Sort results by: Published date | Company name
Showing items 1-25

DevOps: The Bridge to Faster Application Delivery [ Source: CA Technologies ]

February 2014- Application Delivery: Complex, repetitive, slow and prone to errors. ItÂ’s also essential in todayÂ’s world. This infographic highlights top findings from a recent IDG research survey

Cloud Adoption: Hybrid Is the Future [ Source: VMware ]

April 2014- As the cloud computing market continues to grow, enterprises are exploring different cloud models in search of the right balance of functionality, flexibility and investment protection. As many organizations are discovering, off-premises cloud vs. on-premises data center is not an either/or proposition. Hybrid cloud lets organizations provision, use, and manage IT resources across their on-site data center and a compatible public cloud. A new Market Pulse survey by IDG Research Services indicates that more ...

OutSystems Platform and Different PaaS for Different Players [ Source: OutSystems ]

April 2014- This whitepaper, authored by Bloor Research practice leader David Norfolk, compares two different PaaS (platform as a service) solutions - OutSystems Platform and

The paper includes a comprehensive analysis of the two PaaS solutions with a focus on providing an objective look at two products that are both "fit for a purpose." The paper provides enough information to help IT professionals determine which product matches their needs and requirements.

PaaS - Powering a New Era of Business IT [ Source: OutSystems ]

April 2014- Cloud computing services have become an integral part of many organization's enterprise IT strategies. In the last 12 months, platform as a service (PaaS) has become one of the fastest growing areas of all cloud computing services with analyst firms like Gartner and IDC predicting sharp uptakes in PaaS adoption.

This paper explores why PaaS has suddenly become relevant and irresistible to many organizations. It dives into the opportunities and considerations associated with using ...

Driving Competitive Advantage by Predicting the Future [ Source: Rogue Wave Software ]

February 2014- Competitive advantage is derived by an organization when it develops strategies, techniques, or resources that allow it to outperform its competition. One such resource is the innovative use of analytics to improve business decisions or operational processes. Decision makers can use analytics to cultivate the data collected from day-to-day operations into key insights unavailable to the competition.

The field of predictive analytics is the next evolution in business intelligence - moving beyond the ...

Transitioning to Multicore: Part 1 [ Source: Rogue Wave Software ]

February 2014- As you think about your application in the context of new multicore systems you may wonder: What does it mean to transition my application to multicore? What is the essence of a multicore application? What are the tradeoffs involved? What are the changes you need to make?

This paper, part one of two, answers these questions, showing you how to transition an application to run on a multicore system smoothly and correctly.

Ranker reduces spend by almost 60% with Rackspace [ Source: Rackspace ]

February 2014- Find out how Rackspace Private Cloud and Rackspace DevOps Support helped Ranker automate their cloud environment and increase stability and control while reducing their hosting spend by almost 60%

Keeping the Mobile Enterprise Moving [ Source: New Relic ]

November 2013- Rapid surge in mobile apps use outpaces traditional software development tools.

Enterprises can't afford to be left behind as mobility surges to the forefront of IT and business strategies. Nor can they afford to churn out poorly performing mobile apps that alienate users and sap valuable IT assets. This white paper examines current trends in enterprise mobile app use. It explores why businesses are jumping into the mobile arms race and the risks ...

IDC Analyst Connection: The Case for SaaS Application Performance Management [ Source: New Relic ]

November 2013- As mission-critical enterprise application environments become more complex because of the increased use of cloud, big data, and mobility, APM is becoming a top priority for IT teams that need to quickly and cost effectively track end-to-end application performance, identify and remediate the root cause of performance problems, and maintain service levels required by end users and business stakeholders. SaaS-delivered APM solutions offer rapid time to value for IT organizations that need to implement APM ...

Break Down Barriers and Reduce Cycle Times with DevOps [ Source: New Relic ]

November 2013- Learn how companies like Netflix, Amazon, Etsy, Facebook and many, many deliver new features faster, sometimes several times per day, while other companies wait months to release software updates. Dismantling the traditional silos between Development and Operations, their teams work together through what is now known as DevOps.

This report explores ways in which Development and Operations teams need to evolve, view software holistically, have a shared toolset and actively seek ways to ...

5 Unsung Tools of DevOps [ Source: New Relic ]

November 2013- Most of us are always trying to optimize our work so we're constantly looking for new and improved tools. Plus playing with new tools is fun.

As a counterpoint, Jonathon Thurman shares his five favorite DevOps tools which have been around a long time. They may not be flashy but they're time tested and just work. He also tells you how to use them and how to configure them for maximum value.

Three must-have capabilities for today's warehouse environment [ Source: IBM ]

November 2013- Speed, simplicity and affordability: 3 capabilities businesses need from their warehousing environment. IBM DB2 with BLU Acceleration gives organizations a complete, multipurpose environment to rapidly distill insight from their data, make timely decisions and capitalize on opportunities

Ten Steps to Better Requirements Management [ Source: IBM ]

October 2013- Requirements definition and management is recognized as a necessary step for the successful delivery of systems and software projects; the discipline is also required by standards, regulations and quality improvement initiatives like Capability Maturity Model Integration (CMMI).

