Sort results by: Published date | Company name
Showing items 1-25

ROI: The Value of Deployment Automation [ Source: IBM ]

September 2013- This paper explains how a deployment automation framework can streamline release operations and increase business agility. The document describes the benefits of Deployment Automation. In addition, the whitepaper contains a formula for calculating the return on your investment (ROI).

In-The-Wild Testing [ Source: uTest ]

August 2013- The mobile and web matrix has grown to such epic dimensions that it is nearly impossible and extremely cost-prohibitive to cover entirely in-house. There are thousands of device, carrier and platform combinations for mobile alone. Add web browsers, anti-virus software, plug-ins and PC specs into the mix and your testing lab would need to be the size of an aircraft hangar. But somewhere in the world there are potential users for every matrix combination. By ...

Video Surveillance: Meeting the Massive Growth and Scalability Challenge [ Source: Affigent/EMC ]

December 2013- Affigent, in partnership with EMC Isilon, recognizes the growing need for video surveillance within the federal government.

Video Surveillance data storage solutions for the federal government that enable:

• Massive scalability: Unimaginable room for video surveillance data storage - from 18 Tbs to over 20 PBs of capacity per cluster.

• Unmatched efficiencies: Delivers 80% of greater storage utilization efficiency to drive down storage costs and reduce the data center footprint.

• Robust ...

Mobile testing: Follow these 5 strategic steps to simplify and accelerate app testing [ Source: HP ]

April 2013- The rapid pace of mobile apps demands new approaches to functional testing. To bring high-quality software to market quickly, your organization needs a strategy that moves you beyond the limitations of testing conducted on devices you manage in an internal lab. This paper outlines five strategic steps to get you there today-and move your processes into the era of the app.

Sponsored by:

SANS ForeScout BYOD Mobile Security [ Source: ForeScout ]

June 2013- With the introduction of BYOD and its associated threats, Network Access Control has emerged as a compliance-critical solution. Discover how NAC policies and approaches can secure guest devices and mitigate the risk of BYOD access to the enterprise.

Deliver the Cloud Network: Take a walk in the CLOUD with scalable network [ Source: HP ]

December 2012- Successful cloud computing depends on an agile and scalable network that's built on open standards and orchestrated to handle the demands of virtualization, with its intensive traffic among servers. Today's networks must be fast and flexible to meet the needs of diverse mobile users, host a constantly changing array of applications, and maintain a security perimeter.

Don't miss this overview of why a cloud-optimized network is necessary and how your organization can deploy ...

IDC Technology Spotlight: Optimizing Application Delivery to the Network Edge [ Source: HP ]

December 2012- Networks are becoming more important than ever to enterprise IT-- they are critical to business enablement, collaboration and exploiting the benefits of cloud computing. The exploding use of mobile devices and the applications they use is focusing attention at the network's edge, which must be optimized to support new traffic, federated applications and virtual machine mobility.

Check out this IDC white paper to learn how IT organizations can help remote branches improve access ...

CIO Strategies for Consumerization: the Future of Enterprise Mobile Computing [ Source: Dell/Microsoft ]

September 2011- IT consumerization, workforce mobility and flexible computing are changing the relationship between enterprise IT, knowledge workers and end users. For the CIO, IT consumerization represents the confluence of a difficult set of challenges (security, technology policy, data protection, end-user technology) and business strategy (new business models, talent strategy, corporate brand and identity).

Learn about five trends that are shaping the future of enterprise mobility, and get nine recommendations for the new era of ...

CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing [ Source: Dell ]

May 2011- It?s been a generation since the first workers to grow up with personal computers at home entered the workforce. Twenty years ago, this new generation of workers helped fuel the massive expansion of business computer use and the productivity gains that ensued.

In this paper you will learn the five trends shaping the future of enterprise mobility. Learn how the rise of social media as a business application, the lurring between work ...

Business-ready Mobile Collaboration Tools for Your BlackBerry Smartphone [ Source: IBM ]

November 2010- Even while they’re on the move, people need access to valuable information and experts. Mobile devices, such as smartphones and laptops, can keep employees more produc-tive throughout the day, whether they’re in the office or onthe road. But they lose time if they’re constrained in how andwhen they work—for example, if they need separate applica-tions and logins for smartphones, if they need to stop at a WiFi hotspot to access collaboration ...

India Wireless Broadband Operator Options [ Source: Savitar Research Group ]

August 2010- Today, one of the biggest decisions operators face has a technology choice at its heart. LTE or WiMax? This harkens back to many of the standard wars that the world has seen and the questions that have to be answered are myriad and complex. Decisions need to be made from spectrum acquisition to deployed networks and eventually a business plan that returns good money on the investment in reasonable period. Savitar covers one such migration ...

TPC-H Performance Results for Sybase IQ on ProLiant System [ Source: Sybase ]

January 2010- Sybase, Red Hat, and HP are working together to provide a low total cost of ownership Linux solution for Sybase IQ with enterprise-quality performance, robustness, and scalability for business-critical analytics. This paper describes the recent TPC-H performance results for Sybase IQ on an HP ProLiant System running Red Hat Enterprise Linux. It also provides some background on why Sybase customers and many other IT organizations are moving to Linux and why customers should consider Sybase ...

Why Architecture Matters: PowerDesigner Enhances Support for Enterprise Architecture [ Source: Sybase ]

January 2010- IDC Analyst Steve Hendrick takes a closer look at the value tooling adds to all architectural environments, articulates PowerDesigner's enhanced support for EA, and describes how ETS is using PowerDesigner for their EA implementation. This report on PowerDesigner is provided by Sybase.

IPX: The Second IP Revolution [ Source: Sybase ]

January 2010- This white paper outlines how Mobile IP-based services are central to future growth in an increasingly converged fixed and mobile telecommunications industry. Service provider margins are under increasing pressure with the commoditization of voice and messaging, while a global economic downturn has impacted both consumer spending and operator investment.

Advanced IP Messaging Server [ Source: Sybase ]

January 2010- The addition of 4G networks to operator portfolios promises to bring exciting new data capabilities to users, while allowing operators to maintain voice coverage and quality. This whitepaper outlines the new challenges 4G deployments bring to mobile operators and solutions designed to address these challenges.

Mobility Management for Dummies Guide [ Source: Sybase ]

March 2010- These days, most business is no longer done in the traditional office. It's being done wherever you interact with customers or your employees are located. This presents an opportunity for you to gain a key advantage by having your critical information and applications available, when and where your users need them, so they can make better, more informed decisions and take decisive actions.

In this informative and entertaining Dummies Guide, you can learn ...

How To Select A Facebook Application Development Provider [ Source: Software and Web Development Company Acceptic ]

April 2010- If you decide to develop a Facebook application, you need a professional development team that can implement that task in the most effective way. This article from Acceptic provides a few tips that can be useful when selecting a Facebook app provider.

IT Manager's Guide to Managing Personal Devices in the Enterprise [ Source: Sybase ]

March 2010- You can’t avoid it any longer: Developing a strategy for managing and securing employees’ personal mobile devices. iPhone and Google Android devices are joining BlackBerry, Symbian and Windows Mobile smartphones in the workplace, and their numbers are only increasing. Regardless of whether corporate policy allows them, workers are still bringing their personal devices into the office.

According to a recent Forrester Research report, almost half of U.S. and European businesses surveyed ...

Unified Services Of AAA In 4G LTE Networks [ Source: Tech Mahindra Ltd. [R&D Services] ]

November 2009- The present technical white paper outlines the role of AAA services for 3GPP and non-3GPP system access in LTE technology. This paper is intended for the users studying the core networks aspects of LTE systems and SAE gateway.

Mobile Multiplayer Gaming, Part 3: Multiplayer Games With Bluetooth [ Source: Sun Microsystems ]

January 2008- The focus of the mobile gaming industry, centers on the wide-area wireless capabilities of mobile devices. The ability to connect to anywhere in the world is what defines the wireless computing revolution. But gaming is fundamentally a social phenomenon, and it makes sense that one would want to challenge players within earshot. This paper published by Sun Microsystems expose the raw potential that Java technology and Bluetooth bring to mobile gaming. It gives as basic ...

How to Configure Nokia Secure Connector [ Source: Nokia ]

January 2008- As part of the Nokia Secure Access System, the Nokia Secure Connector provides an IPSec Client like behavior but using SSL/TLS encryption. The Nokia Secure Connector is basically client software that has to be installed on the remote system. Its intent is to cover and secure the communication of all kind of Client - Server Applications. On the client workstation, the VPN client software looks like a normal Ethernet device (Windows can’t tell ...

A Mobile Phone-Based Context-Aware Video Management Application [ Source: University of California ]

January 2008- This paper published by MobiCon presents a video management system comprising a video server and a mobile camera-phone application called MobiCon, which allows users to capture videos, annotate them with metadata, specify Digital Rights Management (DRM) settings, upload the videos over the cellular network, and shares them with others. Once stored in the video server, users can then search their personal video collection via a web interface, and watch the video clips using a wide ...

Build a Wireless Gateway With Perl [ Source: O’Reilly Media ]

January 2008- When operated in a special mode called Managed, the host computer acts as a wireless access point. HostAP does its job and does it well, but it is command line only, and that’s not suitable for everyone. A complete solution that potentially competes with off-the-shelf devices needs more features, including DHCP, firewall, DNS, and NTP, along with a web interface for configuration. This is the de facto standard nowadays.

A Bubble Oscillation Algorithm for Distributed Geographic Load Balancing in Mobile Networks [ Source: Institute of Electrical and Electronics Engineers ]

January 2008- Mobile cellular networks are by far the most common of all public wireless communication systems. Previous research on mobile cellular networks has led to many schemes to increase the system capacity. Balancing the traffic load and use of smart antennas are two of the most important ones. Traffic load balancing in mobile cellular network has been well-studied since the first generation of mobile communication systems. This research paper investigates a new load balancing scheme for ...

Location Management Strategies in Next Generation Personal Communications Services Networks [ Source: Novatica ]

January 2008- Wireless communications networks these days are one of the fastest growing segments of the communications industry. The increasing need for mobility and high data rates are the two dominant trends in the evolution of wireless communications systems. This paper from Novatica provides an overview of the algorithms and techniques used in next generation Personal Communications Services networks. These techniques have been developed to address some inefficiency issues arising from classical standards like GSM (Global System ...

Client-Server Java Programming for Wireless Mobile Robots [ Source: American Institute of Aeronautics and Astronautics ]

January 2008- The concept of remotely controlling a vehicle was first used for military purposes by German motor-boats to ram enemy ships in World War I (WWI). A client-server application for the remote control of a wireless mobile robot is described. The application requires an onboard computer running a Java Virtual Machine (JVM) on the vehicle. The mobile robot is the client, which is controlled by the server. The server can be any desktop machine or another ...

Next 25