Software

Software-as-a-service offers cost savings, scalability and mobile accessibility -- if you correctly manage the resulting SLAs, APIs and data structures.

  • White Papers // Apr 2015

    Proposed Fuzzy CPU Scheduling Algorithm (PFCS) for Real Time Operating Systems

    In the era of supercomputers multiprogramming operating system has emerged. Multiprogramming operating system allows more than one ready to execute processes to be loaded into memory. CPU scheduling is the process of selecting from among the processes in memory that are ready to execute and allocate the processor time CPU...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Apr 2015

    Quickbooks on Cloud: Surviving and Thriving in the World of Cloud

    With the accounting industry moving towards cloud on a fully online working model, users believe that moving their applications to the cloud is the best option they have. Hosting QuickBooks desktop edition means that the service provider installs and manages the software and files on their cloud-based servers. Users don't...

    Provided By Intuit

  • White Papers // Apr 2015

    Implementation of Linux Based Uart Device Driver

    In this paper, the authors deal with design, implementation and testing of device driver for a DUART TL16C2550 peripheral on a MDROADM board. The MDROADM board is used in optical networks for switching the optical signals between the nodes. The MDROADM board is designed with a MPC8308 PowerQUICC II Pro...

    Provided By eSAT Publishing House

  • White Papers // Apr 2015

    Unity 7: GUI Baesd Design Platform for Ubuntu Touch Mobile OS

    Day-by-day the mobile industry is growing. Along with its mass usage the applications used in these devices are also increasing. So it is of utmost importance that the GUI should be fast, fresh and user friendly. Unity 7 is the GUI which provides the platform for the Touch interface for...

    Provided By eSAT Publishing House

  • eBooks // Apr 2015

    Beyond Next-Generation Firewalls

    Cyberattacks are increasing every year, in both number and variety. But whether the malicious goal is money, espionage or disruption, you can protect your network and your business by applying the right security technology. Malicious actors have been innovating at a ferocious pace, and three- or four-year-old firewalls simply...

    Provided By Dell Software

  • White Papers // Apr 2015

    IBM MobileFirst Collaboration Services service profile

    In an increasingly mobile and far-flung business world, unified communications and collaboration (UCC) is becoming a must-have capability. By converging voice, data and video communications, UCC provides instant messaging, softphones, online meetings and other capabilities to improve productivity while reducing costs for travel and telecommunications. Read this service profile to...

    Provided By IBM

  • White Papers // Apr 2015

    IBM MobileFirst Infrastructure Consulting Services service profile

    Can your existing IT infrastructure support your mobility initiatives? Do you know? Too many businesses are implementing mobility projects piecemeal, with no clear view of the infrastructure needed to support them, or of which initiatives will bring true value to the business. Read this engagement profile to learn how IBM...

    Provided By IBM

  • White Papers // Apr 2015

    Cloud-based data backup: a buyer's guide

    Many IT executive view cloud computing as an attractive platform for data backup. They know cloud can help protect business-critical data and provide near-ubiquitous information access. But while having a cloud-based solution is valuable, developing one in-house is tricky. That's why many organizations want to contract with a third-party cloud...

    Provided By IBM

  • White Papers // Apr 2015

    2014 Global Cost of Data Breach Study

    How much can a data breach cost? And are you doing enough to prevent it from happening to you? The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations. Read this critical research to...

    Provided By IBM

  • White Papers // Apr 2015

    IBM Security Services 2014 Cyber Security Intelligence Index

    When IBM talked to 1,000 clients about security attacks that occurred in 2013, three things became abundantly clear: criminals are relentless, every business—across every industry—is affected, and your perimeter may have already been breached. Read the white paper to learn the findings from the analysis of billions of security events...

    Provided By IBM

  • White Papers // Apr 2015

    NSS Labs Report: Breach Detection Systems Comparative Analysis

    In recent NSS Labs testing, Trend Micro™ Deep Discovery scored the highest in breach detection of all products, including those from AhnLab, Fidelis, FireEye, Fortinet, and Sourcefire. Download NSS Labs' 2014 Security Value Map (SVM) for Breach Detection Systems to compare test results and see why Deep Discovery should...

    Provided By Trend Micro

  • White Papers // Apr 2015

    Big Data, Little Data, and Everything in Between - IBM SPSS Solutions Help You Bring Analytics to Everyone (Ziff Davis)

    Regardless of the type or scale of data your users need to harness and analyze, IBM SPSS Solutions offer a straightforward, visual solution that is easy to use on the front end and highly scalable on the back end.

    Provided By IBM

  • White Papers // Apr 2015

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

    Provided By Coverity

  • Webcasts // Apr 2015

    Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

    Provided By Coverity

  • Webcasts // Apr 2015

    5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

    Provided By Coverity

  • White Papers // Apr 2015

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Provided By Coverity

  • White Papers // Apr 2015

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Provided By Coverity

  • Research // Apr 2015

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva

  • Research // Apr 2015

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Provided By Imperva

  • Webcasts // Apr 2015

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • White Papers // Apr 2015

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Provided By Imperva

  • Videos // Apr 2015

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Provided By Imperva

  • eBooks // Apr 2015

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Provided By Palo Alto Networks

  • White Papers // Apr 2015

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Provided By HP US

  • Case Studies // Apr 2015

    E-Guide: HP Case Studies

    Read this E-Guide to learn how wih new HP Officeject Pro X devices, you can meet your targets for saving energy and cut total print costs by around 50 per cent.

    Provided By HP

  • White Papers // Apr 2015

    Reducing Expenses Starts with the Programming Skills of Operations Groups

    Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today’s new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the...

    Provided By F5

  • White Papers // Apr 2015

    Three Key Principles to Accelerating Web Applications

    Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of...

    Provided By F5

  • White Papers // Apr 2015

    Headsets Mean Advantages for All

    Despite using multiple communication touchpoints everyday, studies show that nothing is more effective than voice at getting your point across.Headsets not only improve voice communication on calls, they also offer business benefits right the way across the enterprise. But as with all new technologies, some people will still need convincing....

    Provided By Plantronics

  • Downloads // Apr 2015

    Webroot protects your devices everywhere

    SecureAnywhere Endpoint Protection offers instantaneous protection and fast scans without the hassle of time-consuming patches and signature updates. You can get your free trial today - just click "download", fill out and submit the form, and we'll email you a download link and instructions. Then just go to your...

    Provided By Webroot Software

  • White Papers // Apr 2015

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Provided By Imperva

  • White Papers // Apr 2015

    2014 Insider Threat Report

    The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with 537 IT and Security managers in major European enterprises around the question of insider threats. Insider threats have expanded from the traditional insiders to privileged users of systems and the compromise of internal...

    Provided By Vormetric

  • White Papers // Apr 2015

    Using Encryption and Access Control for HIPAA Compliance

    Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH.

    Provided By Vormetric

  • White Papers // Apr 2015

    Workday Integration Cloud Connect Datasheet

    Companies need to integrate multiple third-party systems and applications to satisfy key business functions and processes. This document outlines the key benefits of Workday Integration Cloud Connect and the portfolio of integration products. Download this report to understand how Workday Cloud Connect provides pre-built connections to third-party applications and services....

    Provided By Workday

  • White Papers // Apr 2015

    Top 5 Things Every Developer Should Know

    C sharp has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects

    Provided By Coverity

  • White Papers // Apr 2015

    Cloud Service Platform for Julia Programming on Supercomputer

    It is difficult to deeply develop computing ability of supercomputer through programming. There are two approaches to resolve this problem. The first is that programmer masters advanced knowledge about architecture of the supercomputer. The second is to construct a friendly programming environment to ease the difficulties in parallel programming. Julia...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • Case Studies // Apr 2015

    Retail Giant, Gap Inc. Direct, Utilizes Red Hat And PowerBroker Identity Services \"AD Bridge\"

    The Gap Inc. is a specialty retailing firm that operates more than 3,100 retail and outlet stores within the United States and internationally. Their challenge is to ensure security and PCI compliance while managing system level access across the enterprise. They chose BeyondTrust to overcome this challenge. PBIS Enabled Gap...

    Provided By BeyondTrust

  • Case Studies // Apr 2015

    Off shore Call Center Locks Down Thousands of Linux Desktops

    This leading global financial services firm operates with more than 150,000 employees in over 50 countries. Their challenges are to manage the customer service division's offshore call center had grown to over 5,000 Linux desktops that needed to be better managed and secured. They chose BeyondTrust to overcome these challenges....

    Provided By BeyondTrust

  • White Papers // Apr 2015

    XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments

    XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data. However, XML document structure is considered a huge and bulky data that can be reduced to minimize bandwidth usage, transmission time, and maximize performance. This contributes to a more efficient and...

    Provided By HELWAN UNIVERSITY

  • White Papers // Apr 2015

    QoE Support for Multi-Layered Multimedia Applications

    Congestion control protocol and bandwidth allocation problems are often formulated into Network Utility Maximization (NUM) framework. Existing solutions for NUM generally focus on single-layered applications. As applications such as video streaming grow in importance and popularity, addressing user utility function for these multi-layered multimedia applications in NUM formulation becomes vital....

    Provided By University of Massachusetts Amherst

  • White Papers // Apr 2015

    The Expansion of 3D Wireless Sensor Network Bumps Localization

    Bump localization of wireless sensor network is a hot topic, but present algorithms of 3D wireless sensor node localization are not accurate enough. In this paper, the DR-MDS algorithm is proposed, DR-MDS algorithm mainly calibrates the coordinates of nodes and the ranging of nodes based on multidimensional scaling, it calculates...

    Provided By International Journal of Engineering Research and Applications (IJERA)