Git for the Enterprise - Promises and Pitfalls
Git is the world's leading DVCS (distributed version control system). Enterprise adoption for Git however has been slow. Concerned with security breaches, compliance violations and ......

Implications of Migrating to Windows Embedded Standard 7 (WES7) [ Source: VersaLogic Corp. ]
October 2010- This paper describes some of the differences between Windows Embedded Standard 7 (WES7) and Windows Embedded Standard 2009 (WES2009). WES7 is the next-generation offering in Microsoft's family of embedded operating systems. Specifically, WES7 is the successor to WES2009, which in turn was the successor to Windows XP Embedded (XPe). The goal is to provide OEM developers with a detailed understanding of the differences between the two embedded products in regards to building and deploying a fully functional ...
Secure Boot Requirements and Capabilities in Embedded Systems [ Source: CPU Technology ]
May 2010- The No. 1 vulnerability source in embedded processors is the initial boot phase of the device. Solutions to the problem of insecure boot processes vary enormously depending on the protection requirements of the system. Rather than relying on solutions based on product name, engineers will learn to make more informed decisions on how much end-system security they need, and match that to the various secure boot capabilities on the market, according to CPU Technology.
Building Smarter Products with Requirements Engineering [ Source: IBM ]
April 2010- Developing smarter products can be challenging; there are many benefits, however, including improving your customer's lives and helping drive your revenue goals. Managing successful smarter product projects hinges on adopting a requirements-driven development process — one that can help you prevent costly incompatibility failures, delayed product launches, and assist in managing complex, interdependent engineering tasks. Learn how in the Deliver smarter products with requirements engineering white paper.
Breaking The Flat File Barrier For Embedded Developers [ Source: ITTIA ]
November 2009- In this white paper, ITTIA notes that the demand for embedded devices is growing rapidly. Discover how embedded developers can break the performance, reliability, portability, and interoperability barriers of flat file formats through embedded database.
Benefits Of Embedded Database [ Source: ITTIA ]
May 2009- This white paper discusses the benefits of incorporating an embedded database into applications for embedded, intelligent, and mobile devices. An embedded database library is an inexpensive replacement for flat files that gives applications access to relational database features, such as transaction logging and indexed search, without the overhead of an enterprise database. Applications developed with an embedded database are scalable and protected from data loss by leveraging decades of data management expertise.
Performance Comparison -- ITTIA DB and SQLite [ Source: ITTIA ]
March 2010- ITTIA DB SQL is a lightweight database management system designed from the ground up to meet the requirements of embedded systems and devices. SQLite is an open source software library. This white paper examines the performance characteristics and technical capabilities of ITTIA DB and SQLite.
Secure Anchor Point [ Source: CPU Technology ]
December 2009- As the world computing infrastructure becomes likewise complicated, network and system communications have significant problems in identifying who to trust. Corporate and government personnel enter systems through a variety of methods: remote access, wireless PDAs, laptops via VPN from public access points. Establishing trust includes the identity of hardware and processor nodes, the identity and authenticity of software instructions, and the identity and authenticity of system users. Describing and categorizing all of the different types ...
Mobile Multiplayer Gaming, Part 3: Multiplayer Games With Bluetooth [ Source: Sun Microsystems ]
January 2008- The focus of the mobile gaming industry, centers on the wide-area wireless capabilities of mobile devices. The ability to connect to anywhere in the world is what defines the wireless computing revolution. But gaming is fundamentally a social phenomenon, and it makes sense that one would want to challenge players within earshot. This paper published by Sun Microsystems expose the raw potential that Java technology and Bluetooth bring to mobile gaming. It gives as basic ...
Transmission Control Scheme for Fast RFID Object Identification [ Source: ETH Zurich ]
January 2008- The scheme specifically addresses characteristics of the RFID domain such as the strong capture effect. It also makes no restrictive assumptions on channel traffic. Experimental evidence and simulation results are presented showing that the proposed transmission control scheme performs well in practice. The results indicate that the time it takes to identify a large tag population can be reduced significantly when compared to existing approaches.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite