Git for the Enterprise - Promises and Pitfalls
Git is the world's leading DVCS (distributed version control system). Enterprise adoption for Git however has been slow. Concerned with security breaches, compliance violations and ......
BPM for Dummies
[ Source: IBM ]
August 2012-
Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012-
Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Sponsored by:<...
Avoiding the 8 Common Mistakes of Windows 7 Migration
[ Source: Dell/Microsoft ]
September 2011-
The recession put important things on hold for many organizations, like upgrading to new client systems. Now organizations such as yours are ready to upgrade and gain from better performance and efficiency by purchasing new laptops and notebooks with Windows 7 factory-installed.
Before you move dozens - or hundreds - of important business applications into a new environment, find out how other organizations tackled this challenge.
Download "Avoiding the 8 common mistakes of ...
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011-
In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011-
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Creating a Timeline for Deploying Windows 7 and Eliminating Windows XP
[ Source: Dell/Microsoft ]
February 2012-
Windows XP support ends April 8, 2014. Therefore, organizations must decide when to begin their migration to Windows 7, set a target date to have Windows XP out and define the scope of the project.
This research paper reviews Gartner's key findings and recommendations for deploying Windows 7.
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011-
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011-
Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011-
Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
Microsoft Access 2010 Cost Benefit Analysis for Developers
[ Source: Alpha Software ]
June 2010-
Although Microsoft Access can be used to create desktop applications, its Web development features are lacking. If an organization wants to port an existing Access application to the Web, typically its done in one of two ways:
* The organization can create a brand new Web-based application in Visual Studio. The server-side code would then use the .NET framework to read and write to and from the Access database. Note, however, that the Access ...
The Total Economic Impact of IBM Optim Solutions Whitepaper
[ Source: IBM ]
January 2011-
In this report, Forrester Consulting examines the total economic impact (TEI) and potential return-on-investment (ROI) that enterprises may realize by deploying IBM® Optim™ Solutions for Integrated Data Management. In conducting in-depth interviews with four existing customers, Forrester consultants found that these companies achieved tangible improvements in operational and capital cost efficiency, IT administration cost savings, increased data protection, as well as higher levels of end user productivity.
Conefessions of a Speed Junkie
[ Source: XCodeMonkeys ]
July 2009-
This is our attempt to shed some light on what we believe is a rapidly approaching paradigm shift in parallel computing; General Purpose Graphics Processing Unit computing (GPGPU). Recent advances from GPU vendors have paved the way for significant performance gains in the area of financial modeling. Our site will quickly get the reader up to speed with these advances by explaining the basic concepts, providing code examples, and providing links to additional information.
AdaRank: A Boosting Algorithm for Information Retrieval
[ Source: Association for Computing Machinery ]
January 2008-
This white paper of Association for Computing Machinery explains a novel algorithm for learning ranking models in document retrieval, referred to as AdaRank. In contrast to existing methods, AdaRank optimizes a loss function that is directly defined on the performance measures. It employs a boosting technique in ranking model learning. AdaRank offers several advantages: ease of implementation, theoretical soundness, efficiency in training, and high accuracy in ranking.
HP Converged Storage: Storage for the next era of IT
[ Source: HP/Intel® ]
September 2012-
As the amount of information we generate grows, and as our relationship with information grows more complex, there is a race to innovate new products and services to help us harness information, manage it, and tap into it more easily.
These new innovations allow us to connect more simply and effectively, when and how we like. This paper discusses these dynamics and explains how you can leverage technology to better capitalize on information ...
Converged Infrastructure for Dummies
[ Source: HP/Intel® ]
September 2012-
In a world where everything is mobile, connected, interactive, immediate, and fluid, organizations need an IT infrastructure that enables agile and rapid service delivery while driving out costs. That's exactly what is achieved with the HP Converged Infrastructure strategy and approach- enabling organizations to accelerate time to business value.
Sponsored by:
Driving systems engineering value through trade studies
[ Source: IBM ]
February 2011-
This trade study shows not only a robust technique with modeling and SysML, but it also provides a methodology that enables users to properly explore the design space with executionanalysis—all from within the design model, something that was oftenmissing from previous techniques around trade study analysis.
The Total Economic Impact of IBM Optim Solutions Whitepaper
[ Source: IBM ]
January 2011-
In this report, Forrester Consulting examines the total economic impact (TEI) and potential return-on-investment (ROI) that enterprises may realize by deploying IBM® Optim™ Solutions for Integrated Data Management. In conducting in-depth interviews with four existing customers, Forrester consultants found that these companies achieved tangible improvements in operational and capital cost efficiency, IT administration cost savings, increased data protection, as well as higher levels of end user productivity.
IBM agility@scale be as agile as you can be
[ Source: IBM ]
January 2011-
Agile software development techniques have taken the industry by storm, with 76 percent of organizations reporting that they had one or more agile projects under way. Agile is becoming widespread because it works — organizations are finding that agile project teams, when compared to traditional project teams, enjoy higher success rates, deliver higher quality, have greater levels of stakeholder satisfaction, provide better return on investment (ROI) and deliver systems to market sooner.
And Agile works ...
Continuous Testing with ElectricCommander
[ Source: Electric Cloud ]
August 2009-
Drive quality earlier in the development process with continuous testing.
Large development organizations have increasingly been adopting select agile practices to enable faster development, create more reliable software, and reduce costs. Chief among these practices is providing developers early and frequent feedback from users, from other developers, and especially from the programming, build, and test tools. In the latter category, continuous integration and continuous testing are emerging as valuable techniques for ...
Microsoft Access 2010 Cost Benefit Analysis for Developers
[ Source: Alpha Software ]
June 2010-
Although Microsoft Access can be used to create desktop applications, its Web development features are lacking. If an organization wants to port an existing Access application to the Web, typically its done in one of two ways:
* The organization can create a brand new Web-based application in Visual Studio. The server-side code would then use the .NET framework to read and write to and from the Access database. Note, however, that the Access ...
AMD Core Math Library (ACML) Offers Math Routines
[ Source: Advanced Micro Devices, Inc. ]
November 2006-
ACML provides a free set of thoroughly optimized and threaded math routines for HPC, scientific, engineering, and related compute-intensive applications. ACML is ideal for weather modeling, computational fluid dynamics, financial analysis, oil and gas applications, and more. ACML consists of the following main components: a full implementation of Level 1, 2. and 3 Basic Linear Algebra Subroutines (BLAS), with key routines optimized for high performance on AMD Opteron processors; a full suite of Linear Algebra (LAPACK) routines; taking ...
Introductory Tutorial to OpenCL
[ Source: AMD ]
August 2009-
OpenCL is a young technology, and, while a specification has been published, there are currently few documents that provide a basic introduction with examples, according to AMD. This article helps make OpenCL easier to understand and implement.
Infragistics Application Styling: Collaborative Design for Killer Apps
[ Source: Infragistics ]
May 2010-
Creating high-quality and effective user experience that set your killer app apart from the rest of the competition requires contributions to be made from application developers and graphics artists alike. While developers may have the coding credentials to write that great novel of an application, it is the graphics artists who have the brand awareness and media skills necessary to make that novel play on the silver screen as the major blockbuster motion picture you ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite
