Hotspots: Exploring The Opportunities
[ Source: Verax Systems ]
May 2010- Verax Systems details the possibilities of hotspots in this white paper. The company discusses how the proper management of hotspots can be a source of additional revenue, market research, or a medium to display information such as advertisements.
Developing Multilingual J2EE Web Applications Using Oracle JDeveloper 10g
[ Source: HP ]
January 2008- The Java 2 Platform Enterprise Edition, or J2EE as its commonly known, consists of a set of coordinated specifications and practices providing solutions for developing, testing, localizing, deploying, and managing multi-tier server-centric applications. This paper from Oracle summarizes the process of creating multilingual J2EE Web Applications with Oracle JDeveloper 10g, focusing on Oracles ADF application development framework. This paper published by HP examines Java Server Pages (JSP) and Java Standard Tag Library (...
Service-Oriented Architecture (SOA) Vs. Component Based Architecture
[ Source: Vienna University of Technology ]
January 2008- An exact differentiation between Service oriented architecture and component based architecture is hard to make, because opinions on what ""SOA"" exactly is and how it will develop differ. If SOA is seen as a new type of architecture that defines the how-to of assigning interfaces in a servicing way so that these services can be used in a context free way, it doesnt differ significantly from existing component based frameworks like Enterprise JavaBeans.
Remote Files Sharing by Windows Or Samba Over SSH tunnel
[ Source: NuSphere , Inc. ]
June 2007- The problem of providing remote access to files is nothing new, but the implementation of the solution often also determines reliability, safety and productivity. If you are not comfortable with the security of your data (files content, passwords etc.) sent by Windows SMB or Unix Samba over the networks, the encrypted SSH (the Secure Shell) could be your panacea. Another reason to use SSH is its widespread implementation and reliability. Finally, there are situations when ...
Driving Organizational Change with Social and Collaborative Technologies
[ Source: Interop ]
May 2011- Organizations are investing in Enterprise 2.0 as a means to improve employee engagement, collaboration, and knowledge sharing. While social tools can play a critical role, driving organizational change requires IT strategists to look beyond technology deployment. This session will help IT architecture and infrastructure personnel understand E2.0 adoption issues, the role of change management, and alignment of social tools with strategic business initiatives.
How Does Ping Really Work?
[ Source: Global Knowledge ]
October 2006- Ping is a basic Internet program that most of us use daily, but did you ever stop to wonder how it really worked? I don't know about you, but it bugs me when I do not know how something really works. The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level. If you do not happen to be a programmer, ...
SAS Information Map Studio and SAS Web Report Studio - A Tutorial
[ Source: SAS Institute ]
January 2008- This white paper from SAS Institute delivers examples of functionality from within SAS Information Map Studio and SAS Web Report Studio in a manner that is easy to follow and replicate. This tool serves as single place that business rules are applied and made available to business users throughout the enterprise. SAS Web Report Studio is a web based ad hoc reporting application that utilizes the business logic contained within Information Maps that are created ...
Oracle Forms 10g - Forms Look and Feel
[ Source: Oracle ]
January 2008- Oracle Forms application have traditionally behaved as, and looked like, desktop applications. When Oracle Forms applications were Web deployed, they still gave the user the feel of the desktop. This has been one of the strong plus points for businesses looking to evolve their applications seamlessly to the Web. This paper from Oracle discusses the use a number of look and feel tools, namely a PL/SQL library (laf.pll) and a set of Java ...
SAS Information Delivery Portal - A Tutorial
[ Source: SAS Institute ]
January 2008- The aim of this paper is to give examples of functionality from within SAS Information Delivery Portal in a manner that is easy to follow and replicate. Access data from throughout ones organization via a single set of web interfaces. With the ability to author reports, view reports, execute stored processes, apply report level or data level security, deploy custom portlets utilizing the WIK API, and personalize user experience, the SAS Information Delivery Portal ...
Effective Social Media Strategy Wields Clout in Telecom Industry
[ Source: Calysto Communications ]
May 2009- Social media has become an integral part of a company's marketing and public relations strategy. This whitepaper offers information about how to implement an effective social media PR and marketing strategy.