Design Matters: Enabling better collaboration [ Source: IBM ]

October 2013- Today's complexity in software and systems design is only expected to rise, and more than half of CEOs doubt their ability to manage it. Whether IT or device-based, software-intensive systems continue to grow in size and complexity. Globally distributed and diverse teams, outsourcing and supply chain dependencies lead to increased challenges in the timely launch of competitive products and services. Organizations struggle to balance agility and complexity. It's not enough to manage development, the design ...

A mobile application development primer [ Source: IBM ]

October 2013- Feel like your software delivery team gets productivity paralysis? Join our support group and hear Bernie Coyne, a certified "ALMopath" (and IBM ALM Technical Marketing Manager), share how to recognize the signs and symptoms that your team may be suffering from a treatable "disorder." Learn about the "treatments" available through effective application lifecycle management (ALM).

Now reduce the risk and cost of managing change in SAP landscape [ Source: IBM ]

October 2013- Organizations that use SAP must keep pace with constant change. IBM Rational Software for SAP offers a comprehensive suite of application lifecycle management and quality management tools to extend SAP Solution Manager capabilities and enable a holistic approach to SAP and non SAP deployment.

Industry Report: The Evolution of Web Application Attacks [ Source: Whitehat Security ]

October 2013- Many businesses today, from small retail organizations to large enterprises, are struggling with Web application security. Many organizations do not fully understand the risks of Web application attacks and arcane references like "OWASP Top 10" simply confuse them even more. With the prevalence of Web application hacks in the news, the top questions asked by many are "How likely are we to be hacked?" and "What can we do to defend ourselves?"

The answers ...

OpenStack and Red Hat [ Source: Red Hat ]

August 2013- OpenStack is an open source cloud system software project that has broad participation from the IT Industry. In this IDC white paper sponsored by Red Hat, IDC evaluates the current situation and provides a future outlook evaluating the deployment and support model and addressing OpenStack enterprise features and support, specifically looking at Red Hat's Enterprise Linux OpenStack Platform and Cloud Infrastructure solutions.

Cloud infrastructure for the Real World [ Source: Red Hat ]

August 2013- Cloud adoption is an evolutionary process that has been leading to hybrid clouds-specifically, open hybrid clouds that provide for portability of applications and data. This new model means avoiding new points of proprietary lock-in and new silos, and breaking from proprietary software and hardware. It demands that organizations make a smooth transition from one model to another, while valuing both types of workloads equally.

Accelerate Software Development with DevOps and Hybrid Cloud [ Source: Skytap ]

December 2013- Agile methodologies give development and test teams the ability to build software at a faster rate than ever before. Combining DevOps with hybrid cloud architectures give teams not just the principles, but also the technology necessary to achieve their goals.

By combining hybrid cloud and DevOps:

• IT departments maintain control, visibility, and security
• Dev/test teams remain agile and collaborative
• Organizational barriers are broken down

How to Avoid the Coming Backup Crunch [ Source: Dell ]

July 2013- Tolerances for data loss are approaching zero, and traditional backup has become a resource drain that threatens to cripple IT with "business as usual". Dell's critically acclaimed AppAssure enables IT to capture continuous backup snapshots, automate recoverability testing and offload data deduplication/compression. As a result, businesses can successfully fulfill rapidly escalating data protection requirements using minimal infrastructure and human resources - allowing them to redirect resources to genuinely strategic technology initiatives.

Secure the Enterprise with Confidence [ Source: IBM ]

May 2013- The explosive increase in cyberthreats poses an increasingly daunting challenge to the confidentiality, integrity, and availability of intellectual property and other sensitive information. Conflicting opinions about operational risk, myriad point solutions for security technology, and dissimilar computing infrastructures create a puzzling landscape for security and risk professionals. To assess the market, Forrester Consulting interviewed 225 IT security leaders across North America and Western Europe about their firm?s information security investments. Roughly 60% of respondents reported revenues ...

A Guide to Implementing a Successful SAST Tool and Solving Developer Security Issues [ Source: Checkmarx ]

April 2013- Recognizing security defects early in the development cycle have traditionally posed real challenges for developers as current static analysis tools often generate significant false positive results and other major issues. Next generation tools address these issues by integrating static analysis as part of development teams’ normal ‘design, code, test and analysis’ processes. Download, “A Successful SAST Tool Implementation” to learn how these tools can:

•  Integrate with normal software engineering workflows
•  Accurately report ...

Enterprise Application Security: A Guide to Choosing Between Binary and Source Code Analysis [ Source: Checkmarx ]

April 2013- Software security is a top priority for many organizations with many considering how they should integrate security earlier on in the software development lifecycle. A process change like this would benefit organizations in the form of reduction in costs and increased productivity as a result of minimizing flaws and removing defects via software patches. Download, “Enterprise Application Security: Source vs. Binary Code Analysis” to learn about the benefits of Source Code Analysis (SCA) and how ...

The Future of Email and Application is Social [ Source: IBM ]

April 2013- This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

Next 25