Software

Software-as-a-service offers cost savings, scalability and mobile accessibility -- if you correctly manage the resulting SLAs, APIs and data structures.

  • White Papers // May 2015

    Planar Graph in Data Encryption

    Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) - conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that...

    Provided By International Journal of Advance Research in Science and Engineering (IJARSE)

  • Webcasts // May 2015

    On the Effectiveness of Full-ASLR on 64-Bit Linux

    The effectiveness of ASLR hinges on the entirety of the address space layout remaining unknown to the attacker. Only executables compiled as Position Independent Executable (PIE) can obtain the maximum protection from the ASLR technique since all the sections are loaded at random locations. The presenter has identified a security...

    Provided By SecurityTube.net

  • White Papers // May 2015

    The Intelligent Flexible Cloud

    Network applications and services today are nearly unrecognizable from a few decades ago. The diversity, scale, and dynamic evolution of apps, services, data, and devices have led to a corresponding evolution within service provider environments. Public, private, and hybrid clouds are ascendant. Software-based approaches to more agile network management and...

    Provided By ARM

  • White Papers // May 2015

    Securing SOA Services

    Corporations, worldwide, are steadily adopting SOA as a technique to establish enterprise architecture within their organizations. SOA exposes specific services that mimic business functions performed by the system. These services are consumed by either other parts of the system or the users directly. The advantages provided by SOA services have...

    Provided By Microsoft

  • Research // May 2015

    Definitive Guide to Advanced Threat Protection

    Despite billions spent annually on traditional perimeter and endpoint-based security defenses, advanced threat actors cause enterprises and government agencies to make headlines every day - for all the wrong reasons. This eGuide explores recent innovations in perimeter and host-based advanced threat protection technology, combined with new network forensics capabilities, are...

    Provided By FireEye

  • White Papers // May 2015

    Reducing Total Cost of Ownership with Flash Storage

    This whitepaper explores several of the total cost of ownership (TCO) benefits associated with flash storage compared to those of traditional hard disk storage environments. Experiences of customers with NetApp flash storage solutions demonstrate how deployment of flash storage can translate into a lower TCO than that provided by traditional...

    Provided By NetApp

  • White Papers // May 2015

    Lab Evaluation of NetApp- Hybrid Array with Flash Pool Technology

    NetApp commissioned Demartek to evaluate the effectiveness of Flash Pool with different types and numbers of hard disk drives using an online transaction processing (OLTP) database workload, and to evaluate the performance of Flash Pool in a clustered Data ONTAP environment during a cluster storage node failover scenario. In...

    Provided By NetApp

  • White Papers // May 2015

    Delivering Customer Value with Enterprise Flash Deployments

    In this whitepaper, IDC examines the growing use of flash technology across the enterprise and how the technology is being deployed to improve performance and efficiency. This whitepaper explores various aspects associated with deploying flash technology and discusses the importance of a full portfolio of flash solutions that is designed...

    Provided By NetApp

  • Videos // May 2015

    Moving Beyond Proxies

    Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today’s advanced threats. There was a time when proxies fulfilled a need traditional firewalls could not meet - visibility into web traffic starting with categorization of HTTP...

    Provided By Palo Alto Networks

  • White Papers // May 2015

    ESG: Public Cloud Trends

    Early server virtualization was based on consolidation and cost containment. Today, automation, elasticity, and usage-based tracking is transforming virtualized data centers into private cloud infrastructures.

    Provided By NetApp

  • White Papers // May 2015

    The Numbers Game Infographic - How Many Alerts is too Many to Handle

    Security alerts come in by the thousands every month, and you and your IT team are tasked with handling each one. Even when alerts are caught and categorized correctly, the sheer volume is overwhelming. And when they’re not responded to quickly, the consequences can be disastrous. This Infographic report illustrates...

    Provided By FireEye

  • White Papers // May 2015

    Maginot Revisited - More Real-World Results from Real-World Tests

    Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. In May 2014, FireEye and Mandiant, a FireEye company, published “Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model.” The first-of-its-kind study examined data from more than 1,200 security deployments...

    Provided By FireEye

  • White Papers // May 2015

    Hacking the Street - FIN4 Likely Playing The Market

    FireEye is currently tracking a group that targets the email accounts of individuals privy to the most confidential information of more than 100 companies. The group, which we call FIN4, appears to have a deep familiarity with business deals and corporate communications, and their effects on financial markets. This report...

    Provided By FireEye

  • Case Studies // May 2015

    Advanced Guide to Software Development Outsourcing: A Case for Software Product Companies

    A European company with 200 employees and a global leader in image processing with an extensive portfolio of innovative products. Their solutions help to enhance user experience in all aspects of digital imaging. The customer wanted to create a cross-platform desktop application to make image processing easier for professional photographers....

    Provided By ScienceSoft

  • White Papers // May 2015

    High-Level Portable Programming Language for Optimized Memory Use of Network Processors

    Network Processors (NPs) are widely used for programmable and high-performance networks; however, the programs for NPs are less portable, the number of NP program developers is small, and the development cost is high. To solve these problems, this paper proposes an open, high-level, and portable programming language called \"Phonepl\", which...

    Provided By Scientific Research

  • White Papers // May 2015

    A MATLAB-Based Numerical and GUI Implementation of Cross-Gradients Joint Inversion of Gravity and Magnetic Data

    "The cross-gradients joint inversion technique has been applied to multiple geophysical data with a significant improvement on compatibility, but its numerical implementation for practical use is rarely discussed in the literature. The authors present a MATLAB-based three-dimensional cross-gradients joint inversion program with application to gravity and magnetic data. The input...

    Provided By Scientific Research Publishing

  • White Papers // May 2015

    Formalization of Federated Schema Architectural Style Variability

    "Data integration requires managing heterogeneous schema information. A federated database system integrates heterogeneous, autonomous database systems on the schema level, whereby both local applications and global applications accessing multiple component database systems are supported. Such a federated database system is a complex system of systems which requires a well-designed organization...

    Provided By Scientific Research Publishing

  • White Papers // May 2015

    Semantic Enrichment of XML Schema to Transform Association Relationships in ODL Schema

    "In this paper, the authors present an approach for transforming an XML schema they enriched in ODL (Object Definition Language) schemas. It is possible to realize the concepts of ODL in a model of XML schema; they propose to introduce an enrichment concretizing these concepts in the XML schema models....

    Provided By Scientific Research Publishing

  • White Papers // May 2015

    Prioritization of Re-Executable Test Cases in Model Based Environment-A Survey

    "In case of regression testing and prioritization approaches, specification level design and requirements concerns motivate changes in the source code. Traditional approaches are bottom up (or white box) and do not leverage on these concerns, so the new concept which considers these concerns is developed called as model based testing...

    Provided By Creative Commons

  • White Papers // May 2015

    Timed-Automata Based Model-Checking of a Multi-Agent System: A Case Study

    "A multi-agent based transport system is modeled by timed automata model extended with clock variables. The correctness properties of safety and liveness of this model are verified by timed automata based UPPAAL. Agents have a degree of control on their own actions, have their own threads of control, and under...

    Provided By Scientific Research Publishing

  • Webcasts // May 2015

    Ruby Meta-Programming: Here's How to Do It Wrong

    Ruby is a powerful programming language, it includes way to write dynamic code at run time, this is called meta-programming. Meta-programming, everyone's favorite Rubyism to hate. It can lead to less code, more abstraction and tears of pain and sorrow. During the review of lots of rails and ruby applications...

    Provided By SecurityTube.net

  • White Papers // May 2015

    IBM Security zSecure Suite

    The IBM Security zSecure suite is a mainframe security administration, audit, compliance and security intelligence family of solutions.

    Provided By IBM

  • White Papers // May 2015

    IAM Buyers Guide: Select the Right Solution for Identity and Access Assurance

    This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and...

    Provided By IBM

  • White Papers // May 2015

    Mitigating Risk with Security Intelligence and Identity Assurance

    IBM Security QRadar and IBM Security identity and access management solutions deliver out-of-the-box integration, enabling organizations to quickly identify anomalies in user behavior, protect against insider fraud and demonstrate compliance with growing security regulations.

    Provided By IBM

  • White Papers // May 2015

    Simplify Cloud Integration and Identity Silos with IBM Security Solutions

    IBM Security identity and access management solutions help enhance enterprise security by providing cross-silo visibility into all available identities within the enterprise and unifying the enterprise-wide ''universe of identities,'' including cloud-based identities.

    Provided By IBM

  • White Papers // May 2015

    Towards Designing an Intelligent Educational Assessment Tool

    "Assessment is an important part of learning process. It can be defined as the process of gathering information for the purpose of making judgments about a current state of affairs presumably for the purpose of enhancing future outcomes. It determines whether or not the goals of education are being met....