Wikibility of Innovation Oriented Workplaces - The CERN Case
[ Source: Web 2.0 Expo ]
June 2008- Presentation "Wikibility of Innovation Oriented Workplaces - The CERN Case"
Service Mediation: The Role of an Enterprise Service Bus in an SOA
[ Source: TIBCO Software ]
January 2008- An Enterprise Service Bus (ESB) is a distributed, message-based integration solution based on open standards. The role of an ESB is to facilitate reliable communications between IT resources such as applications, platforms and services that are distributed in multiple systems throughout an enterprise. As IT departments increasingly focus on designing SOAs to lower development costs and increase business agility, ESBs are a key first step in setting up an enterprise SOA. ESBs form the foundation ...
Need to Cut Costs? Improve the Web Site Experience
[ Source: Tealeaf ]
March 2009- In this December 2008 report, Forrester Research outlines how Web usability plays a key part in eliminating unnecessary sales and service costs. Forrester outlines a simple model for the cost savings that making Web usability improvements can provide.
Improving Web Site usability can eliminate unnecessary sales and service costs. Download the report and discover the potential savings for your organization, use a modifiable ROI model to estimate the potential cost savings you can generate ...
[ Source: Satyam Computer Services Ltd ]
August 2008- The world wide web has been evolving since its creation in 1989 by Sir Tim Berners-Lee. This paper tries to depict the current state of the web as well as advances made, and the technologies and standards that are the drivers behind this evolution. It also tries to give a perspective of how the web will be, in future, and dwells on the visibility/sustainability of new technologies in future.
State of Internet Security: Protecting the Perimeter
[ Source: Webroot ]
October 2008- Protecting the Perimeter is quickly becoming a critical point of protection for today’s business. Many fundamental business activities - marketing, advertising, customer support, research - are Web dependent. Making the Web the number one delivery method for malware which poses a significant security challenge to businesses of all sizes.
In this State of the Internet Security Webroot delivers the results of its survey of Web security decision makers in the US, UK, ...
Atigeo Makes Social Profile Portable, Meaningful
[ Source: TechWeb ]
October 2009- Atigeo is beta testing a service that will let you make your social profile both portable and more meaningful by giving the profile owner control over its contents and outcomes.
Mindtouch: A Wiki-cum-CMS-cum-Mashup Platform, On Steroids
[ Source: TechWeb ]
April 2009- Although Mindtouch CEO Aaron Fulkerson does a good job listing the major points that his company's namesake product (available as a service too) touches on in this reviewcam, it's also one of those products that's difficult to describe.
Securing the Web in your Company: Proven Strategies Revealed
[ Source: Trend Micro ]
February 2010- The Internet and growing use of Web 2.0 applications have left organizations more vulnerable to attack than ever before. From smartphones to Twitter and Skype, the Internet has opened the floodgates to increasingly sophisticated exploits by hackers and cybercriminals. Coupled with the deployment of less-robust web-focused defenses, the result is web exploits that will increase for the foreseeable future.
This thorough, highly readable paper explains the latest threats from the web and the most ...
Moving Business Communication to the Cloud
[ Source: eFax Corporate ]
February 2013- Cost, clutter and loss of productivity associated with traditional faxing are just a few of the problems facing companies that still use a fax machine today. Fortunately, there are several ways to tackle the traditional fax problem without spending big money.
Thanks to cloud technology, receiving or sending a fax can be as easy as the click of a mouse. After all, you don't expect your employees to go to the printer to ...
The Case for Universal Search
[ Source: Google ]
November 2008- With an estimated 40% of the world’s information residing behind a firewall, the value of enterprise search is increasingly evident. Research has shown that knowledge workers can spend up to 25% of their work time just looking for information, and 40% of employees report that they cannot find the information they need to do their jobs. To be productive, employees need to be able to quickly find key information across your organization no matter who created it ...
The Internet of Things Supply Chain
[ Source: GT Nexus ]
December 2014- Imagine a world where physical objects exchange knowledge and cooperate together like teammates to achieve unparalleled business efficiency. From textile looms to shipping pallets to store shelves, everything in the supply chain would sync, automatically, to optimize operations.
