Please enter a valid search term.
Currently Displaying Results
1169476-1169500 of 1546030
Which compliance obligations data should be retained? Is the compliance obligations organization completing tasks effectively and efficiently? Does your organization have a policy in place that includes a commitment to fulfil compliance obligations? How are the compliance obligations's objectives aligned …
What is driving application security programs for your organization? What challenges do you face in implementing an application security program? What are the top challenges that you face with your application security program? What should be included in your application …
Who needs to know about Network Security Policy? Is there any other Network Security Policy solution? Is supporting Network Security Policy documentation required? What is the best design framework for Network Security Policy organization now that, in a post industrial-age …
What does verifying compliance entail? What drives O&M; cost? What sort of initial information to gather? What are the best opportunities for value improvement? Is the WiFi networks risk managed? Defining, designing, creating, and implementing a process to solve a …
How do you manage changes in Audit Data requirements? Are you missing Audit Data opportunities? What system do you use for gathering Audit Data information? What are the Audit Data use cases? How do you audit database activity 24x7? Defining, …
How does your organization evaluate strategic BYOD Security success? How much contingency will be available in the budget? In the past year, what have you done (or could you have done) to increase the accurate perception of your company/brand as …
Do you, as a leader, bounce back quickly from setbacks? How can the value of Solution Center be defined? What Solution Center skills are most important? Is there a strict change management process? What counts that you are not counting? …
What are the IT Service Portfolio resources needed? Can management personnel recognize the monetary benefit of IT Service Portfolio? Act/Adjust: What Do you Need to Do Differently? How can you incorporate support to ensure safe and effective use of IT …
Can you identify any significant risks or exposures to project ROI third- parties (vendors, service providers, alliance partners etc) that concern you? How do you recognize an objection? How risky is your organization? Where can you gather more information? What …
Can you innovate and adopt new business models? How do the support costs compare with other solutions? Does the product support cost management? How do you manage this? How much is the vendor support cost? Defining, designing, creating, and implementing …
What policies and processes are needed for a centralized payroll strategy? Do you review existing policies and processes regularly? What is your process of designing, documenting and testing your organizations internal controls over financial reporting and other corporate governance policies …
How will the Code Management data be captured? What unique value proposition (UVP) do you offer? What Code Management standards are applicable? What do you measure to verify effectiveness gains? Will the team be available to assist members in planning …
Do you need different information or graphics? How is performance measured? What is your plan to assess your security risks? Record-keeping requirements flow from the records needed as inputs, outputs, controls and for transformation of a Fileless Evade Security process, …
The political context: who holds power? What are the uncertainties surrounding estimates of impact? What are the success criteria that will indicate that Recording Data objectives have been met and the benefits delivered? Do the benefits outweigh the costs? Are …
How do you go about securing defensible security program? Is the defensible security program organization completing tasks effectively and efficiently? Do quality systems drive continuous improvement? Who qualifies to gain access to data? What area needs the greatest improvement? This …
How is video content management project cost planned, managed, monitored? How do you deal with video content management risk? Will team members regularly document their video content management work? Do you cover the five essential competencies: Communication, Collaboration,Innovation, Adaptability, and …
If you find that you havent accomplished one of the goals for one of the steps of the driving digital business strategy, what will you do to fix it? How do you engage the workforce, in addition to satisfying them? …
To what extent does each concerned units management team recognize licensing costs as an effective investment? What licensing costs standards are applicable? Do you monitor the effectiveness of your licensing costs activities? What licensing costs requirements should be gathered? Is …
Emereo Publishing
What are your best practices for minimizing SQL Load Balancing project risk, while demonstrating incremental value and quick wins throughout the SQL Load Balancing project lifecycle? Who is responsible for SQL Load Balancing? Think about the functions involved in your …
Who is gathering information? Do you have any cost Analytics Databases Data Management limitation requirements? Are supply costs steady or fluctuating? What data do you need to collect? How do you manage Analytics Databases Data Management risk? This powerful Analytics …
What of the implications for quantitative risk management and of stress testing? Which tools are used for stress testing of a Web server? What is your biggest challenge to stress testing? How do you perform Stress Testing? What is the …
University of Toronto Press, Scholarly Publishing Division
The Second World War wreaked unprecedented devastation throughout Europe, necessitating monumental reconstruction efforts that burdened not only governments, but the lives of ordinary citizens. War, Massacre, and Recovery in Central Italy, 1943-1948 examines this transitional period in the province of …
View book details for Pride in Modesty
Modernist Architecture and the Vernacular Tradition in Italy
University of Toronto Press, Scholarly Publishing Division
Following Italy's unification in 1861, architects, artists, politicians, and literati engaged in volatile debates over the pursuit of national and regional identity. Growing industrialization and urbanization across the country contrasted with the rediscovery of traditionally built forms and objects created …
View book details for The Poetry of Immanence
Sacrament in Donne and Herbert
University of Toronto Press, Scholarly Publishing Division
In this extensive study of two of the most celebrated seventeenth-century religious poets, Robert Whalen examines the role of sacrament in the formation of early modern religious subjectivity. For John Donne and George Herbert, sacramental topoi became powerful conceptual tools …
University of Toronto Press, Scholarly Publishing Division
Robert Grosseteste (c.1170-1253) was an English statesman, philosopher, theologian, and bishop of Lincoln, and also one of the most controversial figures in his country's episcopate. His long life coincided with the central period of institutional, intellectual, and religious consolidation in …
Currently Displaying Results
1169476-1169500 of 1546030