January 2009- As software development has gone decisively global, IT focus has shifted from software tools and techniques to the processes by which software is developed. One key to greater efficiency in process execution is strong software configuration management (SCM). Strong SCM requires a bulletproof multi-site solution, to ensure that changes anywhere in the world are propagated without delay or loss of source code. Multi-site solutions broadly fall into three categories, in order of least to most ...
August 2009- This article discusses the value of carefully examining an organization's information management needs long term, and the value careful process analysis and a true content management and business process management solution offer over fast and cheap ECM. The paper also discusses the importance of carefully examining an organization's long-term information management needs and the value of a true content and business process management solution over a cheap mock solution. Document and process analysis, file indexing, ...
October 2008- In January 2006, Coverity was awarded a contract from the U.S. Department of Homeland Security as part of the agency’s Open Source Hardening Project, designed to improve the security and quality of open source software. As part of this project, Coverity Prevent, a static analysis tool, was made available to open source software projects via the Scan web site. Through the Scan site, open source developers can retrieve the defects identified by Prevent analyses ...
June 2009- With the proliferation of Microsoft Sharepoint deployments, what are the alternatives in the enterprise content management space? Organizations are concerned about security, scalability, and Web 2.0 functionality. Two alternatives to Sharepoint, built with Java, are profiled by EMC Consulting.
March 2009- In this 15-page white paper, Riverace helps you decide if professional or free assistance is best for you. If you think professional assistance is more valuable, ask eight important questions before selecting a commercial ACE support service provider as a partner for your project's success.
May 2009- In the latest SPECweb2005 benchmark, Red Hat Enterprise Linux 5.3 running on a HP Proliant DL380 G6 achieved the best SPECweb2005 result to date, with a score of 71,045. SPECweb2005 is a software benchmark product developed by the Standard Performance Evaluation Corporation (SPEC), a non-profit group of computer vendors, system integrators, universities, research organizations, publishers, and consultants. It is designed to measure a system's ability to act as a Web server servicing static and dynamic page requests.
May 2009- In thorough testing, SAP has affirmed that Red Hat Enterprise Linux (RHEL) Virtualization is ready for production use with SAP. It scales well, with close to linear performance, handles 100 percent oversubscription, and uses the available I/O bandwidth extremely well.
May 2009- Change the economics of computing by paying only for the infrastructure software services and capacity that you actually use. Red Hat Enterprise Linux for cloud computing makes it easy to develop, deploy, and manage your new and existing applications in a virtual computing environment. You can increase or decrease capacity within minutes, removing the need to over-buy capacity to handle periodic spikes in demand.
May 2009- The value proposition of low-cost, high-return open source solutions resonates now more than ever. Indeed, the high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions to carve costs out of their IT infrastructures.
January 2009- An estimated 25,000+ stable and actively developed open source projects are in existence today. Having moved beyond the realms of academia and research projects into the mainstream world, numerous businesses now look at open source as a viable option for leveraging best-of-breed solutions, lowering costs, and increasing profitability. Despite the simplicity behind the concept, using open source has become increasingly difficult.
March 2009- Companies are investigating cloud computing and SaaS offerings as a way to cut IT costs. But most companies will not adopt such solutions for fear of losing control over their data or worse, getting stuck with expensive and endless vendor lock-in. By using open source/open architecture SaaS solutions, you can enjoy the benefits of lowered upfront IT costs, and retain control over your data while mitigating the risks of vendor lock-in.
February 2008- Clearing firms are continually seeking to leverage technology to enhance their service offering and reduce costs. Arius OpenAdvantage enables clearing firms to offer efficient account opening services as a competitive differentiator, increasing correspondent retention and building correspondent loyalty.
December 2008- In this white paper, we attempt to explore various design approaches to implement a SAAS application using JBoss as the portal vendor. JBoss Portal is a very popular open source portal offering from Red Hat. It is JSR-168 compliant and provides support for deployment in a clustered environment with high availability.
July 2008- The primary objective of this paper is to evaluate strength and weakness of leading Open Source Portals and provide comparative analysis and recommendation. If you find it difficult to decide and strategize your portal solution for your organization, a new class of open source portal technology products may be the solution you are looking for. This new breed of technology is emerging into the corporate IT world as a viable and cost effective solution to ...
March 2008- Nortel discusses open source in this presentation. What is the expectation level of PBX open source software? Which products use open source PBX software? What are the technical challenges of open source PBX deployment? Nortel addresses these questions and many more.
March 2008- Open-source PBX software has growing appeal among smaller implementations. Now the big challenge for PBX vendors is how to drive interest at the enterprise level.
July 2008- If you find it difficult to decide the upon the "right fit" solution for your organization, a new class of open source portal technology products may be the solution you are looking for. This new breed of technology is emerging into the corporate IT world as a viable and cost-effective solution to the competition put up by the mainstream portals offered by leading software solution vendors. The primary objective of this paper is to evaluate ...
January 2009- Creating software through open collaboration and collective intelligence isn't a novelty; it's now a mature strategy for cutting development costs and fueling innovation. Learn about new tools and approaches for harnessing open source best practices in the enterprise.
Have your capital budgets been cut, but your demands for enterprise caliber solutions have only increased? Do you want to lower your database TCO while maintaining the business critical capability not offered by other open source technology vendors?
Up until now, when it comes to databases, companies have had a choice. They could pay outrageous fees to build applications using proprietary databases. Or, they could use open source tools to save money, but ...
October 2008- Almost everyone agrees that making BI technology accessible to all relevant functions in operations is important. However, organizations today still struggle to expand BI. Software appliances that implement open source software potentially enable organizations to lower the total cost of ownership (TCO) of BI and reduce the complexity of installation, configuration and maintenance, thus making it possible for more to have direct access to the BI technology. This whitepaper shows how open source appliances meet ...
August 2008- Modeling business processes for SOA and developing end-to-end IT support has become one of the top IT priorities. The SOA approach is based on services and on processes. Processes are focused on composition of services and in that sense services become process activities.
September 2008- Software security in general, and application security specifically, is a significant element of compliance with the laws, regulations, and policies that govern most organizations and their proprietary data. Weak software security can represent, for example, a significant control deficiency in terms of compliance with the Sarbanes-Oxley Act, the Payment Card Industry Data Security Standard, among others. Different teams within an organization have responsibilities for ensuring the security of web and software applications – from engineering teams ...
August 2008- A customer revolution in service-oriented architecture (SOA) and service-oriented infrastructure (SOI), combined with ever more complex business needs, has driven customers to a multi-sourced middleware component architecture. As these market mechanics have evolved over the last decade, the middleware market is moving from single-sourced, tightly-coupled, vertically integrated middleware, to multi-sourced, loosely-coupled, vertically aware application and middleware stacks.
December 2007- This white paper will show you the 10 most common errors developers make when programming Sockets – especially Winsock run time errors! -- and how you can avoid them.
August 2008- Sangoma's SMG (Signaling and Media Gateway)-based BRI cards take advantage of a mature, open-source VoIP technology and offer a carrier-grade approach for enterprises.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services