The Internet of Things is bringing about that world at a furious pace—very soon over 26 billion devices of all shapes and sizes will be connected to the Internet. Retailers and manufacturers will face ...
Governance, Risk and Compliance Software - Maintain Your IT Budget with Consistent Compliance Practices
[ Source: Dell Software ]
January 2015- Governance, Risk and Compliance (GRC) software can help state and local governments move from a reactive to a proactive stance with their IT systems. It lets them answer the question, "How long since your last...?" with a comforting "less than an hour ago." Read this third-party report to learn about the attitudes of state and local government agencies toward GRC software, and see which features they rank as most critical when selecting a tool.
Best Practices Guide for IT Governance & Compliance
[ Source: Dell Software ]
January 2015- Federal regulations, such as the Sarbanes-Oxley (SOX), the Health Insurance Portability Accountability Act (HIPPA) and the more recent Payment Card Industry (PCI) initiative, require businesses to know exactly what changes are being made to structured and unstructured data in their corporate networks. As a result, IT organizations need to provide more detailed monitoring, analysis, auditing and reporting on the changes being made to protected data. Learn about the best practices for implementing a compliance solution ...
Web App Acceleration: Practical Implementations
[ Source: F5 ]
July 2014- Web application acceleration implementations use combinations of three key acceleration principles: 1. Send data as efficiently as possible; 2. Send data as infrequently as possible; and 3. Send as little data as possible. Different combinations can produce very different results and, more importantly, they can require dramatically different investments in time and resources. To decide on the best practical implementation of acceleration technologies for a particular organization, it is important to explore how each implementation employs the key ...
Creating the Best-of-Breed DDI Solution in a Microsoft Environment
[ Source: Infoblox ]
May 2014- Microsoft Active Directory (AD) is great for managing Microsoft tools. But in the age of virtualization, cloud, and mobility, you need best-in-class DNS and DHCP management utilities for core network services. That's why 1000's of network teams have added Infoblox DNS, DHCP, and IP address management (DDI) to their Microsoft environment. By doing so, they enhance the availability, manageability, security, and efficiency of their networks. Read this white paper to learn how adding Infoblox DDI ...
The Cloud Supply Chain Data Network
[ Source: GT Nexus ]
March 2014- Historically there's been great difficulty -- and importance -- in obtaining high quality data to fuel global trade management systems. The paper also explores the advent of the cloud data network and some of the powerful advantages of this approach, including those provided by network effects - the exponential power of a collaborative network of partners to solve supply chain problems.
Reengineering the Foundation for B2B Information Exchange in the Supply Chain
[ Source: GT Nexus ]
March 2014- Cloud platforms represent a truly radical shift in how companies exchange information with one another. Examine the shortcomings of yesterday's technology and how new platforms based around the economics of cloud are enabling companies to become agile and hyper-efficient networked organizations.
Without the extra-enterprise nervous systems to see and control the supply chain, companies are at a strategic disadvantage in their markets, and this paper explains why.
Cloud Information Technology: A Model for the Networked Company
[ Source: GT Nexus ]
March 2014- Cloud technology is rapidly changing the way B2B interactions are carried out. It provides a benefit that no amount of investment in traditional software can obtain—the exponential effect a robust network of companies with a common goal has on the quality of the technology and its users. As companies move to cloud-based software, their IT teams must correspondingly adapt the department's structure.
This new model involves IT taking on more ...
The Rising Threat Of Corporate Cybercrime: Cybercriminal Motives and Methods
[ Source: Trusteer ]
October 2013- Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to corporate information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the corporate network than a direct network attack. Our latest white paper discusses the cybercriminal motives and methods, and presents the need for Enterprises to recognize this growing danger and implement technologies that effectively prevent malware, the root ...
Empowering Optimization Through Tag Management Solutions
[ Source: Ensighten ]
June 2013- If you haven't explored the benefits of website tag and data management, now is the time to discover it.
With the rapid adoption of website optimization and personalization solutions in the last few years, digital marketers have faced serious marketing and technical execution challenges. Efficient workflows, execution, and overall test management continue to be a struggle, and according to Web Analytics Demystified, the biggest hurdle is instrumenting the website with the testing vendor's ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services