Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dev

Results 5726 - 5750 of 6141Sort Results By: Published Date | Title | Company Name
Published By: Meru Networks     Published Date: Aug 21, 2009
Universities and colleges are among the most aggressive adopters of Wi-Fi technology. The trend toward more collaborative and open learning environments, fueled by the explosive adoption of mobile devices among students and faculty, makes higher education campuses fertile ground for wireless LANs.
Tags : 
university, college, wi-fi, wifi, wlan, education, institution, wireless lan
    
Meru Networks
Published By: Objectivity     Published Date: Aug 21, 2009
This paper is an overview of the issues that arise from implementing object persistence with a relational database. The basis for this paper is our recent experience with Object-Oriented projects that used relational database technology.
Tags : 
c++, database development, web services, object oriented, database administrator, database administration, dba, objectivity
    
Objectivity
Published By: Objectivity     Published Date: Aug 21, 2009
There is often a great deal of confusion in determining whether an object database management system (ODBMS) is right for you. Most of this confusion can be resolved by focusing on your application's requirements. In those situations where the application requires the very clear advantages of an ODBMS, choosing which ODBMS becomes a continuation of the exercise of analyzing those application requirements.
Tags : 
database performance, object-oriented, database development, objectivity, software development
    
Objectivity
Published By: Objectivity     Published Date: Aug 21, 2009
As business users expand to newer types of applications, and grow older ones, their attempts to use RDBMS encounter the "Relational Wall," where RDBMS technology no longer provides the performance and functionality needed. This paper measures the wall, explains what model and architectural differences cause it, how to foresee it, and how to avoid it.
Tags : 
database, rdbmss, object, object-oriented, object oriented, database performance, database development, database architecture
    
Objectivity
Published By: OpSource     Published Date: Aug 21, 2009
SaaS is vastly different from traditional client-server software. Learn how to adapt a single instance, multi instance, or multi tenant application for effective SaaS delivery.
Tags : 
saas, software as a service, saas delivery, software development, service management, opsource
    
OpSource
Published By: Pointsec     Published Date: Aug 21, 2009
The use of handheld computers is estimated to grow by more than 50 percent in the next few years. This surge in use of mobile devices means that companies need to make sure their growing mobile workforce use devices that are secure so that handhelds do not become the weakest link in their security system.
Tags : 
secure mobile, secure laptop, laptop security, secure handheld, wireless security, network security, pointsec, wireless
    
Pointsec
Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management
    
Pointsec
Published By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : 
network security, security policy, government, security policies, policy based security, information security, data security, telecom
    
Pointsec
Published By: PTC     Published Date: Aug 21, 2009
This paper is designed to help CEOs, CFOs, and senior Engineering executives understand how and where to leverage the growing phenomenon known as Global Product Development as a means to gain a dramatic increase in productivity within their product development operation.
Tags : 
product lifecycle, product lifecycle management, plm, product development, productivity, ptc
    
PTC
Published By: PTC     Published Date: Aug 21, 2009
When launching products, creating manuals, providing customer service and doing other tasks that involve documentation, you cannot afford inefficiencies. IDC, the premier global provider of market intelligence, surveyed hundreds of companies to uncover common content-related inefficiencies and their costs. See the results in this white paper.
Tags : 
product lifecycle, product lifecycle management, plm, product development, productivity, efficiency, ptc
    
PTC
Published By: PTC     Published Date: Aug 21, 2009
How many times has your product gone to prototype, test or assembly and not worked quite right? How can you address all dependencies before testing and assembly? Find out in this free white paper.
Tags : 
product lifecycle, product lifecycle management, plm, product development, productivity, electromechanical, product testing, quality assurance
    
PTC
Published By: PTC     Published Date: Aug 21, 2009
In today's complex global life sciences marketplace, the ability to manage product information is a daunting task. The ability to ensure greater control over this critical product information has led to the development of a standard for product information throughout the European Union. If your company as not begun to think about PIM, now is the time, download this white paper immediately.
Tags : 
best practices, enterprise resource planning, enterprise software, product lifecycle management, plm, pim, product information, catalog
    
PTC
Published By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity
    
Reactivity
Published By: RuleStream     Published Date: Aug 21, 2009
The ability to harness intellectual property and product know-how is a key to competitive advantage. RuleStream appears to have broken through past technological barriers in rules-driven knowledge capture and reuse.
Tags : 
product development, market intelligence, business intelligence, competitive, business process automation, business process management, bpm, bpa
    
RuleStream
Published By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : 
product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design
    
RuleStream
Published By: RuleStream     Published Date: Aug 21, 2009
This white paper from Managing Automation Research Services addresses how these ideas can be applied by engineer-to-order manufacturers.
Tags : 
product design, product development, made to order, make to order, made-to-order, make-to-order, engineer to order, engineer-to-order
    
RuleStream
Published By: RuleStream     Published Date: Aug 21, 2009
Manufacturers of products with highly configurable and ever-changing customer requirements must confront specific challenges and operate far differently than traditional product development environments.
Tags : 
business process automation, business process management, bpm, bpa, scm, enterprise software, productivity, supply chain management
    
RuleStream
Published By: Spectra Logic     Published Date: Aug 21, 2009
Most data storage devices can be broadly characterized as either fixed media or removable media. This paper briefly examines and compares magnetic tape, magneto-optical disk, and removable magnetic disks, and identifies their positioning, future trends, and market applications.
Tags : 
backup, disk backup, tape backup, disk-based backup, tape-based backup, storage media, tape storage, disk storage
    
Spectra Logic
Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile
    
Sybase
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security
    
Sybase
Published By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : 
wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo
    
Texas Instruments
Published By: Texas Instruments     Published Date: Aug 21, 2009
Designing wireless local area networking (WLAN) capabilities into stationary customer electronics (CE) systems is most successful when certain design issues are considered early in the development cycle.
Tags : 
wireless lan, wlan, wlans, consumer electronics, ce systems, vcr, consumer electronic, ce design
    
Texas Instruments
Published By: webMethods     Published Date: Aug 21, 2009
This white paper explores why service-oriented architecture has emerged as one of the most significant developments in IT, and is followed by an overview of how businesses can make the transformation to service-orientation.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, web methods, webmethods, software development, it management
    
webMethods
Published By: BMC ESM     Published Date: Aug 20, 2009
Lorsque vous déménagez, en particulier dans un espace plus petit, vous devez déterminer ce que vous possédez, ce que vous gardez et ce que vous stockez. Vous avez toutes les chances de découvrir une multitude d'objets dont vous n'avez pas vraiment besoin. 
Tags : 
bmc, business process automation, spend management
    
BMC ESM
Published By: Junta42     Published Date: Aug 20, 2009
This Junta42 whitepaper shows you how to develop a content marketing strategy that positions your company as the expert. Learn how to create and distribute valuable content that will add to your bottom line, and turn prospects into loyal customers.
Tags : 
branding, content marketing, junta42, loyalty, zoomerang, branding, content development, editorial
    
Junta42
Start   Previous    223 224 225 226 227 228 229 230 231 232 233 234 235 236 237    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.