- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- Implementing SAP Security Solutions
- Analysis of Cybercrime Infrastructure
- The Human Factor: How Attacks Exploit People as the Weakest Link in Security
- Using Anomalies in Crash Reports to Detect Unknown Threats
November 2014- As technology advances and students remain on the cutting edge, colleges and universities have no choice but to keep up. While the changes in culture, strategy, and technology take some adjustment, the advances also ultimately benefit the institutions and their staff by improving efficiency, enhancing security, and bolstering management capabilities.
Healthcare organizations face three major IT security and compliance challenges:
Regulations such as HIPAA are getting stricter and enforcement actions are becoming more common and costly.
Hackers and criminal syndicates are targeting healthcare organizations with new forms of intrusive IT attacks that steal valuable data.
As in other industries, healthcare is undergoing an IT revolution enabled by consumer-class mobile devices like iPads and Android phones. While smartphones and tablets give healthcare ...
March 2012- To make networks service-aware and make BYOD with Apple devices a native part of every network, Aerohive has built a Bonjour Gateway to manage and control Apple service availability (such as AirPrintTM, AirPlay, file sharing, collaboration applications, etc.) across an entire enterprise network.
The iPhone’s popularity has generated high demand for enterprise use. But before widespread adoption takes place, IT departments must solve specific security and management issues to maintain control and ensure compliance.
Watch this video to learn how Sybase can help integrate the iPhone into your enterprise while meeting everyone’s needs.
Apple's iPad is being launched as a consumer device. Yet, there is little doubt that it will become a valuable enterprise productivity tool. IT departments should consider iPad when planning strategies and policies to ensure corporate information stays managed and secured.
Join Sybase for this on-demand webcast and learn:
•?What studies are indicating about the use of iPad in the enterprise
•?How IT can provide employees with the flexibility ...
You can’t avoid it any longer: Developing a strategy for managing and securing employees’ personal mobile devices. iPhone and Google Android devices are joining BlackBerry, Symbian and Windows Mobile smartphones in the workplace, and their numbers are only increasing. Regardless of whether corporate policy allows them, workers are still bringing their personal devices into the office.
According to a recent Forrester Research report, almost half of U.S. and European businesses surveyed ...
Apple's iPad is being launched as a consumer device. Yet, there is little doubt that it will become a valuable enterprise productivity tool.
IT departments should consider iPad when planning strategies and policies to ensure corporate information stays managed and secured.
Join Sybase for this on-demand webcast and learn:
• What studies are indicating about the use of iPad in the enterprise
• How IT can provide employees with ...
May 2008- Are iPhones ready for business? Some never thought iPhones would make it for personal use. Now Range Networks profiles iPhones and their business capabilities in this presentation.
April 2008- Organizations of all sizes/industries are susceptible to data leakage. Removable devices provide an easy way to transfer data. Lumension provides this presentation to help you enforce user and data controls and audit activity.
November 2007- This paper outlines the reasons and provides guidance for developing a legacy modernization strategy. We will discuss the choices to be made and outline the key steps involved in creating this strategy. Along the way, we examine real-life modernization stories. Because we focus on the impact of legacy modernization on business rather than on the technical implementation, no detailed technical knowledge is required.
May 2008- When was the last time you were involved with a business application that was delivered on time, on budget and with all the features needed to compete successfully in the market? If you answered; "Never" or "Not lately" you’re not alone. The sad truth is that the majority of these projects, large and small, spin out of control and often crash. And the cause is almost always this: business cannot quickly, effectively communicate their ...
April 2008- This whitepaper compares Kleer technology to Bluetooth technology for the application of wireless streaming audio. Bluetooth is a standard for relatively short-range general-purpose data communications. Bluetooth has found initial market success in wireless voice headsets for mobile phones and is now trying to address stereo audio for mobile phones and portable audio players. Bluetooth solutions suffer from poor audio quality due to the use of lossy audio compression, poor ISM (2.4GHz) band coexistence performance in ...
January 2008- The Apple iPhone was released to much fanfare on June 28, 2007. Because of the large amount of personal information stored on these mobile devices, the authors decided to conduct a security analysis of the iPhone. The iPhones applications for surfing the web and checking emails are potentially at risk to remote attacks. This paper examines exactly how well the software on the iPhone is designed to resist such attacks.
January 2008- The Apple Inc. iPhone is the definition of a convergence device. It has the ability to play back music and videos on its 3.5 inch display, a unique ability for video/image displays to automatically flip between landscape and portrait views when the device is rotated, special software that makes finger-based scrolling easier, a Safari Web browser that shows Web sites in their standard format, and more options for users to access and listen to voice ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services