Sort results by: Published date | Company name
Showing items 1-25

SaaS Security: Mind the Gap [ Source: Adallom ]

November 2013- This joint paper from EMC and Adallom provides a brief overview of emerging gaps and trust issues common to SaaS providers.

Protect Your Applications - and Reputation - with Symantec EV Code Signing [ Source: Symantec ]

January 2015- For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code.

Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process ...

Are you Ready for Mobile Capture? [ Source: IBM ]

November 2014- Read this white paper by Kevin Craine to discover how mobile capture can improve the effectiveness of your organization's processes. Discover the top 10 questions to ask before you make your investment in mobile capture.

SaaS Takes Center Stage [ Source: IBM ]

November 2014- The SaaS Category infograph showcases the SaaS adoption trend and growth from 2013-2017

The State of Managed Phone Services in the Cloud [ Source: Comcast ]

October 2014- More than 59% of small and midsized companies are considering a hosted or virtual alternative to traditional phone services in order to boost collaboration, reduce costs, and accommodate the changing mobile nature of work. Download this exclusive research report to learn more about the solutions they're pursuing, the results they're seeing, and the challenges they encounter along the way.

Three Ways To Deliver Safer and More Secure Automative Software [ Source: Rogue Wave Software ]

October 2014- Millions of lines of software code are driving the latest innovations in today's vehicles. However, with software-driven innovation comes the reality of coding defects, safety failures, and the potential to become a target for hackers. This paper outlines three important steps that embedded automotive software teams can follow to identify critical coding errors, functional safety issues, and protect their software against malicious attack.

Mobile App Development: Moving From Good to Great [ Source: IBM ]

October 2014- Great mobile app development leads to more than a compelling user interface. In fact, the majority of the cost and effort happens behind the UI, including testing, integration, security, quality assurance, and ongoing management. Also, with security and data integration becoming especially important for an enhanced user experience, many companies are turning to integrated and collaborative mobile application development environments to meet these business requirements and exceed customer expectations.

Improving SLAs with Faster Processing Powered by HGST FlashMAX II and HGST Virident Share Software [ Source: HGST ]

October 2014- HGST Virident Share software allows a RAC cluster to use FlashMAX II PCIe SSDs inside the database servers as a shared primary storage, a unique capability in the industry for PCIe flash cards. Learn more.

Algorithmics: Curve fitting for calculating solvency capital under Solvency II [ Source: IBM ]

September 2014- The purpose of this paper is to provide an insight into how some of Europe's leading insurer's are applying Curve Fitting in practice, the benefits that are being derived and some of the practical challenges that need to be addressed.

Whitepaper: Increasing Software Development Productivity with Reversible Debugging for Linux [ Source: Undo Software ]

September 2014- In a world increasingly run by software, failures caused by bugs have never been more visible or high profile. However, a study from the Judge Business School of the University of Cambridge, UK, published in 2013, found that the global cost of debugging software has risen to $312 billion annually. Finding and fixing bugs faster, in a more predictable and productive way, is vital for developers and managers. This whitepaper explores the various debugging options currently available ...

CommVault Is A Leader Among Enterprise Backup And Recovery Software Providers [ Source: CommVault ]

August 2014- CommVault's primary strategy centers on providing a single platform for backup, recovery, continuity, archive, and other data management and protection strategies. Areas of strength for CommVault include its deduplication capabilities, cloud-target integrations, hypervisor and application capabilities. Through innovative offerings and the implementation of advanced strategies, CommVault has quickly become an industry leader in a myriad of fields. Download this Forrester Research Report today to find out more about CommVault's current offering, strategy, and market presence.

Gartner 2014 Enterprise Backup Software and Integrated Appliances Magic Quadrant [ Source: CommVault ]

August 2014- According to Gartner, the backup/recovery software and integrated appliance market comprises tens, if not hundreds, of vendors. This research narrows it down to those that have a strong presence in midsize and large organization IT environments. Download the report to learn why CommVault has been named a leader and why that matters in helping end users make better informed decisions about data protection.

U.S. Government Department Promotes Openness and Transparency by Streamlining FOIA Requests Using Clearwell [ Source: Symantec ]

August 2014- With an increasing amount of electronic submissions subject to FOIA, the department was challenged meeting its FOIA obligations. Read how the Department was able to streamline the collection, analysis, review, and production of electronic information.

End to End eDiscovery [ Source: Symantec ]

August 2014- Need a single application to manage legal, regulatory, and investigative matters? eDiscovery solution enables agencies to defensibly solve real-world challenges across the entire eDiscovery lifecycle from legal hold and collections through analysis, review, and production.

Demystifying Industry Standards [ Source: IBM ]

July 2014- A B2B standards e-book that helps demystify the industry standards for the commerce life-cycle. "Although industry standards were designed to make business communications simpler, the specific and complex nature of the standards themselves can seem intimidating." In this eBook, we will discuss:

• How Industry Standards came about and their role within business processes.

• The fundamental differences between a variety of Industry Standards, and why complexities exist that prevent ...

Achieve an astounding ROI [ Source: Dell Software ]

July 2014- Achieve an astounding return on investment with Dell Software. Independent research proves Toad for Oracle delivered a 2,677 percent risk-adjusted ROI in five years for a large transportation company.

Taming the Beast [ Source: Dell Software ]

July 2014- Learn more about how your agency can replicate critical data and applications for high availability during regular service, environment upgrades, and migrations.

Requirements for an Application Release Automation Platform [ Source: CA Technologies ]

July 2014- Modern applications are increasingly complex, growing rapidly and being deployed across multiple environments and infrastructure models (physical, virtual and cloud). In order to keep up with increasing business demands, development and testing teams are adopting agile methodologies and automated testing processes. Download this whitepaper to get a better understanding of how to select a reliable application release automation solution to keep up with increasing business demands. This whitepaper discusses:
- Why application release and ...

Rationalize Applications Across the IT Portfolio eBook [ Source: CA Technologies ]

June 2014- Bridging the technology/budget/alignment gap in the 'new normal'; increase efficiencies, reduce costs & make the most of existing assets.

Importance of Software Asset Management (SAM) eBook [ Source: CA Technologies ]

June 2014- How to drive ROI from service performance: examining the cost benefits of automated service-level management.

Closing the Biggest Hole in Web Application Delivery: Session Hijacking WP [ Source: CA Technologies ]

June 2014- Since the beginning of web application delivery, there has been an opportunity for fraudsters to get into the middle of a transaction and impersonate the legitimate user. Since the credentials used for this fraud are valid and "expected to be under the control of the real user," this type of impersonation has been difficult if not impossible to detect and stop.

Governance, Risk and Compliance (GRC) Software: Consistency Keeps Your Agency's Data Secure [ Source: Dell Software ]

June 2014- Dell Software commissioned research provider Market Connections, Inc. to poll federal IT workers on awareness of, and attitudes toward, the use of GRC software in federal agencies, especially the features they deem most critical when selecting a tool. This white paper explores the findings of that poll and shows to what extent agencies are using GRC software.

Desktop Engineering: High Performance Cluster Computing Survey [ Source: IBM ]

May 2014- An executive summary of the results of a survey conducted by Desktop Engineering to gauge its audience’s familiarity with high performance cluster computing and its benefits.

Software Defined Storage for Dummies [ Source: IBM ]

May 2014- This book examines data storage and management challenges and explains software-defined storage, an innovative solution for high-performance, cost-effective storage using the IBM General Parallel File System (GPFS).

OutSystems Platform and Different PaaS for Different Players [ Source: OutSystems ]

April 2014- This whitepaper, authored by Bloor Research practice leader David Norfolk, compares two different PaaS (platform as a service) solutions - OutSystems Platform and

The paper includes a comprehensive analysis of the two PaaS solutions with a focus on providing an objective look at two products that are both "fit for a purpose." The paper provides enough information to help IT professionals determine which product matches their needs and requirements.

Next 25