- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- SecureAuth IdP Device Fingerprinting
- Implementing Software-Defined Security with CloudPassage Halo
- Consolidation: The Foundation for IT and Business Transformation
- The Right Way to Protect Against DDoS Attacks
June 2013- When IT organizations utilize social media, it can efficiently help more people inside and outside the data center quickly access more services and knowledge. Combined people's knowledge and good will and the essence of information technology service management (ITSM) can be more fully realized.
September 2012- In this whitepaper, "Safely Unleashing the Power of Social Media," you will understand that by being proactive and working with the marketing department to enable them to securely and easily register social media users in their system, you will potentially be in a position to positively influence revenue growth.
January 2012- This whitepaper details the BlackBerry PlayBook and BlackBerry Tablet OS. Discover the benefits, including: real-time OS, true multitasking, self-healing microkernel architecture, security, US federal agency certified and speedy, smooth, natural...
January 2012- This whitepaper includes information about tablets and mobile computing, including how creating the enterprise-class tablet is important for enterprises.
The iPhone’s popularity has generated high demand for enterprise use. But before widespread adoption takes place, IT departments must solve specific security and management issues to maintain control and ensure compliance.
Watch this video to learn how Sybase can help integrate the iPhone into your enterprise while meeting everyone’s needs.
Apple's iPad is being launched as a consumer device. Yet, there is little doubt that it will become a valuable enterprise productivity tool. IT departments should consider iPad when planning strategies and policies to ensure corporate information stays managed and secured.
Join Sybase for this on-demand webcast and learn:
•?What studies are indicating about the use of iPad in the enterprise
•?How IT can provide employees with the flexibility ...
Apple's iPad is being launched as a consumer device. Yet, there is little doubt that it will become a valuable enterprise productivity tool.
IT departments should consider iPad when planning strategies and policies to ensure corporate information stays managed and secured.
Join Sybase for this on-demand webcast and learn:
• What studies are indicating about the use of iPad in the enterprise
• How IT can provide employees with ...
When an individual’s device selection matches corporate control, policy and security needs, business benefits abound Smart Policies for Personal-Liable Smartphones.
With sleek designs and a variety of userfriendly features, smartphones have implanted themselves on the public’s consciousness—so much so that one leading industry research firm reports that a record 54.5 million such mobile devices were shipped in the fourth quarter last year. With sales rising nearly 40 percent over the same quarter ...
February 2009- The number of consumer audio applications demanding high-quality audio compression and communication across wireless networks continues to grow. Although the consumer is increasingly demanding higher audio quality, devices such as portable media players and wireless headsets also demand low computational complexity, low power dissipation, and practical transmission bit-rates to help conserve battery life. This paper discusses research undertaken to lower the complexity of existing high-quality sub-band ADPCM coding schemes to better satisfy these conflicting criteria.
January 2009- This technology white paper introduces a new scheme for lossless audio compression called apt-X Lossless. This scheme has been conceived, designed, and developed by APTX, an audio processing technology company, the commercial originator of the apt-X low-latency audio codec, and a company with a long association with both the broadcast industry and the studio post-production business.
May 2008- Are iPhones ready for business? Some never thought iPhones would make it for personal use. Now Range Networks profiles iPhones and their business capabilities in this presentation.
August 2008- This paper covers what information leakage is and why it has become so prevelant. It discusses why DRM (Digital Rights Management) is required to prevent information leakage from within and outside of the enterprise and why encryption and access control are only effective inside the enterprise.
April 2008- This whitepaper compares Kleer technology to Bluetooth technology for the application of wireless streaming audio. Bluetooth is a standard for relatively short-range general-purpose data communications. Bluetooth has found initial market success in wireless voice headsets for mobile phones and is now trying to address stereo audio for mobile phones and portable audio players. Bluetooth solutions suffer from poor audio quality due to the use of lossy audio compression, poor ISM (2.4GHz) band coexistence performance in ...
January 2008- Virtual worlds are persistent, avatar-based social spaces that provide players or participants with the ability to engage in long-term, joint coordinated action. This paper is an effort to outline some of the things happening in and around virtual worlds which make them more than ""just games"" and which may in fact point in the direction of new forms of knowing and acting in virtual spaces and give insight into what new, technologically mediated worlds may ...
January 2008- 2006 saw the introduction of several new cinema titles, such as Return of Superman and Nightmare on Christmas. In 2007, Meet the Robinsons was released by Disney Studios. In each case, the films that were presented in 3-D retained higher receipts than those that were shown in 2-D. With studios like DreamWorks announcing that all future animated titles will be in 3-D, it stands to reason that there will be 3-D content available for home viewing in ...
January 2008- The Apple iPhone was released to much fanfare on June 28, 2007. Because of the large amount of personal information stored on these mobile devices, the authors decided to conduct a security analysis of the iPhone. The iPhones applications for surfing the web and checking emails are potentially at risk to remote attacks. This paper examines exactly how well the software on the iPhone is designed to resist such attacks.
January 2008- The Global Positioning System (GPS) is a satellite-based navigation system owned and operated by the US Department of Defense. The Intermec CN3 includes an integrated GPS receiver and antenna as an optional feature. The receiver can report horizontal position to a range of approximately 3 meters. This paper provides information for developers interested in developing software that makes use of the CN3 integrated GPS receiver.
January 2008- Short-range communication standards have brought a large number of new services to the reach of common users. For instance, standards for personal networking technologies such as Bluetooth, Wi-Fi,Wireless Universal Serial Bus (WUSB), and HomePlug AV enable users to easily introduce, access, and control services and devices both in home and mobile environments. The initial process of introducing a new device to another device or to a network is called an association. This Nokia paper ...
January 2008- The Apple Inc. iPhone is the definition of a convergence device. It has the ability to play back music and videos on its 3.5 inch display, a unique ability for video/image displays to automatically flip between landscape and portrait views when the device is rotated, special software that makes finger-based scrolling easier, a Safari Web browser that shows Web sites in their standard format, and more options for users to access and listen to voice ...
January 2008- The BlackBerry system provides server side filtering that can be managed from either the desktop or from the BlackBerry client, which is illustrated above. When new messages arrive, they are matched against the filter. LEMONADE provides two approaches to email filtering, which can provide equivalent services to Blackberry filtering, with a number of overall benefits. This paper looks at how mail filtering is provided by a Blackberry, and compares this with the open standards based ...
January 2008- LEMONADE is the Internet Standard for Mobile Email, based on IMAP and SMTP. This paper compares LEMONADEs approach to handling and delivering email and email attachments to mobile devices with that of the well known and widely deployed BlackBerry system. BlackBerry Enterprise Service and LEMONADE can be used to provide a similar level of service, and neither has any compelling advantage over the other. Both have substantial functional advantages over BlackBerry Internet Service.
January 2008- This paper discusses how ad-hoc Personal Area Network (PAN) based on Bluetooth technology may connect to external networks. The paper assumes that the Bluetooth network (piconet) is formed by the automatic SAPIFO procedure that one or more piconet devices have access to external networks, and that IPv4 is used for external communication. Bluetooth have specified a PAN profile for IP over Bluetooth, which uses BNEP (Bluetooth Network Encapsulation Protocol) to emulate an Ethernet segments between ...
January 2008- This paper published by Nortel tells the reader that as service providers combine interactive video with voice, data and mobility services to form quad-play bundles, will their subscribers be watching IP Television (IPTV) or engaging in a new multimedia experience? There is an elegant and cost-effective way to not just deliver a video, voice, data and mobility bundle - but to seamlessly integrate them into a richly interactive and personalized experience.
January 2008- This paper describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture. Many companies are realizing significant return on investments and productivity gains by extending their enterprise information to mobile employees. With an increased demand for mobile content and the threat of information theft, companies have concerns about addressing security needs and requirements when evaluating wireless solutions. Without an effective security model, any company might expose sensitive ...
January 2008- The primary goal of simple pairing is to simplify the pairing process from the point of view of the user. Secondary goals are to maintain or improve the security in Bluetooth wireless technology. Since high levels of security and ease-of-use are often at opposite ends of the spectrum in many technologies and products, much care has been taken by the Core Specification Working Group in the creation of the Simple Pairing proposal to maximize security ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services