- Secure Cloud Networking
- A Fast Data Imperative for Regional and Community Banks
- U.S. Defense Contractors Say They Remain Vulnerable to Cyber-Attack
- No Respect. CISOs Misunderstood and Underappreciated by their C-Level Peers
- Stepping into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud
Apple's iPad is being launched as a consumer device. Yet, there is little doubt that it will become a valuable enterprise productivity tool.
IT departments should consider iPad when planning strategies and policies to ensure corporate information stays managed and secured.
Join Sybase for this on-demand webcast and learn:
• What studies are indicating about the use of iPad in the enterprise
• How IT can provide employees with ...
February 2009- The number of consumer audio applications demanding high-quality audio compression and communication across wireless networks continues to grow. Although the consumer is increasingly demanding higher audio quality, devices such as portable media players and wireless headsets also demand low computational complexity, low power dissipation, and practical transmission bit-rates to help conserve battery life. This paper discusses research undertaken to lower the complexity of existing high-quality sub-band ADPCM coding schemes to better satisfy these conflicting criteria.
January 2009- This technology white paper introduces a new scheme for lossless audio compression called apt-X Lossless. This scheme has been conceived, designed, and developed by APTX, an audio processing technology company, the commercial originator of the apt-X low-latency audio codec, and a company with a long association with both the broadcast industry and the studio post-production business.
April 2009- This paper provides a look at the market of remanufactured toner cartridges and what environmental benefits are really achieved by using them. It is estimated that 300 million plastic toner cartridges are placed in landfills each year. At about 3 pounds per cartridge, this can equate to more than 450,000 tons of land filled plastic, steel, alumninum, rubber, foam, and other components. It is critical to review reuse and recycle opportunities. This paper explains what a recycled cartridge ...
September 2008- TV 2.0 is the evolution of the TV from just being able to offer video content from a single service provider to the ability for the TV to offer content from multiple service providers (CATV + Internet) and content and applications from the PC. In short TV 2.0 is the convergence of the PC, TV and Internet. The paper looks at consumer trends, what technologies are available and under development, and the advantages and disadvantages of these.
January 2008- Document scanning is generally a starting point for other automated business processes such as workflow, so delays in getting documents into the system can affect productivity throughout the enterprise. In service bureau environments, paying workers who are idle due to scanner downtime increases the cost-per-scan and compromises the already lean margins associated with this kind of business. Achieving maximum scanner uptime depends on a combination of hardware functionality and human factors. To increase overall scanner ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services