- Secure Cloud Networking
- No Respect. CISOs Misunderstood and Underappreciated by their C-Level Peers
- Stepping into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud
- Stand Apart with SoftLayer
- Operational Intelligence from Wire Data to Run Electronic Trading Systems in the Now
November 2013- Today's fast-moving world makes DevOps essential for any business aspiring to be agile and lean in order to respond rapidly to changing customer and marketplace demands. This book helps you understand DevOps and how your organization can gain real business benefits from it. You'll also discover how a holistic view of DevOps that encompasses the entire software delivery life cycle - from ideation and the conception of new business capabilities to implementation in production - ...
If you've been involved with high-performance computing for any length of time, you've probably heard about accelerators. These are additional processing units that can take over some of the workload from your HPC system's main CPUs. Accelerators can be very cost effective. However, because these technologies are fairly new, not everyone fully understands their capabilities.
If your organization is considering deploying an HPC system with accelerator technology, this paper explains five things you ...
February 2013- The compiler you use can impact whether or not you achieve optimal performance from all parts of your systems. This whitepaper provides details on how IBM compilers are designed to unleash and exploit the full power of IBM Power processors.
As the amount of information we generate grows, and as our relationship with information grows more complex, there is a race to innovate new products and services to help us harness information, manage it, and tap into it more easily.
These new innovations allow us to connect more simply and effectively, when and how we like. This paper discusses these dynamics and explains how you can leverage technology to better capitalize on information ...
In a world where everything is mobile, connected, interactive, immediate, and fluid, organizations need an IT infrastructure that enables agile and rapid service delivery while driving out costs. That's exactly what is achieved with the HP Converged Infrastructure strategy and approach- enabling organizations to accelerate time to business value.
February 2011- This trade study shows not only a robust technique with modeling and SysML, but it also provides a methodology that enables users to properly explore the design space with executionanalysis—all from within the design model, something that was oftenmissing from previous techniques around trade study analysis.
January 2011- In this report, Forrester Consulting examines the total economic impact (TEI) and potential return-on-investment (ROI) that enterprises may realize by deploying IBM® Optim™ Solutions for Integrated Data Management. In conducting in-depth interviews with four existing customers, Forrester consultants found that these companies achieved tangible improvements in operational and capital cost efficiency, IT administration cost savings, increased data protection, as well as higher levels of end user productivity.
Agile software development techniques have taken the industry by storm, with 76 percent of organizations reporting that they had one or more agile projects under way. Agile is becoming widespread because it works — organizations are finding that agile project teams, when compared to traditional project teams, enjoy higher success rates, deliver higher quality, have greater levels of stakeholder satisfaction, provide better return on investment (ROI) and deliver systems to market sooner.
And Agile works ...
Drive quality earlier in the development process with continuous testing.
Large development organizations have increasingly been adopting select agile practices to enable faster development, create more reliable software, and reduce costs. Chief among these practices is providing developers early and frequent feedback from users, from other developers, and especially from the programming, build, and test tools. In the latter category, continuous integration and continuous testing are emerging as valuable techniques for ...
Although Microsoft Access can be used to create desktop applications, its Web development features are lacking. If an organization wants to port an existing Access application to the Web, typically its done in one of two ways:
* The organization can create a brand new Web-based application in Visual Studio. The server-side code would then use the .NET framework to read and write to and from the Access database. Note, however, that the Access ...
August 2009- OpenCL is a young technology, and, while a specification has been published, there are currently few documents that provide a basic introduction with examples, according to AMD. This article helps make OpenCL easier to understand and implement.
May 2010- Creating high-quality and effective user experience that set your killer app apart from the rest of the competition requires contributions to be made from application developers and graphics artists alike. While developers may have the coding credentials to write that great novel of an application, it is the graphics artists who have the brand awareness and media skills necessary to make that novel play on the silver screen as the major blockbuster motion picture you ...
Reaping the benefits of Agile software development beyond the team level is an enticing proposition. Based on documented successes, organizations are recognizing the business imperative to “go big” with Agile. This white paper introduces the Lean principle of Pull and applies it as a theme for prioritizing actions and practices within Agile Teams and Programs.
In this paper you will learn: The specific practices that adhere to the Pull discipline; Methods to keep ...
January 2009- This white paper examines the challenges of presenting products and projects in the renewable energy sector and introduces the many advantages of 3D visualization to help achieve your company’s commercial objectives.
November 2009- Learn how application virtualization reduces the costs, complexity, and time delays associated with application compatibility testing and management while maintaining endpoint security.
July 2009- The combination of Red Hat Enterprise Linux and Amazon EC2 changes the economics of computing by allowing customers to pay only for the infrastructure software services and capacity that they actually use. Red Hat Enterprise Linux for cloud computing makes it easy to develop, deploy, and manage your new and existing applications in a virtual computing environment. Compute capacity can be scaled up or down on demand to accommodate changing workloads and business requirements. Red ...
January 2008- This white paper of Association for Computing Machinery explains a novel algorithm for learning ranking models in document retrieval, referred to as AdaRank. In contrast to existing methods, AdaRank optimizes a loss function that is directly defined on the performance measures. It employs a boosting technique in ranking model learning. AdaRank offers several advantages: ease of implementation, theoretical soundness, efficiency in training, and high accuracy in ranking.
January 2008- Discussion on quality of spatial data is traditionally separated in different groups. Data quality mainly covers the observation process and the process of data manipulation. This research paper from Vienna University of Technology investigates the different types of decision processes and shows that processes of e-government must deal with a different type of quality than technological processes. Using the 5-tier ontology one can separate different levels and show how the different aspects of quality emerge ...
January 2008- Oracle Secure Enterprise Search (SES) is a product that enables one to find information within ones corporate intranet by keyword or contextual searches. To do this, it must first collect the content from diverse sources and text-index it. This paper looks at how Oracle Secure Enterprise Search (SES) handles such protected sources. This paper published by Oracle looks at the various ways that crawlers can access secure content on a network, and how Oracle ...
January 2008- The new Intel Itanium 2 processor with 6M L3 cache accelerates the momentum of the Intel Itanium 2 processor family. Platforms based on the Itanium 2 processor family are designed for the most demanding enterprise and technical applications and provide the IT infrastructure with a competitive advantage. The Itanium 2 processor with 6M L3 cache delivers new levels of compute-parallelism, scalability and reliability for Databases, Enterprise Resource Planning, Supply Chain Management, Business Intelligence and other data intensive applications, such ...
January 2008- Information in this paper published by Microsoft, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. The paper also covers general best practices, security, manageability, ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services