Git for the Enterprise - Promises and Pitfalls
Git is the world's leading DVCS (distributed version control system). Enterprise adoption for Git however has been slow. Concerned with security breaches, compliance violations and ......

Expanding Web Single Sign-On to Cloud and Mobile [ Source: CA Technologies ]
October 2012- Discover how organizations are protecting larger and larger volumes of sensitive data while still allowing users to easily conduct business.
Big Data Analytics Guide 2012 [ Source: SAP ]
October 2012- What's the big deal with Big Data? Today, organizations of all types and sizes are inundated with enormous data sets from various internal and external sources-from transactional data to unstructured data from social media and other sources. Organizations can struggle to get ahead of-or out from under-the increasing piles of data flooding into their businesses, or they can use innovative new technologies to leverage the data to gain competitive advantage, fight fraud, ease regulatory compliance, ...
Edison: Competitive Management Cost Study: IBM Storwize V7000 vs. EMC VNX5500 Storage Systems [ Source: IBM ]
September 2012-
As it has been the trend over the last decade, organizations must continue to deal with growing data storage requirements with the same or less resources. The growing adoption of storage-as-a-service, business intelligence, and big data results in ever more Service Level Agreements that are difficult to fulfill without IT administrators spending ever longer hours in the data center.
Many organizations now expect their capital expense growth for storage to be unstoppable, and ...
Gaining Security Intelligence Splunk App for Enterprise Security [ Source: Splunk ]
September 2012-
Learn how security professionals are extending the use of Splunk with the Splunk App for Enterprise Security. This document describes how you can take full advantage of Splunk's analytics and visualization capabilities and unique ability to process big data.
With the ability to search and process known and unknown threats, you can use Splunk as your primary security data interface. Splunk and the App for Enterprise Security are equally suitable for a small ...
IDG Tech Dossier: A Faster Path to Client Virtualization [ Source: HP/Intel® ]
September 2012-
Client virtualization encapsulates a user's desktop including operating system, applications, data and personalization-and stores it in the data center, rather than on the end-point device.
This has several advantages. The desktop is stored and maintained centrally, so it's much easier to manage, maintain and support. It's not tied to a particular computer, so it can be accessed from different devices. And the end-point device stores neither desktop nor data, so the security danger ...
Break the "Add More Nodes" Cycle IBM Netezza data warehouse appliances allow your data infrastructure to scale [ Source: IBM ]
January 2012-
In today's challenging and fast-paced economy, time is of the essence: organizations need answers immediately and can no longer wait for deep analytic queries to run in hours, or even days.
This whitepaper explores the reasons so many customers have begun to incorporate high-performance, IBM Netezza data warehouse appliances into their existing Teradata infrastructures and the performance and scalability benefits this approach has provided.
Big Data Analytics [ Source: SAP ]
December 2011- Big Data is leading to Big Challenges for many organizations today. Getting a solid understanding of big data analytics - including business and technology drivers - and learning the lessons of successful use cases can make the difference to those organizations seeking the right solution going forward. Learn more by downloading the newly published TDWI Big Data Analytics Report.
Value-driven quality management for complex systems: Six strategies for reducing cost and risk [ Source: IBM ]
February 2011- Focusing on best practices that can deliver a positive return provides a way to separate practices that will deliver tangible business results from merely interesting ideas. Moreover, this paper will explore how you can further justify investments by potentially delivering savings that are bigger than the sum of the individual returns.
Building smarter products with IBM Integrated Product Management [ Source: IBM ]
February 2011-
Building smarter prodcuts with Integrated Product Management. Turning product development into competitive advantage. Whether you operate in the automotive, aerospace, telecommunications or electronics marketplace, business trends dicatate that you need to deliver innovative products that incorporate advances in software, electronics and hardware to deliver a customizable experience to users.
The key to creating this new class of offerings is to elevate software development to a strategic business process while leveraging advanced modeling capabilities ...
Four key strategies for enabling innovation in the age of smart [ Source: IBM ]
February 2011- On a smarter planet, intelligence is infused into the products,systems and processes that comprise the modern world. Theseinclude the delivery of services; the development, manufactur-ing, buying and selling of physical goods; and the way peopleactually work and live. Nowhere may this transformation bemore evident than in the creation of smarter products.
Estimating the Complexity of Your Microsoft Access Project [ Source: OpenGate Software Inc ]
December 2009- Microsoft Access is a leading desktop database application. With MS Access readily available on many PCs at work, a large number of prospective users try their hand at creating an Access database application to improve their group's productivity and minimize information errors often caused by maintaining data in spreadsheets. While Microsoft made many improvements in Access 2007 to simplify database creation, there is still much to learn when developing an Access database project. This brief paper ...
Breaking The Flat File Barrier For Embedded Developers [ Source: ITTIA ]
November 2009- In this white paper, ITTIA notes that the demand for embedded devices is growing rapidly. Discover how embedded developers can break the performance, reliability, portability, and interoperability barriers of flat file formats through embedded database.
Benefits Of Embedded Database [ Source: ITTIA ]
May 2009- This white paper discusses the benefits of incorporating an embedded database into applications for embedded, intelligent, and mobile devices. An embedded database library is an inexpensive replacement for flat files that gives applications access to relational database features, such as transaction logging and indexed search, without the overhead of an enterprise database. Applications developed with an embedded database are scalable and protected from data loss by leveraging decades of data management expertise.
Performance Comparison -- ITTIA DB and SQLite [ Source: ITTIA ]
March 2010- ITTIA DB SQL is a lightweight database management system designed from the ground up to meet the requirements of embedded systems and devices. SQLite is an open source software library. This white paper examines the performance characteristics and technical capabilities of ITTIA DB and SQLite.
The Business Intelligence Conundrum [ Source: Stonefield Query ]
January 2009- You’ve created a great database application. It has an easy to use and intuitive user interface. All of the information that anyone could hope for is being stored in the database. Yet, your users still aren’t happy. Why? In a recent survey one of the world’s largest accounting and CRM software manufacturers asked their customers "What if anything would you like to see us improve in our applications?" Over 50% of the respondents ...
Novell ZENworks Application Virtualization [ Source: Novell ]
November 2009- Novell ZENworks Application Virtualization allows you to quickly package Windows applications in virtual containers and run them on any Windows workstation. Learn how ZENworks Application Virtualization eliminates conflicts between applications and allows you to securely run virtualized applications from a wide variety of different media.
Quality of Spatial Data for e-Government From an Ontological View [ Source: Vienna University of Technology ]
January 2008- Discussion on quality of spatial data is traditionally separated in different groups. Data quality mainly covers the observation process and the process of data manipulation. This research paper from Vienna University of Technology investigates the different types of decision processes and shows that processes of e-government must deal with a different type of quality than technological processes. Using the 5-tier ontology one can separate different levels and show how the different aspects of quality emerge ...
Secure Searching With Oracle Secure Enterprise Search [ Source: Oracle ]
January 2008- Oracle Secure Enterprise Search (SES) is a product that enables one to find information within ones corporate intranet by keyword or contextual searches. To do this, it must first collect the content from diverse sources and text-index it. This paper looks at how Oracle Secure Enterprise Search (SES) handles such protected sources. This paper published by Oracle looks at the various ways that crawlers can access secure content on a network, and how Oracle ...
How to Best Leverage J2EE, Struts, and ADF in Your Portal [ Source: Oracle ]
January 2008- The Oracle Portal Developer Kit (PDK) enables one to develop portlets in many different technologies using Web services, Java (J2EE), XML, Struts, and PL/SQL. The PDK also provides the option to build these portlets using Oracles APIs or the new portlet standard APIs OASIS/WSRP and JSR 168. This paper discusses when to leverage the declarative features for building portlets and when to build custom portlets. This paper also discusses how to quickly ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite