Browser

The browser wars are not about to ease up anytime soon. Keep up with the latest vulnerabilities of browsers and learn about the advantages of newer ones here.

  • White Papers // Sep 2013

    What Is an Ethernet Fabric?

    This paper reviews classic Ethernet architecture in light of new data center requirements, provides an overview of the differences between traditional Ethernet and Ethernet fabrics, and explains how Ethernet fabrics can be used to address emerging data center challenges.

    Provided By Brocade

  • White Papers // Sep 2013

    Securing Application Delivery in a Post-TMG World

    For many organizations, Microsoft’s Threat Management Gateway (TMG) was a critical reverse-proxy security solution for Exchange and SharePoint publishing. The Microsoft announcement of TMG’s end-of-sale in 2012 and the end-of-support in 2015 left organizations without a long-term solution for securing their existing Exchange and SharePoint deployments. Barracuda Networks has a...

    Provided By Barracuda Networks

  • Podcasts // Sep 2013

    Implementing Single Sign-On for Office 365: Why must it be so complex?

    Learn more from Microsoft expert Randy Franklin Smith. View the webinar now!

    Provided By Centrify

  • White Papers // Aug 2013

    Windows XP Ends Support in April 2014. How Will U.S. Businesses Be Affected?

    The end of support date for Windows XP-April 8, 2014-is rapidly approaching, after which the potential for security vulnerabilities will dramatically increase. Companies with lots of Windows XP machines still in use need help upgrading in this compressed timeframe. Lenovo has an answer, as its image Technology Center (ITC) services...

    Provided By Lenovo

  • White Papers // Aug 2013

    Managing Social Content to Maximize Value and Minimize Risk

    The use of social business applications can lead to improved collaboration, knowledge sharing and innovation across your organization. It also creates a new set of content management challenges. How can you incorporate knowledge and information generated in interactions into business processes and put it to work for the larger organization?...

    Provided By IBM

  • White Papers // Aug 2013

    Tech Brief: Exchange 2013 Data Loss Prevention

    Ensuring that sensitive data does not leave an organization has been one of the most challenging tasks for Exchange administrators. The new DLP (data loss prevention) feature in Exchange 2013 and Exchange Online in Office 365? enables administrators to control the flow of sensitive information within the organization, as well...

    Provided By Dell Software

  • White Papers // Aug 2013

    Discover 10 Steps to Securing Active Directory

    Active Directory user accounts are crucial to security because they are the basis for authentication and initial access to the network, systems, and applications. And maintaining AD in a clean, organized, and secure state is a challenge for organizations. But what if you could reduce costs while improving AD security...

    Provided By Dell

  • White Papers // Jul 2013

    Four Reasons to Adjust Your Endpoint GRC Strategy

    With the growing use of tablets, smartphones, and ultrabooks, companies today must support a much wider variety of endpoint devices. And as the population becomes more mobile, there is an increasing overlap between the use of these devices for personal and work life. Most importantly, the data stored on these...

    Provided By Absolute Software

  • White Papers // Jul 2013

    - Essential IPAM Vol 3: Introduction to Routing

    This paper examines the basics of routing protocols and the logic behind various routing methods. Learn how data is routed in Layer 3 and the logic used to make routing decisions. Specifically this paper will provide an overview of: Routing Concepts Routing Mechanisms Building an RIP...

    Provided By SolarWinds

  • White Papers // Jul 2013

    ROI for IPAM Solutions in Small-Mid Sized Enterprise Environments

    Learn about the opportunities for realizing the ROI of controlled management of IP addresses with this free white paper from Enterprise Management Associates (EMA). When an organization is small, managing IP address space is typically managed with paper and pencil or in an Excel spreadsheet. However, as a network grows...

    Provided By SolarWinds

  • Podcasts // Jul 2013

    How To Avoid IP Address Conflicts

    An IP address conflict occurs when two computers on the same network have been assigned the same IP address. This conflict causes malfunction of communication from/to "shared" IP Address and can spiral into a frantic troubleshooting event. In this video we will discuss how to identify, resolve and prevent static...

    Provided By SolarWinds

  • Videos // Jul 2013

    How-To Configure NetFlow on a Cisco Router

    SolarWinds Head Geek provides helpful tips for enabling NetFlow on Cisco routers. Discover how powerful NetFlow technology can help you determine the types of traffic on your network, where it's coming from, and where it's going. Watch Video>> (No Reg Required)

    Provided By SolarWinds

  • White Papers // Jul 2013

    Test Drive the Interactive Online Demo – No Registration Required!

    Static spreadsheets and home-grown IP address management tools just don't cut it in today’s increasingly dynamic networks. Experience a better solution when you visit SolarWinds IP Address Manager online demo. Check out features like: Centralized IP infrastructure management, monitoring, alerting and reporting Automated IP address space scans...

    Provided By SolarWinds

  • Case Studies // Jul 2013

    Equifax

    As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it...

    Provided By IBM

  • White Papers // Jul 2013

    Architecting for the Future: Converged Medical Infrastructure Improves Patient Care and Clinician Efficiency

    The Greater Philadelphia health system recently selected HP for its converged medical infrastructure (CMI) platform and is using GE Healthcare's PACS and radiology information system (RIS). This report on that experience provides lessons learned and guidance for healthcare providers considering building a converged medical infrastructure. The industry drivers...

    Provided By HP and Intel®

  • White Papers // Jul 2013

    The State of the Healthcare Data

    Learn more about the online survey that UBM Tech conducted on behalf of HP exploring "The State of Healthcare Data". The exclusive reserach survey reveals the impact of consolidation and centralization on healthcare infrastructures. Sponsored by HP and Intel®: Intel...

    Provided By HP and Intel®

  • White Papers // May 2013

    A Comprehensive Solution to Cloud Integration

    This white paper describes how to integrate on-premise and cloud applications, including Oracle Cloud applications. The hub for these integrations are the Oracle SOA Suite and Oracle data integration products, part of Oracle Fusion Middleware, a unified platform that accommodates all types of information systems, deployment models, SaaS vendors, and...

    Provided By Oracle

  • White Papers // May 2013

    IDC Security Infographic

    From the Era Before security to this current era of empowerment this infographic from Blue coat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security...

    Provided By Blue Coat Systems

  • White Papers // May 2013

    Using Social to Improve Customer Experience

    With four out of five Americans now using social networks, the era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks - and potentially severe penalties for putting it off any longer. This whitepaper outlines four key ground rules...

    Provided By Oracle

  • White Papers // May 2013

    Batten Down The Hatches: Assessing threats to your ethernet network- A guide to protecting data in motion

    With the exponential growth in data volumes ('Big Data') &#59; rising adoption of Cloud services and use of remote data centres driving unprecedented movement of data throughout networks, data in motion is under increasing threat. Of all reported fraud, electronic information theft is now the most common at 27%. How...

    Provided By senetas AU

  • White Papers // May 2013

    Document Managements 10 Most Unwanted List

    The proliferation of scanned documents in today's business environment has exploded. With the ubiquitous Multi-Function Printer (MFP), getting a scan is as easy and common place as making a copy. But how many scanned documents get lost? because of incorrect tagging or limited filing protocols? This 10-page ebook provides the...

    Provided By VirtualWorks

  • White Papers // Apr 2013

    Performance testing for mobile applications

    This white paper reviews key mobile trends and analyzes how performance testers must change their testing methodologies to ensure they are accounting for the changes caused by mobile usage.

    Provided By Hewlett-Packard (HP)

  • White Papers // Apr 2013

    Deploying High-Density Pods in a Low-Density Data Center

    Simple and rapid deployment of self-contained, high-density pods within an existing or new low-density data center is possible with today’s power and cooling technology. The independence of these high-density pods allow for predictable and reliable operation of high-density equipment without a negative impact on the performance of existing low-density power...

    Provided By APC by Schneider Electric

  • Videos // Apr 2013

    LinkShare Uses Oracle Exadata for Real-time Data Analysis

    Jonathan Levine, COO from LinkShare, an online affiliate marketing network, discusses how Oracle Exadata’s extreme performance capabilities have enabled the company to offer Real-time Data Analysis to its clients.

    Provided By Oracle

  • White Papers // Apr 2013

    Methodology for Evaluating Content Providers

    The online shopping experience of today demands quality content and information. Many aspects of a user's site experience can be enhanced through improved content. Keep in mind that while a customer is on your site there is little opportunity to ask questions, so visitors must come to understand what you...

    Provided By CBS Interactive

  • White Papers // Apr 2013

    The 7 Key Factors In Choosing A Mobile Device Management Solution

    Managing a mobile workforce is a critical responsibility for today's IT departments. Users want freedom to choose which smartphone and tablet they use potentially creating security risks, compliance, data liability and support issues. The right Mobile Device Management solution enables IT administrators to address these challenges while increasing worker productivity...

    Provided By BlackBerry Enterprise Service

  • White Papers // Apr 2013

    ADCs and APM Solutions Will Combine to Optimize Delivery Intelligence

    As applications are consumed with different types of devices and via different types of connectivity the monitoring of end-user experiences is critical to gauging the satisfaction of the delivery of the application to the user. Content optimization technologies should automatically profile and analyze the device being used and apply specific...

    Provided By Riverbed

  • White Papers // Apr 2013

    Social Media Analytics - Making Customer Insights Actionable

    This white paper examines the role social media can play in presenting a more strategic view of customer data and how the right combination of technologies can deliver insight to help companies more effectively meet perpetually shifting consumer demands expressed through, and influenced by, these dynamic communication channels. Discover the...

    Provided By IBM

  • White Papers // Mar 2013

    Worst Data Breaches of 2012

    2012 was a big year for many things, including data theft and loss. In fact, there were a number of notable instances of data breaches in 2012, such as LinkedIn's 6.5 million stolen passwords, the U.S. Army's 36,000 personnel files and New York State Electric and Gas' 1.8 million customer...

    Provided By Idera

  • Webcasts // Mar 2013

    On-demand Webcast - Mobile Data Security: Why the Industry Must Improve - Or Else

    More than 1.2 billion smartphones will enter the market over the next five years, according to ABIResearch. This influx of mobile devices will forever change how business information is disseminated and stored. According to projections from an Enterasys survey, three out of four individuals believe their enterprise will implement BYOD...

    Provided By TechRepublic

  • White Papers // Mar 2013

    Cloud Integration - A Comprehensive Solution

    This white paper describes how to integrate on-premise and cloud applications, including Oracle Cloud applications. The hub for these integrations are the Oracle SOA Suite and Oracle data integration products, part of Oracle Fusion Middleware, a unified platform that accommodates all types of information systems, deployment models, SaaS vendors, and...

    Provided By Oracle

  • White Papers // Mar 2013

    Using Unified Communications in the Contact Centre

    Are you losing customers because they have to call your contact centre multiple times before their issues are resolved? Are your customers frustrated by the inability of your contact centre agents to communicate effectively with the rest of your organisation? Are you seeing a decline in customer loyalty and an...

    Provided By ShoreTel/NSC

  • White Papers // Mar 2013

    Dell PowerEdge C6220: Performance for large infrastructures

    Compact, high-performing servers and streamlined software are a necessity for any data center that provides multi-tier hosted Web solutions, cloud services, or other scale-out implementations. Customers need quick access to Web applications that power their business, and the databases that power those Web applications. In our tests, we found that...

    Provided By Principled Technologies

  • White Papers // Mar 2013

    Schema Formalisms for Unordered XML

    The authors consider unordered XML, where the relative order among siblings is ignored, and propose two simple yet practical schema formalisms: Disjunctive Multiplicity Schemas (DMS), and its restriction, disjunction-free Multiplicity Schemas (MS). They investigate their computational properties and characterize the complexity of the following static analysis problems: schema satisfiability, membership...

    Provided By Cornell University

  • White Papers // Mar 2013

    Lean Implementations of Software Testing Tools Using XML Representations of Source Codes

    By utilizing XML representations of source programs under test, a new approach is proposed to concisely implement some prototypes for TACCLE, a software testing methodology. The conversions between a source program and its XML representation can be easily realized using existing conversion tools. In this way, the conversion tools can...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Taking Advantage of Service Selection: A Study on The Testing of Location-Based Web Services Through Test Case Prioritization

    Dynamic service compositions pose new verification and validation challenges such as uncertainty in service membership. Moreover, applying an entire test suite to loosely coupled services one after another in the same composition can be too rigid and restrictive. In this paper, the authors investigate the impact of service selection on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    An Empirical Study of the Use of Frankl-Weyuker Data Flow Testing Criteria to Test BPEL Web Services

    Programs using Service-Oriented Architecture (SOA) often feature ultra-late binding among components. These components have well-defined interfaces and are known as web services. Messages between every pair of web services dually conform to the output interface of a sender and the input interface of a receiver. Unit testing of web services...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Securing Web Services Using XML Signature and XML Encryption

    This paper is aimed to evaluate the importance of XML Signature and XML Encryption for WS-Security. In today's e-business scenario, organizations are investing a huge amount of their resources in Web Services. Web Service Transactions are done mainly through plain-text XML formats like SOAP and WSDL, hence hacking them is...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    SOA Assessment Tool

    Discover if your company is lagging or leading in terms of Service Oriented Structure readiness. Learn about your ratings and how you compare to others in SOA. Then, customize a strategy based on the report to see where you can take it to the next step.

    Provided By Oracle

  • White Papers // Mar 2013

    Personalized Ontological Framework for Web Information Retrieval

    In proposed system personalized ontology for web information retrieval is introduced: specificity and exhaustively. Specificity describes a subject's focus on a given keyword. Exhaustively restricts a subject's semantic space dealing with the topic. Personalized ontology framework is proposed for knowledge representation and reasoning over behavior of users. This framework learns...

    Provided By University of Muenster