Advertisement
gartner requirements management tools: Gartner Group Symposium ITxpo , 1998 |
gartner requirements management tools: Engineering and Managing Software Requirements Aybüke Aurum, Claes Wohlin, 2006-04-07 Requirements engineering is the process by which the requirements for software systems are gathered, analyzed, documented, and managed throughout their complete lifecycle. Traditionally it has been concerned with technical goals for, functions of, and constraints on software systems. Aurum and Wohlin, however, argue that it is no longer appropriate for software systems professionals to focus only on functional and non-functional aspects of the intended system and to somehow assume that organizational context and needs are outside their remit. Instead, they call for a broader perspective in order to gain a better understanding of the interdependencies between enterprise stakeholders, processes, and software systems, which would in turn give rise to more appropriate techniques and higher-quality systems. Following an introductory chapter that provides an exploration of key issues in requirements engineering, the book is organized in three parts. Part 1 presents surveys of state-of-the art requirements engineering process research along with critical assessments of existing models, frameworks and techniques. Part 2 addresses key areas in requirements engineering, such as market-driven requirements engineering, goal modeling, requirements ambiguity, and others. Part 3 concludes the book with articles that present empirical evidence and experiences from practices in industrial projects. Its broader perspective gives this book its distinct appeal and makes it of interest to both researchers and practitioners, not only in software engineering but also in other disciplines such as business process engineering and management science. |
gartner requirements management tools: Mastering Cloud Security Posture Management (CSPM) Qamar Nomani, 2024-01-31 Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environment Key Features Choose the right CSPM tool to rectify cloud security misconfigurations based on organizational requirements Optimize your security posture with expert techniques for in-depth cloud security insights Improve your security compliance score by adopting a secure-by-design approach and implementing security automation Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionThis book will help you secure your cloud infrastructure confidently with cloud security posture management (CSPM) through expert guidance that’ll enable you to implement CSPM effectively, ensuring an optimal security posture across multi-cloud infrastructures. The book begins by unraveling the fundamentals of cloud security, debunking myths about the shared responsibility model, and introducing key concepts such as defense-in-depth, the Zero Trust model, and compliance. Next, you’ll explore CSPM's core components, tools, selection criteria, deployment strategies, and environment settings, which will be followed by chapters on onboarding cloud accounts, dashboard customization, cloud assets inventory, configuration risks, and cyber threat hunting. As you progress, you’ll get to grips with operational practices, vulnerability and patch management, compliance benchmarks, and security alerts. You’ll also gain insights into cloud workload protection platforms (CWPPs). The concluding chapters focus on Infrastructure as Code (IaC) scanning, DevSecOps, and workflow automation, providing a thorough understanding of securing multi-cloud environments. By the end of this book, you’ll have honed the skills to make informed decisions and contribute effectively at every level, from strategic planning to day-to-day operations.What you will learn Find out how to deploy and onboard cloud accounts using CSPM tools Understand security posture aspects such as the dashboard, asset inventory, and risks Explore the Kusto Query Language (KQL) and write threat hunting queries Explore security recommendations and operational best practices Get to grips with vulnerability, patch, and compliance management, and governance Familiarize yourself with security alerts, monitoring, and workload protection best practices Manage IaC scan policies and learn how to handle exceptions Who this book is for If you’re a cloud security administrator, security engineer, or DevSecOps engineer, you’ll find this book useful every step of the way—from proof of concept to the secured, automated implementation of CSPM with proper auto-remediation configuration. This book will also help cybersecurity managers, security leads, and cloud security architects looking to explore the decision matrix and key requirements for choosing the right product. Cloud security enthusiasts who want to enhance their knowledge to bolster the security posture of multi-cloud infrastructure will also benefit from this book. |
gartner requirements management tools: Supply Chain Management: Concepts, Methodologies, Tools, and Applications Management Association, Information Resources, 2012-12-31 In order to keep up with the constant changes in technology, business have adopted supply chain management to improve competitive strategies on a strategic and operational level. Supply Chain Management: Concepts, Methodologies, Tools, and Applications is a reference collection which highlights the major concepts and issues in the application and advancement of supply chain management. Including research from leading scholars, this resource will be useful for academics, students, and practitioners interested in the continuous study of supply chain management and its influences. |
gartner requirements management tools: Software Product Management and Pricing Hans-Bernd Kittlaus, Peter N. Clough, 2008-12-18 Software product management and pricing are key success factors for any organization providing software, be it a software company or an organization responsible for software in a company that belongs to a different industry. After defining the term software product and looking at the business and organizational sides, the core elements of software product management and pricing are discussed. Recommendations are given on how to deal with these elements depending on different types of organizations and products in order to achieve the long-term success. |
gartner requirements management tools: Knowledge Management Tools and Techniques Madanmohan Rao, 2012-06-14 Knowledge management (KM) - or the practice of using information and collaboration technologies and processes to capture organizational learning and thereby improve business performance - is becoming one of the key disciplines in management, especially in large companies. Many books, magazines, conferences, vendors, consultancies, Web sites, online communities and email lists have been formed around this concept. This practical book focuses on the vast offerings of KM solutions—technology, content, and services. The focus is not on technology details, but on how KM and IT practitioners actually use KM tools and techniques. Over twenty case studies describe the real story of choosing and implementing various KM tools and techniques, and experts analyse the trends in the evolution of these technologies and tools, along with opportunities and challenges facing companies harnessing them. Lessons from successes and failures are drawn, along with roadmaps for companies beginning or expanding their KM practice. The introductory chapter presents a taxonomy of KM tools, identifies IT implications of KM practices, highlights lessons learned, and provides tips and recommendations for companies using these tools. Relevant literature on KM practices and key findings of market research groups and industry consortia such as IDC, Gartner and APQC, are presented. The majority of the book is devoted to case studies, featuring clients and vendors along the entire spectrum of solutions: hardware (e.g. handheld/wearable devices), software (e.g. analytics, collaboration, document management) and content (e.g. newsfeeds, market research). Each chapter is structured along the 8Cs framework developed by the author: connectivity, content, community, commerce, community, capacity, culture, cooperation and capital. In other words, each chapter addresses how appropriate KM tools and technologies help a company on specific fronts such as fostering adequate employee access to knowledge bodies, user-friendly work-oriented content, communities of practice, a culture of knowledge, learning capacity, a spirit of cooperation, commercial and other incentives, and carefully measured capital investments and returns. Vendor history, product/service offerings, implementation details, client testimonials, ROI reports, and future trends are highlighted. Experts in the field then provide third-party analysis on trends in KM tools and technique areas, and recommendations for KM practitioners. |
gartner requirements management tools: Executive MBA in IT - City of London College of Economics - 12 months - 100% online / self-paced City of London College of Economics, Overview An MBA in information technology (or a Master of Business Administration in Information Technology) is a degree that will prepare you to be a leader in the IT industry. Content - Managing Projects and IT - Information Systems and Information Technology - IT Manager's Handbook - Business Process Management - Human Resource Management - Principles of Marketing - The Leadership - Just What Does an IT Manager Do? - The Strategic Value of the IT Department - Developing an IT Strategy - Starting Your New Job - The First 100 Days etc. - Managing Operations - Cut-Over into Operations - Agile-Scrum Project Management - IT Portfolio Management - The IT Organization etc. - Introduction to Project Management - The Project Management and Information Technology Context - The Project Management Process Groups: A Case Study - Project Integration Management - Project Scope Management - Project Time Management - Project Cost Management - Project Quality Management - Project Human Resource Management - Project Communications Management - Project Risk Management - Project Procurement Management - Project Stakeholder Management - 50 Models for Strategic Thinking - English Vocabulary For Computers and Information Technology Duration 12 months Assessment The assessment will take place on the basis of one assignment at the end of the course. Tell us when you feel ready to take the exam and we’ll send you the assignment questions. Study material The study material will be provided in separate files by email / download link. |
gartner requirements management tools: Capacity Management - A Practitioner Guide Annelies van der Veen, Jan van Bon, 1970-01-01 Capacity Management is described in most key ITSM frameworks: ITIL, ISO 20000 Microsoft Operations Framework (MOF) and the Application Service Library (ASL) all note the importance of Capacity Management. This major title meets the need for an in-depth practical guide to this critical process. Written and reviewed by some of the world s most respected experts in this field it shows how Capacity Management best practice can support provision of a consistent, acceptable service level at a known and controlled cost. Practical advice covers the essential control of two balances: Supply versus demand and resources versus cost. In times of mean, frugal economic measures, it is essential to focus on those practices that are effective and yield practical results. In enlightened times of sustainability, it is also a requirement to find solutions that satisfy the criteria for 'greenness'. This excellent title shows how Capacity Management works not only within an IT environment but also why it is pivotal in meeting high profile business demands. Aligns with ISO/IEC 20000 and ITIL® ISO/IEC lists a set of required capacity management deliverables ITIL outlines what should be done in capacity management this book starts to describe how to do it Covers details of what capacity management is all about: what is capacity management why do it benefits and cost-benefit analysis how to do it data-flows and activities who does it roles and perspectives implementation, maintenance, improvement, tools Provides comprehensive templates and checklists: objectives, interfaces and data-flows, sub-practices and activities metrics, application sizing parameters, data for modelling deliverables, reports, CMMI levels, KPIs, risk matrix sample capacity plan |
gartner requirements management tools: Complex Systems Design & Management Omar Hammami, Daniel Krob, Jean-Luc Voirin, 2012-01-11 This book contains all refereed papers that were accepted to the second edition of the « Complex Systems Design & Management » (CSDM 2011) international conference that took place in Paris (France) from December 7 to December 9, 2011. (Website: http://www.csdm2011.csdm.fr/). These proceedings cover the most recent trends in the emerging field of complex systems sciences & practices from an industrial and academic perspective, including the main industrial domains (transport, defense & security, electronics, energy & environment, e-services), scientific & technical topics (systems fundamentals, systems architecture& engineering, systems metrics & quality, systemic tools) and system types (transportation systems, embedded systems, software & information systems, systems of systems, artificial ecosystems). The CSDM 2011 conference is organized under the guidance of the CESAMES non-profit organization (http://www.cesames.net/). |
gartner requirements management tools: Systems, Software and Services Process Improvement Murat Yilmaz, Jörg Niemann, Paul Clarke, Richard Messnarz, 2020-08-10 This volume constitutes the refereed proceedings of the 27th European Conference on Systems, Software and Services Process Improvement, EuroSPI conference, held in Düsseldorf, Germany, in September 2020*. The 50 full papers and 13 short papers presented were carefully reviewed and selected from 100 submissions. They are organized in topical sections on visionary papers, SPI manifesto and improvement strategies, SPI and emerging software and systems engineering paradigms, SPI and standards and safety and security norms, SPI and team performance & agile & innovation, SPI and agile, emerging software engineering paradigms, digitalisation of industry, infrastructure and e-mobility, good and bad practices in improvement, functional safety and cybersecurity, experiences with agile and lean, standards and assessment models, recent innovations, virtual reality. *The conference was partially held virtually due to the COVID-19 pandemic. |
gartner requirements management tools: Dynamic Business Process Management in the Knowledge Economy Marek Szelągowski, 2019-06-21 This book describes modern dynamic business process management (dynamic BPM), which is considerably different from traditional BPM from 20, 10, or even 5 years ago. It demonstrates why traditional BPM is not sufficient in the knowledge economy (KE), while also highlighting the opportunities provided by dynamic BPM – the form of management that practitioners and academics deal with on a daily basis. This involves mastering and implementing e.g. case management, process mining, and RPA, and integrating them with knowledge management. But more importantly, dynamic BPM makes full use of the dynamism of knowledge workers: the people who actually create innovative products and services tailored to the specific needs of clients. The book was primarily written for those managers who see advantageous opportunities amidst the ongoing changes. Accordingly, it focuses more on innovations emerging from practice than on theoretical, academic reflection. In addition to helping organizations operating in the KE to prepare for and implement process management, the book is intended as a source of inspiration for process management researchers and iBPMS system vendors. |
