The Business Analyst's Guide to Hadoop
Rapidly emerging as a transformative technology framework for storing and processing massive amounts of structured and unstructured data, Apache Hadoop plays a central role in ......
Recognizing security defects early in the development cycle have traditionally posed real challenges for developers as current static analysis tools often generate significant false positive results and other major issues. Next generation tools address these issues by integrating static analysis as part of development teams’ normal ‘design, code, test and analysis’ processes. Download, “A Successful SAST Tool Implementation” to learn how these tools can:
Integrate with normal software engineering workflows
Accurately report ...
April 2013- Software security is a top priority for many organizations with many considering how they should integrate security earlier on in the software development lifecycle. A process change like this would benefit organizations in the form of reduction in costs and increased productivity as a result of minimizing flaws and removing defects via software patches. Download, “Enterprise Application Security: Source vs. Binary Code Analysis” to learn about the benefits of Source Code Analysis (SCA) and how ...
April 2013- This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.
March 2013- Enterprise IT departments are in the midst of radical, unprecedented levels of change. Of course, change is a constant when it comes to technology. But the transformations currently under way are comprehensive and revolutionary. And changes are occurring in a number of areas simultaneously, intensifying the pressure on IT managers and staff. On one front, virtualization and cloud computing are fundamentally altering enterprise IT infrastructure. It's no longer the norm to tie a particular piece ...
Developers are often reluctant to do reviews because they traditionally take the form of a heavy-weight, meeting-based process. Best Kept Secrets of Peer Code Review turns this notion upside-down and shows how to perform effective lightweight code review - which takes 1/5th of the time of more traditional, heavy-weight reviews.
In this ebook, you'll learn:
• Why some developers resist code review and how new tools change the game.
• The 5 ...
It's common sense that peer code review - in which software developers review each other's code before releasing software to QA - identifies bugs, encourages collaboration, and keeps code more maintainable.
But it's also clear that some code review techniques are inefficient and ineffective. The meetings often mandated by the review process take time and kill excitement. Strict process can stifle productivity, but lax process means no one knows whether reviews are effective ...
Tired of waiting weeks for IT changes to take place - new applications, new services, new processes? Read this technical paper to learn how to make your IT infrastructure agile.
Some of the best practices in this paper are:
Don't change the agile development process to fit into IT-change your IT strategy to better enable agile software development.
Trust your developers. Empower them with self-service environments.
Expect rapid changes ...
The current state of software configuration management (SCM) systems employed at medium and large corporations is often inadequate to support modern agile processes, reveals exclusive research from UBM Tech. Core challenges include code refactoring, cross-repository migration, improved branching and support.
SCM systems play an important supporting role in audit - and compliance - related tasks, but the UBM Tech research indicates that many corporations are lacking in this area. Added to this challenge ...
A seamlessly orchestrated order management system lets companies cross over from simply filling orders to effectively leveraging inventory, maximizing internal and external resources and keeping order promises, which keeps customers happy.
Achieving this level of efficiency is possible with concerted focus on three critical goals:
1. Become truly cross-channel.
2. Remain nimble in your order management process.
3. Leverage inventory across all channels and organizations.
Resources to ensure the quality of a software project are nearly always limited. In order to prioritize testing, reengineering, and bug fixing efforts, it is critical to be able to identify the potential risks within Java classes, methods, or projects. This paper discusses the Risk Metric, which objectively measures the risk of software as a function of two critical factors: code complexity and test coverage.
Knowing the risk metric values, Java development teams ...
April 2013- Read this whitepaper to learn about the 5 best practices for engineering performance management, and understand the do's and don'ts of metrics management, analytics and reporting in software development environments.
September 2012- Discover how federal agencies and the DoD can approach disaster recovery. Read the interactive eBook: "A Guide to Modern IT Disaster Recovery," to gain insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the data center.
Scale-out storage technologies have rapidly gained popularity over the past several years, successfully crossing the chasm from niche technology to mainstream enterprise solution. As this shift occurs, an increasing number of enterprises are seeking to understand the advantages of the newer technology when it comes to the storage of exploding amounts of unstructured data.
