Transitioning to Multicore Development
As you think about your application in the context of new multicore systems you may wonder: What does it mean to transition my application to ......
Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access to corporate data resources, protecting these critical resources and platforms should be at the top of virtually IT decision maker's "must-do" list.
Access controls that define a specific set of user privileges are well accepted as a security best practice. Why, then, are these same principles so rarely applied to the most sensitive access of all: administrative accounts?
In this ENTERPRISE MANAGEMENT ASSOCIATES® report, you’ll discover common excuses given to justify this oversight. You’ll then see how modern privileged account management solutions provide the control and monitoring capabilities needed to bring privileged access ...
October 2012- This report outlines Forrester's future look for mobile security and operations. This report is designed to help security and risk (S&R) and infrastructure and operations (I&O) executives understand and navigate the major business and IT trends that will affect the development of a future-proof mobile support strategy.
October 2012- Get the most up-to-date view of the IT security threat landscape from the experts at ESET. This monthly threat report is required reading for anyone involved with IT Security.
October 2012- The cloud is supposed to be a "cure-all", but it also creates numerous new security issues for SMBs. Download this techbrief for 7 tips you must have before you commit to any service!
Learn how you build a secure network and growth-ready network that is as agile as your business. With a growth-ready network, small business can put new technologies to work on their schedule - and the rapid pace of doing business in the Internet age will never be too fast.
Sponsored by: HP and Intel®
This white paper reviews the impact of cloud computing on data center networks and describes HP's approach to building simpler, more secure and automated networks that fully meet the stringent performance, security, reliability and agility demands of the new data center in the Cloud.
"It may just seem like DDoS attacks don't exist at all." Find out why Tier1 Research gives the thumbs-up to SiteProtect-Neustar's cloud-based DDoS mitigation solution. Get a knowledgeable third party's take on the benefits of stopping attacks in the cloud, far away from key infrastructure.
Discover why T1R likes SiteProtect's cost-effectiveness, along with the flexibility its on-demand service affords. See what Tier1's expert analyst says about Neustar's 10+ years of DDoS mitigation ...
November 2011- How are technology leaders adapting to the change and complexity that mark today's economic landscape? Read this white paper to identify the 4 patterns, or mandates, employed by CIOs when leveraging business and information technology to innovate. Learn how each pattern indicated a distinct approach to IT leadership, and are derived from specific organizational needs.
2011 anti-spam email security whitepaper. Today's enterprise anti-spam solutions typically deliver 95% effectiveness. Unfortunately, that's not good enough. A border-line attack that gets through a 5% gap in defenses could cost your organization millions of dollars in terms of lost business, exposure to privacy threats, and brand loyalty.
Recent attacks show that spammers and scammers are determined to find their way through any gap, however slight, in an enterprise's defenses. They're exploiting a variety of tactics ...
February 2011- On a smarter planet, intelligence is infused into the products,systems and processes that comprise the modern world. Theseinclude the delivery of services; the development, manufactur-ing, buying and selling of physical goods; and the way peopleactually work and live. Nowhere may this transformation bemore evident than in the creation of smarter products.
Infusing intelligence into the way cities work. The interconnected nature of people, resources and environments is driving a revolution in how and where people live. By 2050, city dwellers are expected to make up 70 percent of the Earth’s total population1—or 6.4 billion people—equal to adding seven New York’s to the planet annually.
To attract the best and brightest citizens and businesses, which bring the flow of economic capital, cities must compete ...
Your business is challenged with meeting the demand for continuous availability while also effectively managing enormous amounts of information that continue to grow, much of it online, and often with no offline option for conducting business. When your systems are down, you risk more than loss of revenue and productivity: you jeopardize business-critical data as well as damage to your brand.
Read this IBM white paper to learn how to develop a cost-effective ...
November 2010- The ITIC 2009 Global Server Hardware and Server OS Reliability Survey polled C-level executives and IT managers at 400 corporations from 20 countries worldwide. IBM AIX UNIX running on the Power or P series servers scored the highest reliability ratings among 15 different server OS platforms, including Linux, Mac OS X, UNIX and Windows.
January 2010- More and more companies are relying on Web-based applications to provide online services to their employees, to support e-commerce sales and to leverage portals. All of these applications are designed to help staff better communicate with customers, partners and suppliers. However, as the number and complexity of Web applications have grown, so have the associated security risks. With increasing frequency, incidents of Web application breaches resulting in data theft are popping up as front-page news. ...
August 2010- As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
May 2010- The No. 1 vulnerability source in embedded processors is the initial boot phase of the device. Solutions to the problem of insecure boot processes vary enormously depending on the protection requirements of the system. Rather than relying on solutions based on product name, engineers will learn to make more informed decisions on how much end-system security they need, and match that to the various secure boot capabilities on the market, according to CPU Technology.
May 2010- A toughening regulatory climate has made the process of exporting defense articles more challenging. Earlier this year, Secretary of Defense Robert Gates announced initiatives to overhaul export control laws to more effectively manage technology export, but the initiatives will take time to implement. The simplest approach to enabling your system for foreign military sales is a primary design with an Acalis Secure Processor, and a disciplined approach to isolating CPI algorithms and operations to the ...
June 2010- This is a new approach to tokenize data that eliminates challenges associated with standard centralized tokenization. Particularly in high-volume operations, the usual way of generating tokens is prone to issues that impact the availability and performance of the data. From a security standpoint, it is critical to address the issue of collisions caused when tokenization solutions assign the same token to two separate pieces of data. This next-generation tokenization solution addresses all of these issues. ...
May 2010- The white paper was authored by Marsel Nizam, head of Web security development at Bitrix and supervisor of the development of the PRO+PRO security framework undergirding the company’s flagship products. The white paper helps decision-makers understand modern Web-borne threats and ways to secure Web assets by selecting proper Web content management solution.
May 2010- Acceptic provides this report on how to make relations with IT providers more safe and reliable and at the same time profitable enough. A way to provide a win-win outsourcing strategy may be found in agile dedicated development teams, according to the company.
These days, most business is no longer done in the traditional office. It's being done wherever you interact with customers or your employees are located. This presents an opportunity for you to gain a key advantage by having your critical information and applications available, when and where your users need them, so they can make better, more informed decisions and take decisive actions.
In this informative and entertaining Dummies Guide, you can learn ...
April 2010- It is clear that today’s cybercriminals are more sophisticated than ever in their operations and their attacks, and that they are always on the lookout for new ways to exploit vulnerabilities in the global payments system. According to the 2009 Verizon Business Data Breach Investigations Report , 285 million consumer records were compromised in 2008—more than the previous four years combined. Data breach statistics from 2009 are expected to be even more grim due to the growth of ...
Did you know that most code reviews are conducted in an ad hoc fashion, don’t always include the right people, and fail to take advantage of the latest tools and technology? That’s according to new research that looks at the state of peer code review today.
The exclusive study commissioned by Klocwork and conducted by Forrester Consulting provides valuable data and insights that will help you benchmark and improve your peer ...
You can’t avoid it any longer: Developing a strategy for managing and securing employees’ personal mobile devices. iPhone and Google Android devices are joining BlackBerry, Symbian and Windows Mobile smartphones in the workplace, and their numbers are only increasing. Regardless of whether corporate policy allows them, workers are still bringing their personal devices into the office.
According to a recent Forrester Research report, almost half of U.S. and European businesses surveyed ...
January 2010- This article performs a comprehensive analysis of Axigen Identity Confirmation -- a challenge/response-based anti-spam system embedded in the Axigen solution. It is a pertinent presentation of the concept, characteristics and benefits entailed by identity confirmation in the context of the overall existing challenge/response anti-spam filtering technology and the way it has been, until now, approached and made available to the general public.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Social Business, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
More Development Resources
Transitioning to Multicore Development