gartner requirements management tools: Computerworld , 1999-12-13 For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network. |
gartner requirements management tools: Key Account Management Joel Le Bon, Carl Herman, 2015-05-07 Now more than ever, companies are faced with a critical and challenging truth. Today’s customer is demanding more attention, superior service, and the expertise of a dedicated sales team. Suppliers must make dif cult choices to determine how to allocate limited resources, including which customers receive the highest level of service. Increasingly, supply side organizations are working to design and implement key account programs to meet or exceed these expectations. Key account management is a specific business strategy that involves complex sales processes, large-scale negotiations, and the alignment of multiple internal and external stakeholders. This multi-pronged process is anything but straightforward, and the business world is filled with examples of key account programs that have not achieved the expected results. This book addresses the strategic challenges facing top executives and sales leaders as they build strategies to better manage their key accounts. By leveraging up-to-date research, testimonials drawn from interviews with experienced practitioners, best practices of successful companies, along with straightforward practical guide- lines for executives and sales leaders, this book can serve as an instruction manual and toolbox for organizations working to achieve success through their key account strategies to meet the demand of their key customers. |
gartner requirements management tools: Network World , 2003-11-24 For more than 20 years, Network World has been the premier provider of information, intelligence and insight for network and IT executives responsible for the digital nervous systems of large organizations. Readers are responsible for designing, implementing and managing the voice, data and video systems their companies use to support everything from business critical applications to employee collaboration and electronic commerce. |
gartner requirements management tools: Modern Data Strategy Mike Fleckenstein, Lorraine Fellows, 2018-02-12 This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others. It defines data strategy, and covers chapters that illustrate how to align a data strategy with the business strategy, a discussion on valuing data as an asset, the evolution of data management, and who should oversee a data strategy. This provides the user with a good understanding of what a data strategy is and its limits. Critical to a data strategy is the incorporation of one or more data management domains. Chapters on key data management domains—data governance, data architecture, master data management and analytics, offer the user a practical approach to data management execution within a data strategy. The intent is to enable the user to identify how execution on one or more data management domains can help solve business issues. This book is intended for business users who work with data, who need to manage one or more aspects of the organization’s data, and who want to foster an integrated approach for how enterprise data is managed. This book is also an excellent reference for students studying computer science and business management or simply for someone who has been tasked with starting or improving existing data management. |
gartner requirements management tools: T Bytes Agile & AI Operations IT Shades, This document brings together a set of latest data points and publicly available information relevant for Agile & AI Operations Industry. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely. |
gartner requirements management tools: Business Enterprise, Process, and Technology Management: Models and Applications Shankararaman, Venky, 2012-03-31 This book generates a comprehensive overview of the recent advances in concepts, technologies, and applications that enable advanced business process management in various enterprises--Provided by publisher. |
gartner requirements management tools: Information Technology Control and Audit Sandra Senft, Frederick Gallegos, Aleksandra Davis, 2016-04-19 The new edition of a bestseller, Information Technology Control and Audit, Fourth Edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. Aligned to and supporting the Control Objectives for Information and Related Technology (COBIT), it examines emerging trend |
gartner requirements management tools: Organizational Applications of Business Intelligence Management: Emerging Trends Herschel, Richard T., 2012-03-31 This book offers a deep look into the latest research, tools, implementations, frameworks, architectures, and case studies within the field of Business Intelligence Management--Provided by publisher. |
gartner requirements management tools: Digital Development of the European Union David Ramiro Troitiño, Tanel Kerikmäe, Ondrej Hamuľák, 2023-06-20 This edited volume analyses the digital development of the European Union, presenting an interdisciplinary perspective from the disciplines of political science, international relations, economics, and law. The contributions address the main areas where the EU can, and should act, for creating an efficient and protective digital space in Europe. The book highlights the responsibility of the European Union to work on the future of its digital development, looking for prosperity and defending the European conception of society. It explains how European values must be incorporated into the digital revolution and shows how the digital revolution of the EU will defend the Europeans from new threats. The book's comprehensive approach allows the reader to understand this process without in-depth knowledge of the specific discipline. Therefore, it is a must-read for everybody interested in a better understanding of digital development, European Union policy, and the future of Europe. |
gartner requirements management tools: Project Management Theory and Practice Gary L. Richardson, 2010-01-20 Although there are numerous project management resources available, most are either too academic, focus too heavily on IT, or provide quick-fix advice without the theory required to understand why the solutions work. Following and expanding on PMI’s Project Management Body of Knowledge (PMBOK®), Project Management Theory and Practice provides students with a complete overview of project management theory—in language they can easily understand. This classroom-tested textbook translates the abstract model vocabulary and processes from A Guide to the Project Management Body of Knowledge (PMBOK® Guide), Fourth Edition into accessible discussions complete with contemporary views and projections for the future. The text integrates the organizational environment that surrounds a project to supply students with the well-rounded knowledge of theories, organizational issues, and human behavior needed to manage real-world projects effectively. Providing a clear picture of the state of the art in project management, it details numerous project-related frameworks, including: Enterprise project management Project portfolio management Work breakdown structures Earned value management Professional responsibility Project team productivity The text reaches beyond traditional core project management topics to include discussions on enterprise maturity, virtual and outsourced organizations, project management offices, operational governance, and multi-project management. Filled with numerous end-of-chapter questions, scheduling and budgeting problems, scoping projects, and sample worksheets that illustrate various analytical tools and management decisions, this is the ideal text for classroom use and essential reading for anyone seeking project management certification. |
gartner requirements management tools: CSO , 2007-10 The business to business trade publication for information and physical Security professionals. |
gartner requirements management tools: Functional Automation and Digital Transformation Dr. Vipin K Suri, 2022-04-15 Functional Automation and Digital Transformation By: Dr. Vipin K Suri Eliminating the need for manual intervention in complex or repetitive business processes can have a positive impact on operations. By automating certain decisions, organizations can not only accelerate process workflows, but also improve the accuracy and consistency of the results. Digital process automation is fundamental to delivering better customer experiences that fully meet user expectations. Digitization of back-office services, primarily handled by business support functions, is underway. Shared Services organizations manage and deliver business and administrative support services common to business units. These support services are primarily focused on functions such as Finance & Accounting, Human Resources, Purchasing & Supply Chain, and IT. By incorporating digital automation and transformation technologies, such as Business Process Management (BPM), Enterprise Resource Planning (ERP), Robotic Process Automation (RPA), Intelligent Automation (IA) and Blockchain into the operations, organizations can streamline processes and increase operational efficiencies. |
gartner requirements management tools: SAP Security Configuration and Deployment Joey Hirao, 2008-11-18 Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise.This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations.Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. - The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance - This book contains information about SAP security that is not available anywhere else to help the reader avoid the gotchas that may leave them vulnerable during times of upgrade or other system changes - Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP |
gartner requirements management tools: InfoWorld , 1996-04-08 InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects. |
gartner requirements management tools: Common Warehouse Metamodel John Poole, Dan Chang, Douglas Tolbert, David Mellor, 2002-04-22 Das Common-Warehouse-Metamodell (CWM) ist eine XML-basierte Technologie zum Datenaustausch aus Quellen jeder Art, unabhängig von der Plattform des Anbieters. Geschrieben von den Autoren der CWM-Spezifikation, bietet Ihnen dieses Buch eine gut verständliche Einführung in das Thema. Erklärt wird, wie Geschäftsbereiche mit Hilfe von CWM effizienter arbeiten können und mit welchen praktischen Schritten man CWM plant, implementiert und einführt. Sie erhalten einen Überblick über die Architektur von CWM und sehen, wie die einzelnen Komponenten in existierende Datenbanken und Data-Warehouse-Architekturen integriert werden können. Mit zugehöriger Website. |
gartner requirements management tools: Disruptive Technology: Concepts, Methodologies, Tools, and Applications Management Association, Information Resources, 2019-07-05 The proliferation of entrepreneurship, technological and business innovations, emerging social trends and lifestyles, employment patterns, and other developments in the global context involve creative destruction that transcends geographic and political boundaries and economic sectors and industries. This creates a need for an interdisciplinary exploration of disruptive technologies, their impacts, and their implications for various stakeholders widely ranging from government agencies to major corporations to consumer groups and individuals. Disruptive Technology: Concepts, Methodologies, Tools, and Applications is a vital reference source that examines innovation, imitation, and creative destruction as critical factors and agents of socio-economic growth and progress in the context of emerging challenges and opportunities for business development and strategic advantage. Highlighting a range of topics such as IT innovation, business strategy, and sustainability, this multi-volume book is ideally designed for entrepreneurs, business executives, business professionals, academicians, and researchers interested in strategic decision making using innovations and competitiveness. |
gartner requirements management tools: Agile Approaches for Successfully Managing and Executing Projects in the Fourth Industrial Revolution Bolat, Hür Bersam, Temur, Gül Tekin, 2019-03-15 Communication between man and machine is vital to completing projects in the current day and age. Without this constant connectiveness as we enter an era of big data, project completion will result in utter failure. Agile Approaches for Successfully Managing and Executing Projects in the Fourth Industrial Revolution addresses changes wrought by Industry 4.0 and its effects on project management as well as adaptations and adjustments that will need to be made within project life cycles and project risk management. Highlighting such topics as agile planning, cloud projects, and organization structure, it is designed for project managers, executive management, students, and academicians. |
gartner requirements management tools: CIO , 2002-09-01 |
gartner requirements management tools: InfoWorld , 1999-12-13 InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects. |
gartner requirements management tools: New Results in Dependability and Computer Systems Wojciech Zamojski, Jacek Mazurkiewicz, Jarosław Sugier, Tomasz Walkowiak, Janusz Kacprzyk, 2013-05-30 DepCoS – RELCOMEX is an annual series of conferences organized by the Institute of Computer Engineering, Control and Robotics (CECR), Wrocław University of Technology, since 2006. Its idea came from the heritage of the other two cycles of events: RELCOMEX Conferences (1977 – 89) and Microcomputer Schools (1985 – 95) which were then organized by the Institute of Engineering Cybernetics, the previous name of CECR. In contrast to those preceding meetings focused on the conventional reliability analysis, the DepCoS mission is to develop a more comprehensive approach to computer system performability, which is now commonly called dependability. Contemporary technical systems are integrated unities of technical, information, organization, software and human resources. Diversity of the processes being realized in the system, their concurrency and their reliance on in-system intelligence significantly impedes construction of strict mathematical models and calls for application of intelligent and soft computing methods. The submissions included in this volume illustrate variety of problems that need to be explored in the dependability analysis: methodologies and practical tools for modeling, design and simulation of the systems, security and confidentiality in information processing, specific issues of heterogeneous, today often wireless, computer networks, or management of transportation networks. |
gartner requirements management tools: Information Technology Control and Audit, Third Edition Sandra Senft, Frederick Gallegos, 2010-12-12 The headline-grabbing financial scandals of recent years have led to a great urgency regarding organizational governance and security. Information technology is the engine that runs modern organizations, and as such, it must be well-managed and controlled. Organizations and individuals are dependent on network environment technologies, increasing the importance of security and privacy. The field has answered this sense of urgency with advances that have improved the ability to both control the technology and audit the information that is the lifeblood of modern business. Reflects the Latest Technological Advances Updated and revised, this third edition of Information Technology Control and Audit continues to present a comprehensive overview for IT professionals and auditors. Aligned to the CobiT control objectives, it provides a fundamental understanding of IT governance, controls, auditing applications, systems development, and operations. Demonstrating why controls and audits are critical, and defining advances in technology designed to support them, this volume meets the increasing need for audit and control professionals to understand information technology and the controls required to manage this key resource. A Powerful Primer for the CISA and CGEIT Exams Supporting and analyzing the CobiT model, this text prepares IT professionals for the CISA and CGEIT exams. With summary sections, exercises, review questions, and references for further readings, it promotes the mastery of the concepts and practical implementation of controls needed to effectively manage information technology resources. New in the Third Edition: Reorganized and expanded to align to the CobiT objectives Supports study for both the CISA and CGEIT exams Includes chapters on IT financial and sourcing management Adds a section on Delivery and Support control objectives Includes additional content on audit and control of outsourcing, change management, risk management, and compliance |
gartner requirements management tools: Enterprise SOA Dan Woods, Thomas Mattern, 2006-04-28 Information Technology professionals can use this book to move beyond the excitement of web services and service oriented architecture (SOA) and begin the process of finding actionable ideas to innovate and create business value. In Enterprise SOA: Designing IT for Business Innovation, SAP's blueprint for putting SOA to work is analyzed from top to bottom. In addition to design, development, and architecture, vital contextual issues such as governance, security, change management, and culture are also explored. This comprehensive perspective reduces risk as IT departments implement ESA, a sound, flexible architecture for adapting business processes in response to changing market conditions. This book answers the following questions: What forces created the need for Enterprise Services Architecture? How does ESA enable business process innovation? How is model-driven development used at all levels of design, configuration, and deployment? How do all the layers of technology that support ESA work together? How will composite applications extend business process automation? How does ESA create new models for IT governance? How can companies manage disruptive change? How can enterprise services be discovered and designed? How will the process of adapting applications be simplified? Based on extensive research with experts from the German software company SAP, this definitive book is ideal for architects, developers, and other IT professionals who want to understand the technology and business relevance of ESA in a detailed way--especially those who want to move on the technology now, rather than in the next year or two. |
gartner requirements management tools: High-Performance IT Services Terry Critchley, 2016-10-04 This book on performance fundamentals covers UNIX, OpenVMS, Linux, Windows, and MVS. Most of the theory and systems design principles can be applied to other operating systems, as can some of the benchmarks. The book equips professionals with the ability to assess performance characteristics in unfamiliar environments. It is suitable for practitioners, especially those whose responsibilities include performance management, tuning, and capacity planning. IT managers with a technical outlook also benefit from the book as well as consultants and students in the world of systems for the first time in a professional capacity. |
gartner requirements management tools: Beginning Application Lifecycle Management Joachim Rossberg, 2014-09-22 Beginning Application Lifecycle Management is a guide to an area of rapidly growing interest within the development community: managing the entire cycle of building software. ALM is an area that spans everything from requirements specifications to retirement of an IT-system or application. Because its techniques allow you to deal with the process of developing applications across many areas of responsibility and across many different disciplines, the benefits and effects of ALM techniques used on your project can be wide-ranging and pronounced. In this book, author Joachim Rossberg will show you what ALM is and why it matters. He will also show you how you can assess your current situation and how you can use this assessment to create the road ahead for improving or implementing your own ALM process across all of your team's development efforts. Beginning Application Lifecycle Management can be implemented on any platform. This book will use Microsoft Team Foundation Server as a foundation in many examples, but the key elements are platform independent and you'll find the book written in a platform agnostic way. In this book, you'll learn: What application lifecycle management is and why it matters. The steps necessary for implementing an ALM process. Tips and techniques you can use to gain control of your development efforts. How to implement an agile framework into your ALM process How to achieve traceability and visibility in your projects How to automate your ALM process |