While many sources have investigated the advantages of scale-out storage from a technology perspective, few have taken on this ...
The pressure to achive in K-12 education has never been greater. Students are expected to learn more, teachers and administrators are expected to do more, and all of this has to be measured more, even while budgets are cut. This strategy guide explains how you can upgrade technology, standardize equipment and improve IT practices in your schol district.
This whitepaper is a rich media document, and includes IDC Analyst reasearch, multimedia content, solutions ...
November 2011- Today, success demands agility. If your IT staff spends all of their time worrying about security, uptime and capacity problems, they won't be working with you to drive innovation. This paper describes IBM Server Optimization and Integration services - Vmware server virtualization, a consulting-based solution that can help you determine the optimal placement of workloads within a VMware vSphere infrastructure deployment.
Open Source Software (OSS) is widely recognised as providing significant technology, innovation and business benefits to software development organisations, but it is not without associated challenges and risks.
In this complimentary whitepaper, we address the intellectual property (IP) risks that developers, development managers and c-level managers must take into account when developing and distributing software created with OSS. We also discuss a number of common myths surrounding OSS that keep developers up at ...
September 2011- New research from the International Technology Group demonstrates that the three-year operating and capital expenses for deployment and use of IBM XIV storage systems average 69 percent less than for EMC VMAX equivalents. These comparisons included financial services, government, health care, life sciences, manufacturing and telecommunications organizations with initial installed capacities of between 44 and 522 TB. Calculations allow for three-year capacity growth. Download now to read the detailed comparisons.
September 2011- Nearly everyone - developers to senior management - requires greater visibility into the development process. Read how how an IBM Rational solution can help your company build better software faster, using an integrated application lifecycle management solution designed to support collaboration across distributed agile development teams.
In July 2010, VMware commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying ThinApp.
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the ThinApp on their organizations. Forrester interviews with an existing customer and subsequent financial analysis found that the organization will experience the following benefits:
• Decreased application packaging time<...
Database migrations have always been complex, time-consuming, and costly due to proprietary data structures and data types, SQL extensions, and procedural languages. It can take up to several months to migrate a database, depending on database size, complexity, and usage of these proprietary features.
A new technology has recently emerged for solving this problem: the database compatibility layer[DCL], a database access layer that supports another database management system's (DBMS's) proprietary extensions natively, ...
May 2011- IBM's Watson - the computing system that competed with human contestants on Jeopardy! - illustrates how managing "Big Data" and applying analytics can help businesses gain meaningful insights
Effective governance for lean development isn?t about command and control. Instead, the focus is on enabling the right behaviors and practices through collaborative and supportive techniques. Scott Ambler and Per Kroll write how it is far more effective to motivate people to do the right thing than it is to force them to do so.
Learn how to form a lightweight, collaboration-based framework that reflects the realities of modern IT organizations.
December 2010- The challenge with free and open-source software (FOSS) is creating a balance between management controls and leveraging the high quality, secure, free and open-source code. Discover 10 tips to manage the use of free and open source software (FOSS) as part of your code strategy to drive innovation and lower costs.
March 2011- This white paper describes how IBM IT asset management solutions provide the visibility, control and automation to support asset management across the IT asset life cycle, including planning, acquisition, management and disposition of software, hardware and related licenses.
The planet is becoming more interconnected, instrumented and intelligent. All kinds of devices—from medical devices to the global positioning system (GPS) in your car to large-scale defense systems—rely on embedded software to interact with other systems and deliver an exceptional, differentiated user experience.
But as the marketplace increasingly demands embedded systems that deliver greater functionality, a smaller form factor, greater reliability, lower power and a lower cost of operation, the pressure ...
February 2011- Focusing on best practices that can deliver a positive return provides a way to separate practices that will deliver tangible business results from merely interesting ideas. Moreover, this paper will explore how you can further justify investments by potentially delivering savings that are bigger than the sum of the individual returns.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Social Business, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
More Software Resources
The Business Analyst's Guide to Hadoop