
Once you accept that everything that can go wrong will do so at the worst possible time, there are things that can be done today to help rein in the trials of the future.
More >As these emerging technologies continue to race ahead, there is an unprecedented opportunity to harvest those data streams and generate incredible.... More >
Can we interact with data through virtual.... More >
Instead of fearing salary negotiation, here are five rules every professional should follow when asking for a.... More >
Project Scope Management
This excerpt from chapter 10 focuses on creating a requirements management plan and requirements traceability matrix.
Risk Management for Replication Devices
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices.
Microsoft Office 365 Cheat Sheet
This Microsoft Office 365 Cheat Sheet covers basic setup and navigating the web-based service, collaborating on projects, creating and editing documents and using OneDrive.
Building the Agile Database
This excerpt explains the importance of taking a business-focused, stakeholder-oriented view of application development, summarizes the economies of application development, and explains the importance of data to the enterprise.
Vetting the Security of Mobile Applications
The purpose of this document is to help organizations understand the process for vetting the security of mobile applications, plan for the implementation of an app vetting process, develop app security requirements, and understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities.