- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- Gartner Report: Selecting the Best Platform for Cloud Service Integration
- How Are Banks Fighting the War on Fraud Whitepaper
- 5 Steps for Securing the Data Center: Why Traditional Security May Not Work
- The Right Way to Protect Against DDoS Attacks
February 2009- Today’s mobile software companies face a daunting challenge: How can they achieve quality while getting to market swiftly? After all, speed is king in the mobile market. New technologies are constantly being introduced; new mobile device platforms are emerging at a prodigious rate; competitors are constantly “one-upping” each other in an ever-escalating arms race of new features and interfaces. The trade-off between speed and quality in mobile software development is an illusion--or should be. ...
June 2008- Driven by the demand for “green” technology and better use of power, a new generation of extreme low-power wireless networks is being developed for use in machine to machine networks, for industrial and control applications, as well as for health, security, and other purposes. This article is about this new approach to truly wireless networks –- without any network cables or power lines.
November 2008- With high data rates, ubiquitous coverage, affordable chipset price, and spare data capacity, 3G networks have all the enablers for wireless integration in CE devices. In our analysis, devices with clear current value propositions like laptops, UMPCs, navigation, and gaming devices can be considered initial candidates for enabling wireless integration. It is imperative for OEMs and service providers to explore new business models (a combination of retail, wholesale, or pay-per-use) and service pricing to ensure ...
Did you know that up to 70% of enterprise data exists in various frontline settings, from laptops to handheld devices, to store and remote office environments?
Your frontline workers may have a variety of skills but they’re rarely IT savvy and certainly not security experts. Yet more than 75% of enterprises leave responsibility for security in the hands of the user – literally.
With the increase in the use of mobile devices, you ...
February 2008- If firmware over-the-air (FOTA) is to realize its true potential in EMEA, the technology must adapt to meet the demands of mobile organizations looking to define a clear business case. This new report is available to anyone looking to better understand the role of FOTA within a constantly shifting mobile value chain.
January 2008- A computer system is only as secure as its weakest component. Creating a secure system involves looking at all areas of vulnerability and creating solutions to address each of those areas. HP ProtectTools helps provide a solution for all points of vulnerability, including - securing the device against unauthorized access; securing the network; and protecting the data. Security solutions installed at the Operating System (OS) level can provide a high level of protection against unauthorized ...
January 2008- Adding Remote Laptop Security as a layer of protection between ones organization and data thieves can save a company public relations headaches, compliance violations and that all important perception of trust. The frequent occurrence of laptop theft in recent headlines highlights the necessity for improved laptop security. The combination of human error, carelessness and failed passwords has created a dangerous environment in which laptop thieves can effortlessly gain access to an abundance of names, ...
January 2008- The HP iPAQ hx2000 series Pocket PC is an enterprise-class handheld solution for large corporate accounts as well as small-to medium-sized businesses that have a need for superior levels of security, performance, connectivity, expandability, and platform stability. This paper from Hewlett-Packard provides detailed information on the features, strengths, and key issues related to the HP iPAQ hx2000 series Pocket PCs. In addition to the wealth of productivity features offered by the Microsoft Pocket PC environment, ...
January 2008- The development of the Digital Video Broadcasting to a Handheld (DVB-H) standard makes it possible to deliver live broadcast television to a mobile handheld device. Building upon the strengths of the Digital Video Broadcasting-Terrestrial (DVB-T) standard in use in millions of homes, DVB-H recognizes the trend towards the personal consumption of media. But because DVB-H receivers can and often will combine the functionalities of a mobile phone and a television, the concept has also raised ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services