gartner requirements management tools: The GartnerGroup Glossary of Information Technology Acronyms and Terms , 1999 |
gartner requirements management tools: Computerworld , 2005-09-05 For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network. |
gartner requirements management tools: Computerworld , 2004-01-26 For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network. |
gartner requirements management tools: Management Fashions Krzysztof Klincewicz, 2017-07-28 Using the theory of management fashions proposed in the 1990s by Eric Abrahamson, Krzysztof Klincewicz analyzes the changing popularity of management concepts accompanied by solutions. Among these are management bestsellers, consulting services, software systems, methodologies, and approaches to organizational change, training courses, professional certifications and even new corporate positions.The book presents the phenomena of management fashions as being the key driver for the development of the management knowledge industry, consisting of consulting companies, computer firms, publishing houses, professional institutes, and other organizations involved in the launching and the promotion of new management techniques. The author supplements the existing body of knowledge by focusing on the supply-side of management fashions, particularly the strategies and marketing techniques of solution vendors, and proposes a model of relations between management ideas and tangible solutions, explaining how bestselling ideas are turned into objects and institutions.The empirical research described in this volume involves multiple methods, including discourse volume analysis and qualitative historical techniques. Included also is a comprehensive overview of the recent relevant developments in sociology, marketing, and organization sciences, in which the author draws on the heritage of praxiology by taking a meta-level perspective on the propositions of management science. |
gartner requirements management tools: MuleSoft Platform Architect's Guide Jitendra Bafna, Jim Andrews, 2024-07-31 Unlock the power of Anypoint Platform by leveraging MuleSoft methodology, Accelerators, runtime engines, and management tools to deliver secure, high-value APIs and integration solutions across the enterprise Key Features Discover Anypoint Platform's capabilities for creating high-availability, high-performance APIs Learn about AnyPoint architecture and platform attributes for Mule app deployment Explore best practices, tips, and tricks that will help you tackle challenging exam topics and achieve MuleSoft certification Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionWe’re living in the era of digital transformation, where organizations rely on APIs to enable innovation within the business and IT teams are asked to continue doing more with less. Written by Jim Andrews, a Mulesoft Evangelist, and Jitendra Bafna, a Senior Solution Architect with expertise in setting up Mulesoft, this book will help you deliver a robust, secure, and flexible enterprise API platform, supporting any required business outcome. You’ll start by exploring Anypoint Platform’s architecture and its capabilities for modern integration before learning how to align business outcomes with functional requirements and how non-functional requirements shape the architecture. You'll also find out how to leverage Catalyst and Accelerators for efficient development. You'll get to grips with hassle-free API deployment and hosting in CloudHub 1.0/2.0, Runtime Fabric Manager, and hybrid environments and familiarize yourself with advanced operating and monitoring techniques with API Manager and Anypoint Monitoring. The final chapters will equip you with best practices for tackling complex topics and preparing for the MuleSoft Certified Platform Architect exam. By the end of this book, you’ll understand Anypoint Platform’s capabilities and be able to architect solutions that deliver the desired business outcomes.What you will learn Understand Anypoint Platform's integration architecture with core components Discover how to architect a solution using Catalyst principles Explore best practices to design an application network Align microservices, application networks, and event architectures with Anypoint Platform's capabilities Identify non-functional requirements that shape the architecture Perform hassle-free application deployment to CloudHub using the Mule Maven plugin, CLI, and Platform API Understand how to manage the API life cycle for MuleSoft and non-MuleSoft APIs Who this book is for This book is for technical and infrastructure architects with knowledge of integration and APIs who are looking to implement these solutions with MuleSoft’s Anypoint Platform. Architects enrolled in the platform architect course who want to understand the platform's capabilities will also find this book helpful. The book is also a great resource for MuleSoft senior developers transitioning to platform architect roles and planning to take the MuleSoft Platform Architect exam. A solid understanding of MuleSoft API development, ideally 3 to 5 years of experience with the platform, is necessary. |
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …