Web Development

Improve your coding skills by putting our experts' web development advice to use.

  • White Papers // Jul 2014

    Three Key Principles to Accelerating Web Applications

    Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of...

    Sponsored By F5

  • Videos // Jul 2014

    Introduction to Operations Orchestration

    This video introduces operations orchestration and shows how to build a very simple flow in operations orchestration. Watch now-and learn how to improve automation deployment time, manage scale, improve consistency and increase automation reliability.

    Sponsored By HP

  • White Papers // Jul 2014

    Maximize your UC&C Outcomes

    Unified communications and collaboration (UC&C) solutions like Microsoft® Lync® are transforming the workplace. With presence, real-time voice, HD video, and rich collaboration capabilities seamlessly integrated into their office productivity suite, today’s employees can engage customers and connect with colleagues and partners from anywhere, at any time, using any device. Read...

    Sponsored By HP US

  • Webcasts // Jul 2014

    Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Sponsored By Coverity

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2014

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Sponsored By IBM

  • White Papers // Jul 2014

    Using IBM Social Business to Take Your Business Relationships to the Next Level: A Game Changer for Small, Medium, and Large Businesses.

    This IBM Redguide™ publication provides information about IBM Social Business and includes details about the business need and the value of transformation to a social business. It presents a high-level Social Business component diagram, highlights key capabilities, and includes customer case studies that exemplify how some of these capabilities can...

    Sponsored By IBM

  • White Papers // Jul 2014

    Anticipate, engage and deliver exceptional web experiences.

    IBM Customer Experience Suite and IBM Intranet Experience Suite help organizations delight customers through a consistently exceptional web experience and empower employees with the social business tools they need to drive better business results. IBM Customer Experience Suite features rich, integrated capabilities for managing web content, real-time social communications, robust...

    Sponsored By IBM

  • White Papers // Jun 2014

    Qantas supports business transformation with CA Clarity On Demand

    Business: Qantas is Australia’s largest domestic and international airline, carrying nearly 20% of all passengers travelling in and out of the country. Challenge: to maintain its competitive advantage in the increasingly difficult aviation industry, Qantas embarked on a major transformation programme to position the company for a strong and sustainable...

    Sponsored By CA Technologies

  • White Papers // May 2014

    Making the Real Time Enterprise a Reality

    REAL TIME. ON DEMAND. ALWAYS ON. Such are the expectations of businesses in today’s global information economy. Customers demand agility, responsiveness, and innovation from all companies today. And they’re comparing their experiences with businesses in every industry against firms that embody all three capabilities. Read this whitepaper to discover how...

    Sponsored By SAP

  • White Papers // Apr 2014

    Protect people, processes and technology from web appliation threats

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect their businesses.

    Sponsored By IBM

  • White Papers // Apr 2014

    U.S. Department of Agriculture Stays at the Forefront of Mobilization with Acronis Access

    The United States Department of Agriculture (USDA) works to support the American agricultural economy to strengthen rural communities; to protect and conserve America’s natural resources; and to provide a safe, sufficient, and nutritious food supply for the American people. The USDA is composed of 17 separate agencies with an additional...

    Sponsored By Acronis

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Office 365 – Bringing Enterprise-Class Cloud Email Capabilities to the Masses

    Learn how migrating to the Microsoft® Office 365 cloud-based messaging and collaboration solution can benefit your organization’s business-critical email infrastructure in terms of availability, functionality and cost savings in this webcast from Dell™.

    Sponsored By Dell Software

  • Downloads // Jun 2014

    Webroot protects your devices everywhere

    SecureAnywhere Endpoint Protection offers instantaneous protection and fast scans without the hassle of time-consuming patches and signature updates. You can get your free trial today - just click "download", fill out and submit the form, and we'll email you a download link and instructions. Then just go to your...

    Provided By Webroot Software

  • Downloads // Jun 2014

    Citrix NetScaler VPX - 90 Day Trial

    Try the Citrix NetScaler VPX for 90 days and see for yourself the benefits for web app acceleration, availability and security. Key benefits of NetScaler VPX Freedom to choose your platform - Virtual appliance runs on Citrix XenServer, Microsoft or VMware Simple to install and manage - The...

    Provided By Citrix

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US

  • Presentations // Jun 2014

    WebEx Viewpoints: Collaboration in the Workplace

    Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Improving Sales Teams

    WebEx enables sales teams to effectively and efficiently connect with customers around the globe. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Viewpoints: Training

    WebEx allows companies to train employees effectively, anytime and anywhere. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Hosting Webinars

    Use WebEx to host webinars, tell your story and connect to global audiences. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Tutorial: Key Features

    Learn how easy Webex Meetings makes hosting webinars, sharing screens and attending online meetings. Drive success by connecting with your audience and completing projects faster.

    Provided By Cisco Systems

  • White Papers // Jun 2014

    The New World of Collaboration

    The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now...

    Provided By Box

  • White Papers // Jun 2014

    Using Video to Gain a Competitive Advantage: A Business Strategy for Mid-Market Companies

    Video collaboration solutions can help small- to medium-sized companies reduce downtime by 25%. They can also help companies reduce time-to-market by 24%.* The ROI is strong for mid-market companies investing in video. This Cisco-sponsored white paper from AVI-SPL will help you plan a video-enabled workplace. Discover how video...

    Provided By AVI-SPL

  • White Papers // May 2014

    Recent Contributions to Cryptographic Hash Functions

    Hash functions are cryptography’s most widely used primitives, in that they are a fundamental building block used for a wide variety of constructions. The recent attacks of Joux, Wang, and others against the current generation of hash functions has stimulated a resurgence of research into these primitives as well as...

    Provided By Intel Corporation

  • Downloads // May 2014

    Simplify Desktop and Application Access Management – PowerTerm WebConnect

    With the current BYOD trend and the need to reduce IT workload, organizations need to empower users with secure, browser-based access to Windows Applications and Desktops from any device, anywhere - simply and cost-effectively. PowerTerm® WebConnect provides secure and mobile, managed access from office and remote locations to Windows...

    Provided By Ericom Software

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • White Papers // Apr 2014

    Wide Area File Services: Document Collaboration for the Distributed Business Environment

    This paper outlines the essential requirements for file sharing across a wide-area network (WAN), and briefly discusses the limitations of appliance-based WAN optimization when applied specifically to document collaboration. The paper uses a solution analysis to compare common business needs to required features, and explains how appliance-based optimization falls short...

    Provided By GlobalSCAPE

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Webcasts // Apr 2014

    On-demand Webcast: How to Simplify Deployment of Google Apps and Office 365

    Google Apps and Microsoft Office 365 each has its own vast ecosystem, from email to office applications to identity management. Google would prefer you live entirely in the Google environment, while Microsoft would prefer you live entirely in its Exchange/Office 365/Active Directory infrastructure. You are likely using a combination of...

    Provided By Centrify

  • White Papers // Apr 2014

    Mobile Application Management with XenMobile and the Worx App SDK

    Discover how Citrix XenMobile addresses the unique challenges posed by native mobile applications and enables IT to securely deliver them to any device.

    Provided By Citrix

  • Videos // Apr 2014

    Engage, Empower and WIN customers by Making First the Mile Smarter with Kofax

    A video that will give you insights on how Kofax helps organisations to increase their responsiveness to customers and put emphasis on the need for a mobile application strategy. Watch this short video now to see how Kofax helped organisations grow their businesses while reducing operating costs.

    Provided By Kofax

  • White Papers // Apr 2014

    Forrester: Build A Better Business Case for Unified Communications

    This report outlines Forrester's solution for IT infrastructure and operations professionals who are building out communications and collaboration infrastructure. Download this report now to learn how Shoretel helps you define and build the business case for Unified Communications.

    Provided By ShoreTel

  • White Papers // Apr 2014

    Marketing in a World Without Cookies

    Modern marketers need a new way to connect closer with consumers by establishing the trust and understanding necessary to reach them with the right messages on the right channels at the right times - right away. This guide outlines three ways that permission-based marketing is overtaking traditional third-party cookies and...

    Provided By Gigya Inc.

  • Webcasts // Mar 2014

    On-demand Webcast: How to Protect and Recover SharePoint Data

    Microsoft SharePoint is an amazingly popular solution for sharing and centralizing control over important business data. Join us as we talk about the value of virtualizing your SharePoint infrastructure and the benefits of using Veeam® Backup & Replication™ to protect the valuable data that resides in your SharePoint databases. ...

    Provided By Veeam Software

  • White Papers // Mar 2014

    InfoWorld Report: From Silos to Optimised Infrastructure Management

    This report discusses the challenges IT teams face managing traditional and newer technologies and the impact of silo performance views on their ability to deliver business objectives: Best Practices to "tear down" silos Cloud, big data, mobility and collaboration adoption guidelines 4 steps for achieving a unified view...

    Provided By CA Technologies

  • White Papers // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Sponsored By Coverity

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • White Papers // Jul 2014

    Maximize your UC&C Outcomes

    Unified communications and collaboration (UC&C) solutions like Microsoft® Lync® are transforming the workplace. With presence, real-time voice, HD video, and rich collaboration capabilities seamlessly integrated into their office productivity suite, today’s employees can engage customers and connect with colleagues and partners from anywhere, at any time, using any device. Read...

    Sponsored By HP US

  • White Papers // Jul 2014

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Sponsored By IBM

  • White Papers // Jul 2014

    Anticipate, engage and deliver exceptional web experiences.

    IBM Customer Experience Suite and IBM Intranet Experience Suite help organizations delight customers through a consistently exceptional web experience and empower employees with the social business tools they need to drive better business results. IBM Customer Experience Suite features rich, integrated capabilities for managing web content, real-time social communications, robust...

    Sponsored By IBM

  • White Papers // May 2014

    Making the Real Time Enterprise a Reality

    REAL TIME. ON DEMAND. ALWAYS ON. Such are the expectations of businesses in today’s global information economy. Customers demand agility, responsiveness, and innovation from all companies today. And they’re comparing their experiences with businesses in every industry against firms that embody all three capabilities. Read this whitepaper to discover how...

    Sponsored By SAP

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

    Sponsored By Coverity

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Apr 2014

    U.S. Department of Agriculture Stays at the Forefront of Mobilization with Acronis Access

    The United States Department of Agriculture (USDA) works to support the American agricultural economy to strengthen rural communities; to protect and conserve America’s natural resources; and to provide a safe, sufficient, and nutritious food supply for the American people. The USDA is composed of 17 separate agencies with an additional...

    Sponsored By Acronis

  • White Papers // Jun 2014

    Qantas supports business transformation with CA Clarity On Demand

    Business: Qantas is Australia’s largest domestic and international airline, carrying nearly 20% of all passengers travelling in and out of the country. Challenge: to maintain its competitive advantage in the increasingly difficult aviation industry, Qantas embarked on a major transformation programme to position the company for a strong and sustainable...

    Sponsored By CA Technologies

  • White Papers // Jul 2014

    Three Key Principles to Accelerating Web Applications

    Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of...

    Sponsored By F5

  • White Papers // Jul 2014

    Using IBM Social Business to Take Your Business Relationships to the Next Level: A Game Changer for Small, Medium, and Large Businesses.

    This IBM Redguide™ publication provides information about IBM Social Business and includes details about the business need and the value of transformation to a social business. It presents a high-level Social Business component diagram, highlights key capabilities, and includes customer case studies that exemplify how some of these capabilities can...

    Sponsored By IBM

  • White Papers // Apr 2014

    Protect people, processes and technology from web appliation threats

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect their businesses.

    Sponsored By IBM

  • Videos // Jul 2014

    Introduction to Operations Orchestration

    This video introduces operations orchestration and shows how to build a very simple flow in operations orchestration. Watch now-and learn how to improve automation deployment time, manage scale, improve consistency and increase automation reliability.

    Sponsored By HP

  • White Papers // Apr 2014

    Office 365 – Bringing Enterprise-Class Cloud Email Capabilities to the Masses

    Learn how migrating to the Microsoft® Office 365 cloud-based messaging and collaboration solution can benefit your organization’s business-critical email infrastructure in terms of availability, functionality and cost savings in this webcast from Dell™.

    Sponsored By Dell Software

  • Downloads // Mar 2007

    Convert an XML file into an Excel spreadsheet with this technique

    Developers often deal with information that is in no way user-friendly without really thinking about how a user would handle it. XML is a prime example --- most users don't know what to make of it. One way to present XML information to a user is by converting...

    Provided By Edmond Woychowsky

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • White Papers // Feb 2014

    Google Apps for Business - Simple, Proven, Transformative

    1-page overview of the benefits provided by Google Apps for Business. How Google Apps for Business helps users work better together while bringing you the benefits of pure cloud. Learn why 5 million businesses have gone to Google Apps for Business to lower costs and liberate IT. Download this quick...

    Provided By Google

  • White Papers // Feb 2014

    Research - Google Apps ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled “Cloud Business Email - Market Quadrant 2013”, the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati’s findings can be downloaded here. Download this quick...

    Provided By Google

  • Downloads // Feb 2005

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic

  • Webcasts // Apr 2014

    On-demand Webcast: How to Simplify Deployment of Google Apps and Office 365

    Google Apps and Microsoft Office 365 each has its own vast ecosystem, from email to office applications to identity management. Google would prefer you live entirely in the Google environment, while Microsoft would prefer you live entirely in its Exchange/Office 365/Active Directory infrastructure. You are likely using a combination of...

    Provided By Centrify

  • White Papers // Jul 2012

    Frequent Pattern Mining in Social Network Data (Facebook Application Data)

    Data Mining is a process, which involves identification of useful patterns and gathers knowledge which was hidden earlier. It involves various processes of which classification, association rule mining and clustering gain major attention. One of the emerging application areas of Data Mining is Social Networks. In this paper, the authors...

    Provided By EuroJournals

  • White Papers // Feb 2014

    Forrester Study - Total Economic Impact of Google Apps

    For companies considering switching to Google Apps from a traditional, on-premise environment for messaging and collaboration, this Forrester Study shows that Google Apps can reduce IT costs while offering even greater gains in employee productivity. Download this quick synopsis to find out more.

    Provided By Google

  • Downloads // May 2014

    Simplify Desktop and Application Access Management – PowerTerm WebConnect

    With the current BYOD trend and the need to reduce IT workload, organizations need to empower users with secure, browser-based access to Windows Applications and Desktops from any device, anywhere - simply and cost-effectively. PowerTerm® WebConnect provides secure and mobile, managed access from office and remote locations to Windows...

    Provided By Ericom Software

  • White Papers // Sep 2011

    Development of an Expert System for Dust Explosion Risk Management Based on ASP.Net and Prolog

    Dust explosions always claim lives and cause huge financial losses. Dust explosion risk can be prevented by inherently safer design or mitigated by engineering protective system. Design of explosion prevention and protection needs comprehensive knowledge and data on the process, workshop, equipment, and combustible materials. The knowledge includes standards, expertise...

    Provided By Academy Publisher

  • eBooks // Aug 2013

    Content Marketing: Optimizing the Online Customer Experience

    Companies of all sizes have come to realize that content marketing via the web is critical to their success. The real challenge now is not only figuring out how to manage all the content required, but also dynamically getting the right content in front of the right customers at the...

    Provided By Acquia

  • Tools & Templates // Aug 2002

    Sample project proposal template

    Being able to quickly explain the potential benefits of an added Web site feature can help a consultant address a client's concerns over a project's importance. This project proposal sheet will help persuade your clients to take the plunge.

    Provided By TechRepublic

  • Presentations // Jun 2014

    WebEx Viewpoints: Collaboration in the Workplace

    Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Viewpoints: Training

    WebEx allows companies to train employees effectively, anytime and anywhere. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • White Papers // Feb 2014

    FTP Risk Advisor Tool

    By answering 12 questions, this online tool will provide you with a customized report with recommendations to remediate your FTP risk.

    Provided By IBM

  • Downloads // Mar 2013

    You multi-task at work. Your software should, too.

    All-in-One, Easy Batch Scanning- Kofax Express makes it easy for anyone to scan, organize and store documents, at speeds that make short work of batches big and small. Easy enough for beginners, powerful enough for pros; let Kofax show you the new Express route to document scanning. Free trial software...

    Provided By Kofax

  • White Papers // Mar 2011

    Voice of the Customers: Mining Online Customer Reviews for Product Feature-Based Ranking

    Increasingly large numbers of customers are choosing online shopping because of its convenience, reliability, and cost. As the number of products being sold online increases, it is becoming increasingly difficult for customers to make purchasing decisions based on only pictures and short product descriptions. On the other hand, customer reviews,...

    Provided By Northwestern University

  • White Papers // Apr 2009

    Information Theory Meets Game Theory on The Interference Channel

    The authors consider a game theoretic model for two users communicating over an interference channel, in which each user can autonomously select its encoding and decoding strategy with the objective of maximizing its own rate. They give an information theoretic formulation for this game, which enables users to define a...

    Provided By Northwestern University

  • White Papers // Mar 2010

    Usability of Browser-Based Tools for Web-Search Privacy

    Web search is currently a source of growing concern about personal privacy. It is an essential and central part of most users' activity online and therefore one through which a significant amount of personal information may be revealed. In an earlier paper, the authors showed that there are security weaknesses...

    Provided By Yale University

  • White Papers // Aug 2009

    Googling the Internet: Profiling Internet Endpoints via the World Wide Web

    Understanding Internet access trends at a global scale, i.e., how people use the Internet, is a challenging problem that is typically addressed by analyzing network traces. However, obtaining such traces presents its own set of challenges owing to either privacy concerns or to other operational difficulties. The key hypothesis of...

    Provided By Northwestern University

  • White Papers // Feb 2009

    Rate-Constrained Collaborative Noise Reduction for Wireless Hearing Aids

    Hearing aids are electronic, battery-operated sensing devices which aim at compensating various kinds of hearing impairments. Recent advances in low-power electronics coupled with progresses made in digital signal processing offer the potential for substantial improvements over state-of-the-art systems. Nevertheless, efficient noise reduction in complex listening scenarios remains a challenging task,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2009

    Assurance Cases for Design Analysis of Complex System of Systems Software

    This paper discusses the application of assurance cases as a means of building confidence that the software design of a complex system of systems will actually meet the operational objectives set forth in the project's top-level requirements. The discussion will explain the reasons for selecting the assurance case approach and...

    Provided By American Institute of Aeronautics and Astronautics