Hotspots: Exploring The Opportunities
[ Source: Verax Systems ]
May 2010- Verax Systems details the possibilities of hotspots in this white paper. The company discusses how the proper management of hotspots can be a source of additional revenue, market research, or a medium to display information such as advertisements.
Developing Multilingual J2EE Web Applications Using Oracle JDeveloper 10g
[ Source: HP ]
January 2008- The Java 2 Platform Enterprise Edition, or J2EE as its commonly known, consists of a set of coordinated specifications and practices providing solutions for developing, testing, localizing, deploying, and managing multi-tier server-centric applications. This paper from Oracle summarizes the process of creating multilingual J2EE Web Applications with Oracle JDeveloper 10g, focusing on Oracles ADF application development framework. This paper published by HP examines Java Server Pages (JSP) and Java Standard Tag Library (...
Service-Oriented Architecture (SOA) Vs. Component Based Architecture
[ Source: Vienna University of Technology ]
January 2008- An exact differentiation between Service oriented architecture and component based architecture is hard to make, because opinions on what ""SOA"" exactly is and how it will develop differ. If SOA is seen as a new type of architecture that defines the how-to of assigning interfaces in a servicing way so that these services can be used in a context free way, it doesnt differ significantly from existing component based frameworks like Enterprise JavaBeans.
Remote Files Sharing by Windows Or Samba Over SSH tunnel
[ Source: NuSphere , Inc. ]
June 2007- The problem of providing remote access to files is nothing new, but the implementation of the solution often also determines reliability, safety and productivity. If you are not comfortable with the security of your data (files content, passwords etc.) sent by Windows SMB or Unix Samba over the networks, the encrypted SSH (the Secure Shell) could be your panacea. Another reason to use SSH is its widespread implementation and reliability. Finally, there are situations when ...
Driving Organizational Change with Social and Collaborative Technologies
[ Source: Interop ]
May 2011- Organizations are investing in Enterprise 2.0 as a means to improve employee engagement, collaboration, and knowledge sharing. While social tools can play a critical role, driving organizational change requires IT strategists to look beyond technology deployment. This session will help IT architecture and infrastructure personnel understand E2.0 adoption issues, the role of change management, and alignment of social tools with strategic business initiatives.
How Does Ping Really Work?
[ Source: Global Knowledge ]
October 2006- Ping is a basic Internet program that most of us use daily, but did you ever stop to wonder how it really worked? I don't know about you, but it bugs me when I do not know how something really works. The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level. If you do not happen to be a programmer, ...
SAS Information Map Studio and SAS Web Report Studio - A Tutorial
[ Source: SAS Institute ]
January 2008- This white paper from SAS Institute delivers examples of functionality from within SAS Information Map Studio and SAS Web Report Studio in a manner that is easy to follow and replicate. This tool serves as single place that business rules are applied and made available to business users throughout the enterprise. SAS Web Report Studio is a web based ad hoc reporting application that utilizes the business logic contained within Information Maps that are created ...
Oracle Forms 10g - Forms Look and Feel
[ Source: Oracle ]
January 2008- Oracle Forms application have traditionally behaved as, and looked like, desktop applications. When Oracle Forms applications were Web deployed, they still gave the user the feel of the desktop. This has been one of the strong plus points for businesses looking to evolve their applications seamlessly to the Web. This paper from Oracle discusses the use a number of look and feel tools, namely a PL/SQL library (laf.pll) and a set of Java ...
SAS Information Delivery Portal - A Tutorial
[ Source: SAS Institute ]
January 2008- The aim of this paper is to give examples of functionality from within SAS Information Delivery Portal in a manner that is easy to follow and replicate. Access data from throughout ones organization via a single set of web interfaces. With the ability to author reports, view reports, execute stored processes, apply report level or data level security, deploy custom portlets utilizing the WIK API, and personalize user experience, the SAS Information Delivery Portal ...
Effective Social Media Strategy Wields Clout in Telecom Industry
[ Source: Calysto Communications ]
May 2009- Social media has become an integral part of a company's marketing and public relations strategy. This whitepaper offers information about how to implement an effective social media PR and marketing strategy.
Yammer Secures Facebook-, Twitter-Style Communication In Enterprises
[ Source: TechWeb ]
December 2010- Yammer Vice President of Marketing Steve Apfelberg gives TechWeb's David Berlind a demonstration of the most recent version of Yammer at the Enterprise 2.0 Conference (2010) in Santa Clara, Calif. Yammer is an enterprise social network in the style of Facebook and Twitter.
How To Scale Apps The Facebook Way
[ Source: TechWeb ]
October 2009- Scaling applications is always a challenge. Now magnify that across a distributed network (the Internet) and add billions of data queries -- that's the challenge that Facebook has, and they discuss how they are dealing with it.
Making Sense Of Search Positions
[ Source: Ambergreen ]
June 2009- What does monitoring your Google organic search positions mean to you? Grant Whiteside, technical director of Ambergreen, looks at the new developments that mean you can now work out exactly what the value of each organic search query was worth to you.
Curtailing Online Distribution of Counterfeit and Gray Market Goods
[ Source: MarkMonitor ]
September 2007- Counterfeiting and gray market activity are major problems for brand owners. They pose serious financial and non-financial consequences for corporations, distribution partners and customers. Although these problems have existed for centuries, they are only exacerbated by the global reach, low cost and anonymity of the Internet. This renders the online channel a vast unknown element, over which brand owners may feel they have no visibility or control. To effectively manage this “vast unknown,” brand owners ...
Mindtouch: A Wiki-cum-CMS-cum-Mashup Platform, On Steroids
[ Source: TechWeb ]
April 2009- Although Mindtouch CEO Aaron Fulkerson does a good job listing the major points that his company's namesake product (available as a service too) touches on in this reviewcam, it's also one of those products that's difficult to describe.
Code-Signing Certificates: What are they? How are they used?
[ Source: Verisign ]
January 2014- Code-signing certificates can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks. Learn about the many ways in which code-signing certificates are being used.
Capture Market Share in a Down Economy: Invest in Your Online Customers
[ Source: Tealeaf ]
Find out what 350 top eBusiness leaders are doing now to make their online channel not just survive, but thrive in this trying economy
• Insights on eBusiness executive priorities and strategies for the online channel in 2009 and beyond
• eBusiness knowledge gaps — surprising misperceptions and blind spots that many executives have of their online customers and strategies for bridging these gaps
• Critical steps that eBusinesses are taking today to ...
Communications Challenges And Web Collaboration In Organizations
[ Source: Wipro Technologies ]
March 2009- Recent mergers, acquisitions, and alliances in organizations drive a stronger roadmap for a stable and sophisticated enterprisewide Web-based collaboration, in the face of various factors like short supply, demand for reduction in duplication, and inefficiency.
Google Insights: A Social Baraometer For The Digital Age
[ Source: Ambergreen ]
March 2009- Ambergreen search guru Grant Whiteside looks at Google Insights for Search tool and how it can give you a pictorial breakdown of the social barometer.
IronPort 2008 Internet Malware Trends Report
[ Source: IronPort Systems ]
November 2008- In 2007, Storm burst onto the scene and rapidly spread. A new form of malware that propagated using a combination of email and websites, it proved extraordinarily sophisticated. Storm and newer malware botnets that build on Storm’s strengths continue to affect and threaten Internet communication. To help explain the spread of Storm and current and future threats posed by similar malware, this report offers an examination of Storm and its history.
Web App Acceleration: Practical Implementations
[ Source: F5 ]
July 2014- Web application acceleration implementations use combinations of three key acceleration principles: 1. Send data as efficiently as possible; 2. Send data as infrequently as possible; and 3. Send as little data as possible. Different combinations can produce very different results and, more importantly, they can require dramatically different investments in time and resources. To decide on the best practical implementation of acceleration technologies for a particular organization, it is important to explore how each implementation employs the key ...
Creating the Best-of-Breed DDI Solution in a Microsoft Environment
[ Source: Infoblox ]
May 2014- Microsoft Active Directory (AD) is great for managing Microsoft tools. But in the age of virtualization, cloud, and mobility, you need best-in-class DNS and DHCP management utilities for core network services. That's why 1000's of network teams have added Infoblox DNS, DHCP, and IP address management (DDI) to their Microsoft environment. By doing so, they enhance the availability, manageability, security, and efficiency of their networks. Read this white paper to learn how adding Infoblox DDI ...
The Cloud Supply Chain Data Network
[ Source: GT Nexus ]
March 2014- Historically there's been great difficulty -- and importance -- in obtaining high quality data to fuel global trade management systems. The paper also explores the advent of the cloud data network and some of the powerful advantages of this approach, including those provided by network effects - the exponential power of a collaborative network of partners to solve supply chain problems.
Reengineering the Foundation for B2B Information Exchange in the Supply Chain
[ Source: GT Nexus ]
March 2014- Cloud platforms represent a truly radical shift in how companies exchange information with one another. Examine the shortcomings of yesterday's technology and how new platforms based around the economics of cloud are enabling companies to become agile and hyper-efficient networked organizations.
Without the extra-enterprise nervous systems to see and control the supply chain, companies are at a strategic disadvantage in their markets, and this paper explains why.
Cloud Information Technology: A Model for the Networked Company
[ Source: GT Nexus ]
March 2014- Cloud technology is rapidly changing the way B2B interactions are carried out. It provides a benefit that no amount of investment in traditional software can obtain - the exponential effect a robust network of companies with a common goal has on the quality of the technology and its users. As companies move to cloud-based software, their IT teams must correspondingly adapt the department's structure.
This new model involves IT taking on more ...
The Rising Threat Of Corporate Cybercrime: Cybercriminal Motives and Methods
[ Source: Trusteer ]
October 2013- Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to corporate information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the corporate network than a direct network attack. Our latest white paper discusses the cybercriminal motives and methods, and presents the need for Enterprises to recognize this growing danger and implement technologies that effectively prevent malware, the root ...
Empowering Optimization Through Tag Management Solutions
[ Source: Ensighten ]
June 2013- If you haven't explored the benefits of website tag and data management, now is the time to discover it.
With the rapid adoption of website optimization and personalization solutions in the last few years, digital marketers have faced serious marketing and technical execution challenges. Efficient workflows, execution, and overall test management continue to be a struggle, and according to Web Analytics Demystified, the biggest hurdle is instrumenting the website with the testing vendor's ...
Boosting Enterprise Agility with Tag and Data Management
[ Source: Ensighten ]
June 2013- Marketing agility is critical for enterprises that interact with their prospects and customers via a wide array of channels. Enterprises that deliver static, un-optimized experiences are losing consumers and market share to more nimble competitors that have mastered the art and science of consumer interaction in the digital age.
Marketing agility relies on three pillars that enterprises must have in place:
1. Rapidly execute any digital marketing initiative through any channel or ...
Advanced Use Case: Sony Electronics
[ Source: Ensighten ]
June 2013- Target site users with a personalized experience
Creating more personalized web experiences is vital to growing revenue, especially for large enterprises.
This means the number of marketing technologies to vet, deploy and manipulate keeps growing. The volume of tags and websites to manage is exploding. And the pressure to optimize everything is relentless.
In this use case, see how Sony Electronics uses Ensighten to improve website performance, reduce customer ...
High Bandwidth Internet Access: Opening Doors to New Capabilities
[ Source: Cornerstone Advanced Communications ]
March 2013- High bandwidth, and the content that rides over it, enables rapid acceleration of business development and the type of collaboration that drives innovation. Companies are now choosing - from options such as fiber, cable access transport, copper, and wireless - the greatest bandwidth available in their markets. Gain perspective on trends in American and global markets that are generating the need for big bandwidth as companies rely increasingly on business and IT tools such as ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services