduction Information technology project risk often comes from non-technical aspects of the initiative. Assessing the impact of technology on people, management systems and other initiatives is essential to assure project success. We automate problems This department slogan was posted on my office door (the inside) for several months while I and other managers in the
The Whys and Hows of a Security Vulnerability Assessment
TEC outlines the reasons for having a Security Vulnerability Assessment done, how a security vulnerability assessment is performed, what can be gained by enlisting the Security Vulnerability Assessment process, and what you should expect to see in a Security Vulnerability Assessment report. After all, the most important reason for having a Security Vulnerability Assessment performed is to enable corrective action. How can you know what to secure if you don't know what is insecure?
: of a Security Vulnerability Assessment The Whys and Hows of a Security Vulnerability Assessment L. Taylor - August 9, 2000 Read Comments L. Taylor - August 9, 2000 Introduction As businesses continue putting their web-enabled e-commerce sites containing the jewels of their infrastructure online, the importance of security and privacy becomes increasingly critical. A crucial way of addressing this need to protect the company website is to conduct a Security Vulnerability Assessment. A Security
The Benefits of Project Risk Assessment
This paper presents the arguments in favour of adopting a risk assessment strategy, and ways in which it can benefit your project as well as your business as a whole.
: Benefits of Project Risk Assessment The Benefits of Project Risk Assessment Source: Pertmaster Document Type: White Paper Description: This paper presents the arguments in favour of adopting a risk assessment strategy, and ways in which it can benefit your project as well as your business as a whole. The Benefits of Project Risk Assessment style= border-width:0px; /> comments powered by Disqus Related Topics: Risk Management, Project Management, Management Practices Source: Pertmaster
5/2/2006 3:48:00 PM
Vulnerability Assessment and Prevention with Rapid7 » The TEC Blog
Vulnerability Assessment and Prevention with Rapid7 » The TEC Blog TEC Blog TEC Home About TEC Contact Us About the Bloggers Follow TEC on Twitter RSS Discussing Enterprise Software and Selection --> Fast, Accurate Software Evaluations TEC helps enterprises evaluate and select software solutions that meet their exacting needs by empowering purchasers with the tools, research, and expertise to make an ideal decision. Your software selection starts here. Learn
: IT security, penetration testing, rapid7, Security, vulnerability assessment, vulnerability management, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
Recruitment and Staffing RFP Template
: Recruitment and Staffing RFP Template covers industry-standard functional criteria of Recruitment and Staffing that can help you easily gather and prioritize your business needs in a simple and categorized excel document. More than a RFP template, it is a working document that serves as a knowledge base reference throughout the life-span of your Recruitment and Staffing software project. Includes: Organizational Structures and Modeling, Corporate Branding, Sourcing, Applicant Tracking, Assessment and Selection, Governance and Compliance, Vendor Management System Portal (Staffing Agencies), Analytics and Reporting and Product Technology
Hiring on Assumptions Is Not Cost-effective
The importance of resource selection is undervalued in the software industry. But in fact, the resource selection process is directly related to software development mission success. The in-house interview process typically fails to achieve comprehensive in-depth skills assessment, and is not cost-effective. However, you can improve matters by integrating external technical skills assessment expertise into the hiring process.
: integrating external technical skills assessment expertise into the hiring process. Hiring on Assumptions Is Not Cost-effective style= border-width:0px; /> comments powered by Disqus Related Topics: Human Capital Management (HCM), Pre-Employment Testing, Staffing, Practices and Business Issues, Needs Analysis Related Industries: Professional, Scientific, and Technical Services Source: Valid Ground Consulting, Inc. Learn more about Valid Ground Consulting, Inc. Readers who dow
9/20/2006 4:44:00 PM
Managing WLAN Risks with Vulnerability Assessment
There are many ways to safeguard wireless local area networks (WLANs), but which measures should you deploy, and how can you tell whether your network is sufficiently hardened against 802.11 and 802.1X attacks? Download this white paper to learn about a process for business risk analysis, vulnerability identification, and threat remediation—and find out how to conduct your own WLAN vulnerability assessment.
: WLAN Risks with Vulnerability Assessment Managing WLAN Risks with Vulnerability Assessment Source: AirMagnet Document Type: White Paper Description: There are many ways to safeguard wireless local area networks (WLANs), but which measures should you deploy, and how can you tell whether your network is sufficiently hardened against 802.11 and 802.1X attacks? Download this white paper to learn about a process for business risk analysis, vulnerability identification, and threat remediation—and find out
8/8/2008 3:24:00 PM
Protect Your Business Intelligence Investment
You’re planning to upgrade your business intelligence (BI) solution and can’t wait for implementation. But are you sure of how to take advantage of its key value drivers, or which functionalities are best for your organization? And can you anticipate—and minimize—implementation risks? Find out how an upgrade assessment done by experienced professionals can help you develop a proven upgrade plan and lower associated costs.
: out how an upgrade assessment done by experienced professionals can help you develop a proven upgrade plan and lower associated costs. Protect Your Business Intelligence Investment style= border-width:0px; /> comments powered by Disqus Related Topics: Software Asset Management, Business Intelligence and Data Management, Business Intelligence (BI), Competitive Analysis, Enterprise Application Integration (EAI), Management Practices, Best Practices Source: SAP Learn more about
1/30/2008 3:04:00 PM
Would You Hire a Hacker? What Would Your Mother Say?
The hacker group the L0pht, has become the Research and Development division behind Battery Venture's new security startup @Stake. Corporate America and information technology decision makers have questions. Is it safe to expose your infrastructure to an organization that has branded itself as a hacker group?
: or a Network Vulnerability Assessment? If you have any doubts about a security consultancy s capabilities, ask them for references that include names and phone numbers. If you do hire @Stake, don t worry, they won t show up in ski masks. Oh, and don t forget to ask to see the lock-picking demo.
The Impact of Technology on Cost in Business Process Outsourcing
Many different factors contribute to the cost of a business process outsourcing (BPO) engagement. Among them, IT, especially software, is a key cost determinant that is often underestimated. A diligent assessment of BPO needs to address several cost components that are not included in the provider’s total contract value (TCV)—components which are often overlooked by buyers.
: often underestimated. A diligent assessment of BPO needs to address several cost components that are not included in the provider’s total contract value (TCV)—components which are often overlooked by buyers. The Impact of Technology on Cost in Business Process Outsourcing style= border-width:0px; /> comments powered by Disqus Related Topics: Business Process Management (BPM), Business Process Outsourcing Source: SAP Learn more about SAP Readers who downloaded this white paper also read
12/5/2006 12:06:00 PM
Technology Group International
: Founded in 1990, privately held TGI is an enterprise resource planning (ERP) software provider to small and midmarket manufacturers and distributors.
White Paper Newsletters