Service Cloud: Deliver Next Generation of Customer Service
Realize the value and operating challenges of online support communities. Chatter Communities for Service solves nearly all of the traditional problems of online communities. Use ......
BPM for Dummies
[ Source: IBM ]
August 2012-
Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012-
Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Sponsored by:<...
Avoiding the 8 Common Mistakes of Windows 7 Migration
[ Source: Dell/Microsoft ]
September 2011-
The recession put important things on hold for many organizations, like upgrading to new client systems. Now organizations such as yours are ready to upgrade and gain from better performance and efficiency by purchasing new laptops and notebooks with Windows 7 factory-installed.
Before you move dozens - or hundreds - of important business applications into a new environment, find out how other organizations tackled this challenge.
Download "Avoiding the 8 common mistakes of ...
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011-
In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011-
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Creating a Timeline for Deploying Windows 7 and Eliminating Windows XP
[ Source: Dell/Microsoft ]
February 2012-
Windows XP support ends April 8, 2014. Therefore, organizations must decide when to begin their migration to Windows 7, set a target date to have Windows XP out and define the scope of the project.
This research paper reviews Gartner's key findings and recommendations for deploying Windows 7.
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011-
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011-
Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011-
Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
IBM Rational To MyEclipse Blue Edition Migration
[ Source: Genuitec, LLC ]
September 2009-
The goal of this white paper is to explore and resolve common concerns and issues surrounding a migration of your development environment from IBM’s Rational Application Developer (RAD) to MyEclipse Blue Edition from Genuitec. Why might a company choose to migrate their development tools? If the migration is decided upon, how would this be done easily and effectively? This paper will answer these common types of questions, as well as explore any intangibles that ...
Agile Architecture
[ Source: Impetus Technologies, Inc. ]
November 2008-
Traditionally, an attempt is made to make the right architectural decisions early, due to the significant anticipated cost associated with making incorrect decisions. But this contradicts with Agile practices, which encourages welcoming change. Conceptually, the goal of Agile architecture should be to minimize the architectural change by crafting software so that it can easily adapt to change. In practice, developing Agile architecture is far more difficult.
The architectural goals change dramatically during the development of ...
Launch Smartphone Applications from Visual Studio
[ Source: TechWeb ]
April 2009-
By default, Windows Mobile Standard (Smartphone) applications launched from Visual Studio are not accessible on the device/emulator once they are minimized. In this video, Jim Wilson demonstrates two simple techniques to solve the problem.
Test Automation: Delivering Business Value
[ Source: AppLabs ]
October 2008-
As organizations look to reduce costs across a wide range of operational disciplines, IT will become under the radar more and more. The impact of project slippage, poor quality delivery, and inadequate solutions will not be tolerated. This may prove a pain-point for many organizations who have traditionally failed in these critical areas.
Testing, like all project disciplines, has areas that can be quickly improved within an organization. One of the key areas where cost-savings ...
Five Things You Should Know About 3D CAD Software
[ Source: PTC ]
November 2008-
You may be spending most of your time making design changes
instead of creating new designs. But with the right 3D CAD
software, you can solve this problem – and quite a few others.
If you’re a design engineer working in a “typical” manufacturing company, you may be spending
60% to 80 % of your time updating and optimizing old designs, or making changes for ECOs,
instead of creating new designs. Industry-wide studies and PTC surveys ...
Top 5 Myths of Screen Scraping
[ Source: Seagull Software ]
June 2008-
Many organizations with mainframe, System i or OpenVMS applications still ask their employees to use green-screen (or text-based) user interfaces to work with essential business information. Green-screens are a business problem and a technology problem. They're unappealing, hard to learn, intimidating, and accessible only with terminal emulation software. They’re also incompatible with modern application integration methods like Web services and SOA.
The appeal of screen-scraping is understandable — it's simple and inexpensive. But ...
Mastering the WPF RichTextBox
[ Source: Jupitermedia ]
January 2008-
RichTextBox component in WPF/.NET 3.0 received a major upgrade compared to the previous version of the RichTextBox control that shipped with.NET 2.0. But with the expanded capability comes the need for additional APIs and different usage patterns. Microsoft intended developers to work with the RichTextBox component via a Command interface. Command attribute on each of these components defines the functionality to activate on the RichTextBox.
Mobile Learning Applications - Ubiquitous Characteristics and Technological Solutions
[ Source: Bulgarian Academy of Sciences ]
January 2008-
Although the functions which the mobile devices offer to eLearners are similar with those of a PC, the experience is different due to design and interface issues - small screen, lack of keyboard, slower Internet connection. At the same time there are added functionalities like GPS navigation, ability to distribute the information between several devices designed for different purposes to aim needs of the learner better. With the specific m-Learning features - portability, location awareness, ...
Adding Wildcards to the Java Programming Language
[ Source: Association for Computing Machinery ]
January 2008-
This research paper describes wildcards, a new language construct designed to increase the flexibility of object-oriented type systems with parameterized classes. Based on the notion of use-site variance, wildcards provide a type safe abstraction over different instantiations of parameterized classes, by using ? to denote unspecified type arguments. Thus they essentially unify the distinct families of classes often introduced by parametric polymorphism. Wildcards are implemented as part of the upcoming addition of generics to the Java ...
SandStorm: Load-Testing Tool
[ Source: Impetus Technologies, Inc. ]
July 2008-
The performance of a Web application under heavy traffic has become one of the most crucial factors that define its success. The challenges faced by these online applications include ensuring faster response time during peak hours and maintaining the basic level of quality and reliability of services. This white paper discusses various aspects of Web load testing and offers an insight into Impetus’ SandStorm Web load-testing tool.
Interactive eBook: A Guide to Modern IT Disaster Recovery from VMware
[ Source: VMware ]
September 2012-
Discover how federal agencies and the DoD can approach disaster recovery. Read the interactive eBook: "A Guide to Modern IT Disaster Recovery," to gain insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the data center.
Economics of Scale-Out Storage
[ Source: Red Hat, Inc. ]
April 2012-
Scale-out storage technologies have rapidly gained popularity over the past several years, successfully crossing the chasm from niche technology to mainstream enterprise solution. As this shift occurs, an increasing number of enterprises are seeking to understand the advantages of the newer technology when it comes to the storage of exploding amounts of unstructured data.
While many sources have investigated the advantages of scale-out storage from a technology perspective, few have taken on this ...
IBM Watson To Fight Cancer
[ Source: TechWeb ]
March 2012-
Memorial Sloan-Kettering Cancer Center and IBM have agreed to collaborate on the development of a powerful tool built upon the Watson natural language processing computer system to provide improved cancer diagnostics.
Open Source as a Catalyst for Innovation and Cultural Change featuring Yahoo
[ Source: Black Duck Software ]
March 2012-
Fact: Open source is a fundamental part of many of the world's leading development organizations, and is often credited with enabling and enhancing innovation. But how do open source and the community model of development impact organizational structure and culture?
Join us on this webinar to hear a senior executive from Yahoo! Share his experience and perspective on leveraging the positive business and network effects of open source while simultaneously managing some of ...
Strategy Guide to Converged Infrastructure in K-12 Education
[ Source: HP/Intel® ]
August 2012-
The pressure to achive in K-12 education has never been greater. Students are expected to learn more, teachers and administrators are expected to do more, and all of this has to be measured more, even while budgets are cut. This strategy guide explains how you can upgrade technology, standardize equipment and improve IT practices in your schol district.
This whitepaper is a rich media document, and includes IDC Analyst reasearch, multimedia content, solutions ...
Optimize your infrastructure with IBM Virtualization Solutions
[ Source: IBM ]
November 2011-
Today, success demands agility. If your IT staff spends all of their time worrying about security, uptime and capacity problems, they won't be working with you to drive innovation. This paper describes IBM Server Optimization and Integration services - Vmware server virtualization, a consulting-based solution that can help you determine the optimal placement of workloads within a VMware vSphere infrastructure deployment.
The 7 Myths of IP Risk: The Real Exposure Issues with Open Source Software
[ Source: Black Duck Software ]
November 2011-
Open Source Software (OSS) is widely recognised as providing significant technology, innovation and business benefits to software development organisations, but it is not without associated challenges and risks.
In this complimentary whitepaper, we address the intellectual property (IP) risks that developers, development managers and c-level managers must take into account when developing and distributing software created with OSS. We also discuss a number of common myths surrounding OSS that keep developers up at ...
Governance Fast Start: 5 Keys to Effective Open Source Governance
[ Source: Black Duck Software ]
November 2011-
Gartner predicts that through 2014, no more than 50% of open-source investments by mainstream IT organizations will yield consistent long term TCO advantages over alternatives. The reasons include the lack of a governance program to filter, audit, track and manage open source assets in the enterprise. In the same study they recommend -leveraging third-party commercial service and support to establish service-level agreements (SLAs) for OSS.
The credativ Group and Black Duck discuss these five key ...
Open Source at AOL: Driving Innovation and Corporate Success
[ Source: Black Duck Software ]
November 2011-
Open source has taken its place alongside many critical closed source technologies as a core piece of the global IT ecosystem. In addition to the traditional advantages of utilizing open source technologies, companies are gaining significant organizational benefits through its collaborative and transparent nature. Open source today is not just used as a way of "doing technology", but of developing core products and energizing customer, partner and employee relationships.
Join us on this ...
ITG Report: Cost/Benefit Case for IBM XIV Systems: Comparing Cost Structures for IBM XIV and EMC VMAX Systems
[ Source: IBM ]
September 2011-
New research from the International Technology Group demonstrates that the three-year operating and capital expenses for deployment and use of IBM XIV storage systems average 69 percent less than for EMC VMAX equivalents. These comparisons included financial services, government, health care, life sciences, manufacturing and telecommunications organizations with initial installed capacities of between 44 and 522 TB. Calculations allow for three-year capacity growth. Download now to read the detailed comparisons.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite

