Information Technology


How a Hacker Breaks An Application with Vulnerability Chaining

Sometimes the exploit of a single vulnerability can lead to newsworthy stories of businesses getting compromised. But more often...

User Onboarding And Deprovisioning In Google Apps

User management is one of the most important roles of Google Apps administrators, and the processes of onboarding and...

Eagle Bank Secures Deposits and Customer Data with Single Sign-On

When a security audit revealed the bank\'s password-protection vulnerability, Eagle Bank, a mutual bank with over $430 million in...

Top 10 Smart Steps to Maximize eCommerce Revenue 2013

This informative 2013 Bestpractices eGuide from BlueSnap talks about the top 10 steps that can be adopted to Maximize...

The Intelligent Integrated Enterprise Advantage

Read this paper to learn how you can create an intelligent, integrated enterprise that dramatically increases both customer satisfaction...

Behavior-Driven Development and BRMS

Behavior-driven development is an agile application life-cycle management framework that helps developers and business experts communicate effectively. Red Hat...

Is an Open Source Business Process Management Solution Right for You?

If you are considering deploying business process management (BPM) solutions, but have been daunted by the cost, footprint, risk,...

Design Patterns in Production Systems

Design patterns are reusable, mini-software architectures created to solve particular classes of implementation problems that frequently arise in practice....

Building a Better IT Service Channel

How do you build a better service channel for your company? As IT has evolved, support teams face the...

Building a Better IT Service Channel

How do you build a better service channel for your company? As IT has evolved, support teams face the...

Embedded Devices and Data Thieves

In an era known as \"the Internet of Everything,\" embedded devices are on the rise - still embedded security...

Building a Better IT Service Channel

As IT has evolved, support teams face the task of providing better service while reducing budgets and headcount at...

How Red Hat\’s JBoss Enterprise Application Platform 6 Is Extending Business Value

This white paper leverages IDC primary research and buyer-focused research to derive an understanding of the customer perception of...

Top 10 reasons to choose Red Hat JBoss Enterprise Application Platform

When it comes to building, deploying, and managing enterprise-level Java™ applications and services, could you benefit from a more...

[Lab Report] Mixed All Flash Array Delivers Safer High Performance

MLC and SLC are the most common types of flash used in storage systems. MLC is less expensive but...

Changing the economics of storage with Dell Compellent Flash-optimized solutions

Dell™ Compellent™ Flash-optimized solutions can help organizations align storage performance with application requirements and optimize both performance and capacity....

An Innovative Simulation Workflow for Debugging High-Speed Digital Designs Using Jitter Separation

This paper presents a new simulation workflow for jitter separation analysis. Jitter separation is a very promising tool that...

5 Most Common Critical SQL Integrity Issues

A crucial part of managing SQL Server is performing regular integrity checks — but what do you do when...

Google Apps Guide: User Onboarding and Deprovisioning in Google Apps

User management is one of the most important roles of Google Apps administrators, and the processes of onboarding and...

The economics of cloud managed integration

In this paper we will consider what is required to enable cloud-managed integration from a technical perspective. Much of...
 
Page 143 of 153«141142143144145»