    Provided By Scientific Research Publishing

  • Webcasts // May 2015

    Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

    Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.

    Provided By SecurityTube.net

  • White Papers // May 2015

    A Comparitive Study Of: Quality Assessment of Object Oriented Software at Design Level

    "In this paper, the authors approach a quality assessment tool which will achieve the quality parameter at the design level. Earlier, in every case, they check the quality after the completion of software means when software is coded and ready to use then they come to know that high quality...

    Provided By Creative Commons

  • Videos // May 2015

    The Next IT Evolution: Hitachi Mobility Platform

    This video provides an overview of the next IT infrastructure generation that will help you to access your data anywhere, any time and from any device. In this video Hitachi is explaining how you can securely share data, speed collaboration, and balance resources and costs between private and public clouds.

    Provided By Hitachi Data Systems

  • White Papers // May 2015

    A Road Map to Content Mobility

    Data security is getting more complicated. Compliance is touching more and more data. Too much data is stored solely on user devices. You need data in the right place at the right time, with the visibility and control to ensure that it’s handled appropriately. This roadmap will help you choose...

    Provided By Hitachi Data Systems

  • White Papers // May 2015

    Choose the Most Secure Object Storage for Your Hybrid Cloud

    Data mobility is changing the way that businesses work. Organizations, lines of business, and even individual users can run applications, store data cheaply, and access content from anywhere. This puts IT in a tough position. What they need is a new approach for storing and accessing data: one where the...

    Provided By Hitachi Data Systems

  • White Papers // May 2015

    Data Mobility and Control Can a CIO have Both?

    Whether they are travelling across town or across the globe, today’s tech-savvy employees increase their productivity and connectedness with numerous personal devices. The potential for collaboration through these devices is so great that employees often solve their file sharing needs through publicly available cloud storage services. This is a practice...

    Provided By Hitachi Data Systems

  • Webcasts // May 2015

    NACL: A New Crypto Library

    NaCl (pronounced \"Salt\") is a new easy-to-use high-speed software library for encryption, decryption, signatures, etc. NaCl's goal is to provide the entire core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations, but NaCl improves security, improves usability, and improves speed.

    Provided By SecurityTube.net

  • Webcasts // May 2015

    The Windows Sandbox Paradox

    More user applications are relying on sandboxes to limit the damage remote code execution vulnerability can inflict. It started with Web browsers such as with Internet Explorer's protected mode and now covers many different applications. Unfortunately the Windows operating system isn't well matched to providing secure sandboxing.

    Provided By SecurityTube.net

  • White Papers // May 2015

    Real Time Monitoring and Controlling System

    In recent years, the number of network enabled digital devices at homes, use of android smart phones and internet has been increasing fast. The owners have been requesting for monitoring and control of home appliances remotely, when the user is away from the place. In this paper, \"Real time monitoring...

    Provided By The International Journal Of Engineering And Science (IJES)

  • White Papers // May 2015

    Update your Windows

    HP Technology Services for Microsoft Windows 2003 end of support (EOS) and Microsoft migrations With Microsoft Server 2003 support ending on July 14, 2015, you face many issues by not migrating, including failure to meet compliance standards, lack of security and updates, and a higher overall cost to maintain....

    Provided By HP

  • White Papers // May 2015

    Migrate to the New Style of IT

    Microsoft Windows Server 2003 Migration Program for enterprise businesses Microsoft will end support for Windows Server 2003 on 14 July 2015. This will have a dramatic impact on your business, and every moment you wait to begin your migration increases the costs, risks, and complexities you face. Read...

    Provided By HP

  • White Papers // May 2015

    5 Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper...

    Provided By HP

  • White Papers // May 2015

    Studying an Effective Contribution of Techniques of Video Compression

    With the use of 3G and 4G network, the channel capacity of a network is highly increased to fit various dynamic need of existing customers, where majority of the applications they preferred are video based e.g. video calls, sharing and downloading video, video streams etc. Hence, in such situation video...

    Provided By Creative Commons

  • White Papers // May 2015

    Information Governance Confidence Calculator: English

    Confidence in information is vital for business users who make impactful decisions based on analytical insights. While easy to define, confidence has proven difficult to measure and visualize. To address this need, Aberdeen Group has developed the Information Confidence Calculator (ICC).

    Provided By IBM