Software

With virtualization, mobile apps, and agile dev platforms, software increasingly defines business. Take advantage of our expert guidance for developing, managing, and monetizing software.

  • Framework to Evaluate Quality of Object Oriented Design

    White Papers // Feb 2015 // provided by Creative Commons

    In recent years, the usage of the object oriented paradigm in software development has increased. Consequently, by using object oriented software, new elements have been added to software development process. The design phase is the backbone to develop any object oriented software. Therefore, the object oriented metrics are used to ...

    Download Now
  • Survey on Silent Software Installation and LAN control using Android App

    White Papers // Feb 2015 // provided by Creative Commons

    In this paper, the authors demonstrate the silent software installation and LAN control from their wireless handheld device i.e. mobile phone. The software Installation can be performed without interaction of user and does not display any message or GUI during its progress of installation is called as silent unattended installation. ...

    Download Now
  • Reducing Total Cost of Ownership with Flash Storage

    White Papers // Feb 2015 // provided by NetApp

    This whitepaper explores several of the total cost of ownership (TCO) benefits associated with flash storage compared to those of traditional hard disk storage environments. Experiences of customers with NetApp flash storage solutions demonstrate how deployment of flash storage can translate into a lower TCO than that provided by traditional ...

    Read more
  • Lab Evaluation of NetApp- Hybrid Array with Flash Pool Technology

    White Papers // Feb 2015 // provided by NetApp

    NetApp commissioned Demartek to evaluate the effectiveness of Flash Pool with different types and numbers of hard disk drives using an online transaction processing (OLTP) database workload, and to evaluate the performance of Flash Pool in a clustered Data ONTAP environment during a cluster storage node failover scenario. In ...

    Read more
  • Delivering Customer Value with Enterprise Flash Deployments

    White Papers // Feb 2015 // provided by NetApp

    In this whitepaper, IDC examines the growing use of flash technology across the enterprise and how the technology is being deployed to improve performance and efficiency. This whitepaper explores various aspects associated with deploying flash technology and discusses the importance of a full portfolio of flash solutions that is designed ...

    Read more
  • ESG: Public Cloud Trends

    White Papers // Feb 2015 // provided by NetApp

    Early server virtualization was based on consolidation and cost containment. Today, automation, elasticity, and usage-based tracking is transforming virtualized data centers into private cloud infrastructures.

    Download Now
  • Moving Beyond Proxies

    Videos // Feb 2015 // provided by Palo Alto Networks

    Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today’s advanced threats. There was a time when proxies fulfilled a need traditional firewalls could not meet - visibility into web traffic starting with categorization of HTTP ...

    Watch Now
  • Advanced Guide to Software Development Outsourcing: A Case for Software Product Companies

    Case Studies // Feb 2015 // provided by ScienceSoft

    A European company with 200 employees and a global leader in image processing with an extensive portfolio of innovative products. Their solutions help to enhance user experience in all aspects of digital imaging. The customer wanted to create a cross-platform desktop application to make image processing easier for professional photographers. ...

    Download Now
  • Maginot Revisited - More Real-World Results from Real-World Tests

    White Papers // Feb 2015 // provided by FireEye

    Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. In May 2014, FireEye and Mandiant, a FireEye company, published “Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model.” The first-of-its-kind study examined data from more than 1,200 security deployments ...

    Read more
  • Hacking the Street - FIN4 Likely Playing The Market

    White Papers // Feb 2015 // provided by FireEye

    FireEye is currently tracking a group that targets the email accounts of individuals privy to the most confidential information of more than 100 companies. The group, which we call FIN4, appears to have a deep familiarity with business deals and corporate communications, and their effects on financial markets. This report ...

    Download Now