Git for the Enterprise - Promises and Pitfalls
Git is the world's leading DVCS (distributed version control system). Enterprise adoption for Git however has been slow. Concerned with security breaches, compliance violations and ......
BPM for Dummies
[ Source: IBM ]
August 2012-
Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012-
Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Sponsored by:<...
Avoiding the 8 Common Mistakes of Windows 7 Migration
[ Source: Dell/Microsoft ]
September 2011-
The recession put important things on hold for many organizations, like upgrading to new client systems. Now organizations such as yours are ready to upgrade and gain from better performance and efficiency by purchasing new laptops and notebooks with Windows 7 factory-installed.
Before you move dozens - or hundreds - of important business applications into a new environment, find out how other organizations tackled this challenge.
Download "Avoiding the 8 common mistakes of ...
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011-
In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011-
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Creating a Timeline for Deploying Windows 7 and Eliminating Windows XP
[ Source: Dell/Microsoft ]
February 2012-
Windows XP support ends April 8, 2014. Therefore, organizations must decide when to begin their migration to Windows 7, set a target date to have Windows XP out and define the scope of the project.
This research paper reviews Gartner's key findings and recommendations for deploying Windows 7.
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011-
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011-
Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011-
Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
Extending your VMware Cloud Infrastructure with a Private Platform-as-a-Service
[ Source: Active State ]
November 2011-
If you already use VMware's Cloud Infrastructure as a virtualization platform, you are well on your way to providing IT as a Service. But as businesses demand faster results in today's competitive market, organizations look to gain more benefits from cloud computing than just virtualized infrastructure.
ActiveState Stackato extends your private cloud infrastructure and your VMware investment by creating a private Platform-as-a-Service (PaaS) to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market ...
Performance Comparison -- ITTIA DB and SQLite
[ Source: ITTIA ]
March 2010-
ITTIA DB SQL is a lightweight database management system designed from the ground up to meet the requirements of embedded systems and devices. SQLite is an open source software library. This white paper examines the performance characteristics and technical capabilities of ITTIA DB and SQLite.
Code Signing Playbook
[ Source: thawte ]
August 2010-
The 5 Sections in this Playbook include:
• Java Code Signing
• Code Signing and Microsoft Authenticode
• Q&A: Code Signing
• Making .NET Assembliess Tamper Resistant
• Code Signing in Adobe AIR
A New Way of Working Smarter - Insights from Global Leaders
[ Source: IBM ]
April 2010-
It pays to work smarter not harder. According to a recent study by the IBM Institute for Business Value, organizations that are significantly outperforming their industry peers also happen to be making more headway on newer approaches to work.
They’re using dynamic, collaborative and connected ways of working to get things done effectively within a constantly changing environment. But most organizations are not yet meeting their ambitions in these areas.
...
Software Configuration Management Best Practices
[ Source: AccuRev ]
February 2012-
Software configuration management (SCM) comprises of factors such as compliance, workflow, security, process management, code review, build management and team work. An important piece of any software development process, SCM practices define for development teams how software will be developed and eventually released. Teams can maximize their effectiveness by applying best practices that enable rapid delivery.
This white paper introduces the five SCM best practices that are essential for software development success.
Iteration Planning Guide - Agendas, Tips and Schedules
[ Source: Rally Software ]
August 2010-
Iterations are the heartbeat of the Agile team. Getting into the rhythm of these short cycles uses disciplined planning practices supported by daily and iteration-level meetings. This guide includes a recommended iteration schedule for new teams, success tips and a detailed Iteration Planning agenda.
Microsoft Access 2010 Cost Benefit Analysis for Developers
[ Source: Alpha Software ]
June 2010-
Although Microsoft Access can be used to create desktop applications, its Web development features are lacking. If an organization wants to port an existing Access application to the Web, typically its done in one of two ways:
* The organization can create a brand new Web-based application in Visual Studio. The server-side code would then use the .NET framework to read and write to and from the Access database. Note, however, that the Access ...
Online Secure Web Application Development Awareness (SWADA) Course
[ Source: SCIPP International ]
December 2009-
This ANSI accredited*, 4 hour, live on-line course reviews all of the OWASP Top-10 vulnerabilities and covers best business practices associated with secure web-application development. Upon successful completion of a 25 question post-assessment, attendees will receive a Certificate of Training that will be used as evidence of training which is required by the PCI and PA DSS.
WHO SHOULD ATTEND? •Anyone who is involved with the Application Development Lifecycle: •Application / Applet Developers •Designers •Architects and ...
Building smart products: best practices for multicore software development
[ Source: IBM ]
February 2011-
The planet is becoming more interconnected, instrumented and intelligent. All kinds of devices—from medical devices to the global positioning system (GPS) in your car to large-scale defense systems—rely on embedded software to interact with other systems and deliver an exceptional, differentiated user experience.
But as the marketplace increasingly demands embedded systems that deliver greater functionality, a smaller form factor, greater reliability, lower power and a lower cost of operation, the pressure ...
Top 5 Software Development Process Challenges
[ Source: AccuRev ]
October 2011-
A process framework is a combination of project management, technical practices, and supporting tools. The tools and practices have a profound effect on the day-to-day life of a developer. These types of practices and tools have either helped or hindered development teams deliver software.
This paper from AccuRev explores the top 5 process development challenges that software development teams face today and focuses on a series of best practices and techniques for development teams ...
Git for the Enterprise - Promises and Pitfalls
[ Source: CollabNet ]
December 2012-
Git is the world's leading DVCS (distributed version control system). Enterprise adoption for Git however has been slow. Concerned with security breaches, compliance violations and lack of governance, many chose to 'wait and see'.
Git for the Enterprise: Secure, Scalable, Standards-Compliant
[ Source: CollabNet ]
December 2012-
Due to its flexibility and speed, Git has become popular with individual developers, and small enterprises and workgroups. For most enterprises however, effective management of Git is a challenge. Discover technical innovations and emerging best practices now provide additional options to manage Git in the enterprise.
Deployment Automation Basics: Implementing Consistent Deployments Across Environments
[ Source: UrbanCode ]
December 2012-
IT organizations are finding it difficult to release applications to production servers (physical, virtual, or cloud) more quickly without adding more people and incurring additional risk. In a poll sponsored by UrbanCode, over 75% of respondents identified their software deployment process as "Entirely Manual," "Mostly Manual," or "Mostly Scripted."
This paper details the limitations of manual deployments and how to overcome them. Topics covered include:
• Why manual deployments are inherently slow and ...
What's your IT Collaboration maturity?
[ Source: ITinvolve ]
November 2012-
Some believe IT collaboration is the next big thing, and others say it's nothing new. By reading this thought leadership paper you will gain new understanding into how IT collaboration is defined, its benefits, and how to assess your own IT collaboration maturity.
Do You Really Get Classloaders?
[ Source: ZeroTurnaround ]
November 2012-
Join us for a tour of the Java classloading mechanism, both from the JVM
and developer point-of-view. We will look at typical problems related to
classloading and how to solve them.
Continuous Quality Assurance
[ Source: Micro Focus ]
October 2012-
Your business is built on applications. So it is imperative that your systems are efficient and perform as you demand. Conventional approaches to ensuring quality results leave you with little margin for error. Continuous quality assurance (CQA) is an efficient, business-centric alternative to traditional vendors - "last minute" methodologies and provides capabilities across three key areas: requirements, change, and quality. Read this white paper to learn how CQA provides clients with a comprehensive "front to ...
Testing For Peak Performance
[ Source: Micro Focus ]
October 2012-
It is imperative that the applications that your customers rely on perform as expected. That requires effective performance testing. But as the costs and complexity of managing these tests rise, you should investigate more cost-effective and powerful alternatives. Read this white paper to learn how cloud-based performance testing provides the answer to your quest, allowing you to quickly scale to even the largest peak loads - all while paying just for what you use when ...
How To Successfully Automate the Functional Testing Process
[ Source: Micro Focus ]
October 2012-
Today's software development organizations face a triple challenge. They must optimize the quality of increasingly complex software applications to deliver winning solutions that yield a high ROI and drive competitive advantage. To solve this challenge, many forward-thinking companies have turned to automation, recognizing its potential to thoroughly test, rapidly develop and reduce the cost of delivering high-quality applications.
But automated testing solutions are not one-size-fits-all. In fact, 85% of organizations that attempt automation fail ...
Cricket Communications Turns to Splunk
[ Source: Splunk ]
September 2012-
Keeping up with a quickly expanding business is difficult if you do not have the right tools. Cricket Communications was growing in its number of subscribers at a rate of 10 to 20% annually and needed a system that could handle processing of up to 3,000 new subscriber requests per hour.
It implemented automated business processes and contract processing systems to keep up with the new requests, but if an error occurred the whole system would ...
How you build a secure network and growth ready network that is as agile as your business
[ Source: HP/Intel® ]
September 2012-
Learn how you build a secure network and growth-ready network that is as agile as your business. With a growth-ready network, small business can put new technologies to work on their schedule - and the rapid pace of doing business in the Internet age will never be too fast.
Sponsored by: HP and Intel®
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite
