Sort results by: Published date | Company name

Building Return On Investment From Cloud Computing [ Source: Open Group ]
April 2010- With so much discussion about cloud computing today, many questions arise. This white paper from Open Group introduces the main factors affecting ROI from cloud computing, and compares the business development of cloud computing with that of other innovative technologies; describes the main approaches to building ROI by taking advantage of the benefits that cloud computing provides; and describes approaches to measuring this ROI, absolutely and in comparison with traditional approaches to IT, by giving ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Enterprise Architecture With SOA [ Source: Wipro Technologies ]
February 2010- In today’s challenging and globalized business, drastic IT technology growth has enabled organizations to do business around the globe in a virtual boundary less environment. Enterprise Architecture, along with SOA, re-models a global organization views as a set of business process and services that has wide scalability and adaptability in terms of re-use of the business processes and services. With this SOA approach, Enterprise Architecture can transform a global organization to achieve high agility ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Sustainable Government: Five Ways ECM Can Help You To Be Lean, Clean, And Green [ Source: Optical Image Technology - DocFinity ]
April 2009- Government has a tremendous responsibility to lead by example. Nowhere is this truer than in its efforts to lead the way with sustainable business. This article shows how government agencies can operate their agencies in efficiently, be environmentally proactive, save money, and improve constituent services by managing documents and work digitally with ECM.

[WHITE PAPER]
Read Abstract | Go to White Paper

Design and Implementation of a Web-Based GIS for the Iranian Roads Information [ Source: GISdevelopment.net ]
January 2008- The Internet is a global, public collection of individual networks run jointly by private organizations, universities, and government agencies. (Intranets are private networks that use Internet technology.) The Internet can be viewed as a physical network, which interacts with computers, software, and data on different levels, or tiers. For the purpose of this project tree tiers of Internet interaction are defined as client, middleware, and server. It’ll be discussed where IMS components fit within ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Designing IT Infrastructure to Meet Your Business Goals [ Source: J.P. Schwartz ]
January 2008- Designing an IT infrastructure plan that meets the current and future business goals is well worth the time and energy required. IT infrastructure is defined as the policies, processes, people, hardware, software, networks, vendors, and customer interfaces required to collect, analyze, and deliver the information and communications that make business successful. This paper goals, include input from all areas impacted by a potential change in IT infrastructure such as management, personnel, marketing, planning, manufacturing, data ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Introduction to Digital Rights Management - DRM [ Source: LockLizard ]
August 2007- This paper covers the technology called Digital Rights Management or DRM, what it achieves and how this benefits your business. It covers the demand for DRM in the protection of intellectual property and the use of encryption and cryptography in protecting and controlling digital content. It compares DRM controls against IT controls, charging mechanisms, and the use of DRM in various industries. Most importantly it covers how DRM can be made to work for your ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Top Reasons to Choose Red Hat Enterprise Linux [ Source: Red Hat ]
August 2010- Many of the largest and most demanding organizations trust Red Hat to drive their mission critical IT infrastructure. Red Hat Enterprise Linux is the backbone of a robust environment that powers the demanding applications they count on. With a mature software stack, top TPC-C benchmarks, and NSA-certified integrated security, Red Hat Enterprise Linux meets the highest standards of reliability. And the industry-leading offerings extend beyond software into consulting and training services, innovative business practices, and ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Harvard Research Group Assessment: Linux Migration [ Source: Red Hat ]
August 2010- Cloud technologies and services hold the promise of shorter time-to-market, cost-sharing with other users, and instant availability of resources. Harvard Research Group (HRG) believes that cloud computing enables organizations of all sizes and levels of maturity to simplify, consolidate, virtualize, and re-architect their computing infrastructure for the future. Linux, with hypervisor technologies such as Kernel-based virtual machine (KVM), and in conjunction with chip-based technologies, is certain to broaden the use of virtualization and the adoption ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Toward An Identity And Context Virtualization Service: A Buyer's Guide To Virtual Directories [ Source: Radiant Logic ]
July 2010- The world of IT and security is changing. We're moving from highly centralized infrastructures to a more federated approach, where relationships are loosely coupled, identities are scattered across systems, and we all live and work in the cloud. But such a move has exposed weaknesses in our IT systems--and prevented us from taking full advantage of all these technological advances. The struggle between the push model of our traditional security infrastructure and the pull model ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Gabriel Connection Technology [ Source: VirnetX ]
July 2008- Gabriel Connection Technology empowers individuals, organizations of all sizes and government agencies to establish and administer their own private network enclaves or Safe Neighborhoods across the Internet. These enclaves provide cryptographic privacy for all data within the enclave and cryptographic authentication of all of its participants. VirnetX Security Platform (VSP)-enabled Safe Neighborhoods have changed the way people think about network enclaves. Instead of networks being secured by physical barriers, they’re defined cryptographically, thereby ...

[WHITE PAPER]
Read Abstract | Go to White Paper