Sort results by: Published date | Company name

Protect Your Applications - and Reputation - with Symantec EV Code Signing [ Source: Symantec ]
January 2015- For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code.

Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Are you Ready for Mobile Capture? [ Source: IBM ]
November 2014- Read this white paper by Kevin Craine to discover how mobile capture can improve the effectiveness of your organization's processes. Discover the top 10 questions to ask before you make your investment in mobile capture.

[WHITE PAPER]
Read Abstract | Go to White Paper

SaaS Takes Center Stage [ Source: IBM ]
November 2014- The SaaS Category infograph showcases the SaaS adoption trend and growth from 2013-2017

[WHITE PAPER]
Read Abstract | Go to White Paper

The State of Managed Phone Services in the Cloud [ Source: Comcast ]
October 2014- More than 59% of small and midsized companies are considering a hosted or virtual alternative to traditional phone services in order to boost collaboration, reduce costs, and accommodate the changing mobile nature of work. Download this exclusive research report to learn more about the solutions they're pursuing, the results they're seeing, and the challenges they encounter along the way.

[WHITE PAPER]
Read Abstract | Go to White Paper

Three Ways To Deliver Safer and More Secure Automative Software [ Source: Rogue Wave Software ]
October 2014- Millions of lines of software code are driving the latest innovations in today's vehicles. However, with software-driven innovation comes the reality of coding defects, safety failures, and the potential to become a target for hackers. This paper outlines three important steps that embedded automotive software teams can follow to identify critical coding errors, functional safety issues, and protect their software against malicious attack.

[WHITE PAPER]
Read Abstract | Go to White Paper

Mobile App Development: Moving From Good to Great [ Source: IBM ]
October 2014- Great mobile app development leads to more than a compelling user interface. In fact, the majority of the cost and effort happens behind the UI, including testing, integration, security, quality assurance, and ongoing management. Also, with security and data integration becoming especially important for an enhanced user experience, many companies are turning to integrated and collaborative mobile application development environments to meet these business requirements and exceed customer expectations.

[WHITE PAPER]
Read Abstract | Go to White Paper

Improving SLAs with Faster Processing Powered by HGST FlashMAX II and HGST Virident Share Software [ Source: HGST ]
October 2014- HGST Virident Share software allows a RAC cluster to use FlashMAX II PCIe SSDs inside the database servers as a shared primary storage, a unique capability in the industry for PCIe flash cards. Learn more.

[WHITE PAPER]
Read Abstract | Go to White Paper

Algorithmics: Curve fitting for calculating solvency capital under Solvency II [ Source: IBM ]
September 2014- The purpose of this paper is to provide an insight into how some of Europe's leading insurer's are applying Curve Fitting in practice, the benefits that are being derived and some of the practical challenges that need to be addressed.

[WHITE PAPER]
Read Abstract | Go to White Paper

Whitepaper: Increasing Software Development Productivity with Reversible Debugging for Linux [ Source: Undo Software ]
September 2014- In a world increasingly run by software, failures caused by bugs have never been more visible or high profile. However, a study from the Judge Business School of the University of Cambridge, UK, published in 2013, found that the global cost of debugging software has risen to $312 billion annually. Finding and fixing bugs faster, in a more predictable and productive way, is vital for developers and managers. This whitepaper explores the various debugging options currently available ...

[WHITE PAPER]
Read Abstract | Go to White Paper

CommVault Is A Leader Among Enterprise Backup And Recovery Software Providers [ Source: CommVault ]
August 2014- CommVault's primary strategy centers on providing a single platform for backup, recovery, continuity, archive, and other data management and protection strategies. Areas of strength for CommVault include its deduplication capabilities, cloud-target integrations, hypervisor and application capabilities. Through innovative offerings and the implementation of advanced strategies, CommVault has quickly become an industry leader in a myriad of fields. Download this Forrester Research Report today to find out more about CommVault's current offering, strategy, and market presence.

[WHITE PAPER]
Read Abstract | Go to White Paper
View All