Download this next:

Raspberry PI with Java: programming the internet of things

In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

This chapter will take you through a first-time installation of Raspbian on a Raspberry Pi with the latest Java version. It also details some additional configuration that you may want to change to optimise Java and other visual applications. Finally, Chin shows you how to create a network between your Raspberry Pi and another machine and run a simple Java application.

These are also closely related to: "Docmosis V2.0"

  • Tips to achieving document version control

    Without effective document version control, your employees and decision-makers can wind up acting on information that is out-of-date, incomplete, or missing across individuals and departments – and this can lead to major financial and efficiency concerns.

    In this article, explore:

    • The emergence of modern Electronic Document Management Systems (EDMS)
    • Measurable benefits of document version control
    • Common barriers to maintaining document version control
    • And more

    Read on to uncover tips to overcoming issues and ensuring accurate document version control.

  • Computer Weekly – 13 April 2021: The evolution of RPA

    In this week’s Computer Weekly, our latest buyer’s guide looks at the future of robotic process automation (RPA) and how the technology is evolving thanks to artificial intelligence (AI). Google’s legal victory against Oracle over the use of Java APIs has huge significance for software developers – we examine the issues. And we find out how expectations of IT have grown as firms prepare for the post-Covid workplace. Read the issue now.

Find more content like what you just read:

  • Your Guide to Google Cloud v3 Backup and Recovery

    Watch this Veeam webinar packed with what's new, live demos, and other useful advice on how to best protect your Google Cloud workloads.

    Download

  • Understanding behavioural detection of antivirus

    This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.

    Download

  • Threat Intel Roundup

    To assist your efforts in staying up to date, Integrity360 has pulled together this Threat Intel Roundup report that spotlights attacks, cybersecurity updates, and data loss incidents from April 2022 onward. Stay up to date, and protect your business from the latest hacker tactics, by downloading the full report here.

    Download

  • Engineering Document Management in the Cloud

    Business survival in today’s competitive, ever-changing industry requires operational efficiency. One way to increase efficiency is by centralizing engineering documents—which is why Accruent developed the engineering document management service, Accruent Meridian Cloud. Explore this product overview to learn more.

    Download

  • Infographic: Best practices for documentation in DevOps

    No software project is complete without documentation such as user guides, examples, and change lists. But the pace of software development is increasing. As more businesses embrace and expand the adoption of DevOps, businesses and development teams should revisit and update the ways IT departments prepare and maintain documentation.

    Download

  • Modern management for the enterprise

    The current DIY route to Kubernetes management has a cost, expressed in lost time-to-market and security vulnerabilities. This white paper sets out to explain why using a declarative approach to Kubernetes is key, why you should treat clusters as cattle and not pets. Read the white paper here to learn how to modernize your Kubernetes management.

    Download

  • Unlocking the Value of Master Data Across Multiple Domains

    How can you facilitate operational efficiency and agility by enabling end-to-end data consistency and availability? Explore this solution brief to learn how Multidomain Master Data Management can help your organization establish a single version of the truth by collecting, managing and connecting data in single, centralized system.

    Download

  • Computer Weekly - 27 July 2021: Are we getting cyber security skills all wrong?

    In this week's Computer Weekly, the chair of the new UK Cyber Security Council tells us how she plans to fundamentally reimagine what working in IT security means. Our latest buyer's guide examines ERP modernisation and its role in digital transformation. And we take an in-depth look at the first preview version of Windows 11. Read the issue now.

    Download

  • Manage and automate Db2 DDL changes with Endevor

    Read this blog post to understand how you can version, manage and automate Db2 DDL changes with Endevor to normalize the way developers interact with your mainframe to build powerful, scalable and secure applications.

    Download

  • Maximizing efficiency with compliant control of engineering information

    Access this case study to learn how Accruent helped AbbVie, a research-driven global biopharmaceutical company, create a standardized engineering platform to be rolled out, centralized, and integrated with IBM Maximo across all global manufacturing sites.

    Download

  • Computer Weekly - 6 July 2021: Where to start with Windows 11

    In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.

    Download

  • A Guide On Document Understanding

    If there’s one universal challenge that every industry deals with, it’s the buildup of paperwork. Fortunately, there’s a solution: Intelligent document processing. Learn more about intelligent document processing and its use cases, as well as the benefits you could achieve with it, in this white paper.

    Download

  • Finding the right POTS replacement strategy for your organization

    Check out this data sheet to learn about 3 POTS/analog line replacement options as the Verizon Business 2022 deadline approaches.

    Download

  • IBM Worklight Developer Q&A

    Access this resource to see an open-forum developer question-and-answer for IBM's Worklight environment. See if another developer has encountered the same issue as you, and if someone has already provided an easy solution.

    Download

  • CW Nordics - May-July 2022: How the Estonian government created a digital assistant to support citizens

    As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services.

    Download

  • Computer Weekly – 27 March 2018: The desktop is changing

    In this week's Computer Weekly, corporate PCs haven't changed much in 20 years – as use of Chrome OS grows, we ask if IT leaders are ready for a new approach. Theresa May said Brexit means the UK leaving the EU digital single market – does this mean a return to roaming charges? And we look at the latest developments in Linux. Read the issue now.

    Download

  • The Great Decommission

    Analog lines or plain old telephone service (POTS) are steadily being decommissioned, with the FCC reporting that carriers are on a path to drop POTS lines entirely within 5 years. To avoid getting disconnected, access this article to help find the right POTS replacement strategy for your organization.

    Download

  • Code obfuscation for JavaScript

    While JavaScript’s relative simplicity and ease of use led to its success, these aspects also have a downside as hackers can more easily interpret and take advantage of the simple code. obfuscation of code is a technique used to transform code into a new version that is deliberately hard to understand and reverse-engineer. Read on to learn more.

    Download

  • Simplify PCI DSS compliance

    As organizations around the globe prepare for the newest version of PCI DSS, it’s important to revisit some of the basics of the regulation. Read this white paper for an overview of PCI DSS and discover how to minimize risk and cost without sacrificing compliance.

    Download

  • Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation

    This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more.

    Download

  • Top strategies to master an Exchange 2010 migration

    Find out how you can avoid the most common mistakes that Exchange admins make when migrating to Exchange 2010 in this e-guide. Plus, gain tips for how to properly document and plan your migration.

    Download

  • Webinar: Exploring Tape for Hyperscale Storage

    In this webinar, explore Quantum’s innovative approach to servicing the major hyperscale players with easy to deploy and maintain tape library systems

    Download

  • Fail to prepare quality data, prepare to fail

    Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".

    Download

  • Streamline document management with content services

    For industries that require the constant movement of physical or digital documents, effective workflow management and business process automation are key to success today. Explore this eBook to learn how digital content management services can help companies save time, prevent errors, and put data to work to drive improvements.

    Download

  • Webinar: Market Opportunity for S3 Compatible Tape

    Explore in this webinar how the market opportunity for Object storage on tape is a potential game-changer, and how object tape can enhance the performance of cloud.

    Download

  • Analyzing reliability metrics for tape storage

    Nathan Thompson is chairman of the board and chief executive officer of Spectra Logic. In this segment of his presentation, Nathan shares Spectra’s experience with tape reliability and the remarkable effectiveness of dual copy resulting in a “one in a billion chance” for data loss.

    Download

  • Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated

    This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.

    Download

  • Threat Intel Roundup

    For the cybersecurity professional, each new day brings with it new threats and vulnerabilities that need addressing. In this June issue of Integrity360’s Threat Intel Roundup, the organization presents an overview of the month’s biggest cybersecurity news. Read the full report to learn more.

    Download

  • 10 crucial capabilities of a supply chain control tower

    Access this white paper to learn the 10 capabilities to prioritize when evaluating a supply chain control tower and discover an AI-powered solution from GEP.

    Download

  • Building sustainability between HDD and SSD

    Presenting at Fujifilm’s 12th Annual Global IT Executive Summit was Shawn Brume of IBM. In this segment of his presentation, Shawn reviews storage sustainability issues and the CO2 reduction benefits of tape systems compared to HDD and SSD. Watch now to learn more.

    Download

  • Webinar: Your Essential Look at CERN Active Archive with Tape

    In this webinar, explore the secrets of the CERN Tape Archive workflow, including a fast SSD buffer to the tape system that is expected to grow into the Exabyte range in the years ahead.

    Download

  • PCI DSS V4: New compliance for E-commerce security

    As E-commerce continues to grow, hackers have increasingly targeted website vulnerabilities in order to steal users’ financial data during online transactions. This white paper is designed to familiarize you with the most important takeaways of the PCI DSS version 4. Read on to see how the compliance aims to protect user’s data.

    Download

  • Microsoft 365: Recovery best practices

    Microsoft’s shared responsibility model means that if you’re using their infrastructure, then you are responsible for backing up your own data. Learn the value of your company’s data backup as well as key considerations and best practices to set up automated, scalable recovery options in this e-book.

    Download

  • Improving Clinical Documentation Accuracy and Efficiency

    Providers need better solutions to aid them in encounter documentation so they can accurately capture clinical care, remain compliant with coding requirements, and contribute to the financial goals of their organizations without compromising meaningful interactions with patients.

    Download

  • Microsoft Azure Solutions for Data Growth

    In this webinar, review the value of the tape ecosystem and discover recommendations for tape vendors to expand cloud storage infrastructure as the zettabyte era continues to unfold.

    Download

  • Defending against skimming attacks

    E-commerce skimming attacks are becoming more common, with hackers leveraging vulnerabilities to steal user’s payment data. Recognizing the inherent vulnerabilities that lead to skimming attacks, the new version of PCI DSS contains two requirements to better defend against E-commerce skimming attacks. Download to learn more.

    Download

  • Preparing for PCI 4.0 – big changes you need to know now

    One of the most impactful assurance programs – affecting most businesses, consumers, and supply chains – is the Payments Card Industry Data Security Standard (PCI DSS) version 4.0. Luckily, this white paper will outline the most important changes to keep in mind for compliance planning and budgeting. Keep reading to learn more.

    Download

  • Surviving a Ransomware Attack with Tape Air Gap

    In this webinar, investigate the details of a ransomware attack suffered by Spectra Logic and how the organization prevailed without paying the ransom demand, thanks in no small part to off-site air gapped tape for safe and unaffected recovery.

    Download

  • Webinar: Tape Roadmaps and Tape Library Innovation

    In this webinar, review the IBM TS 1100 enterprise and LTO tape roadmaps in the comprehensive introduction to new IBM tape library innovations.

    Download

  • Collaboration software in the era of Gen-Z

    In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.

    Download

  • Spotlight on the Middle East: Emerging IT economy

    We focus on how countries in the Middle East region are trying to diversify their economies away from oil revenues. We look at how Saudi Arabia is trying to create their own version of Silicon Valley, how Dubai is trying to incorporate bitcoin into the property sector and how the UAE is trying to harness the power of artificial intelligence.

    Download

  • Worldwide Unified Endpoint Management Software 2022 Vendor Assessment

    It is now critical for UEM technology to be able to support multiple device types accessing corporate data, apps, and IT resources both on and off network. Through the IDC MarketScape model, IDC conducted a study that provides an assessment of providers offering UEM software. Access it here.

    Download

  • Interplanetary File System: Enabling a decentralized version of the web

    The Interplanetary File System (IPFS) is a key component in enabling a decentralized, distributed version of the web (dWeb) as compared to today’s centralized web model. Access this white paper to learn How IPFS helps alleviate challenges and move towards a decentralized web.

    Download

  • After Kubernetes honeymoon: Overcoming update challenges

    Tune in to this webinar for Spectro Cloud's insights on the best ways to 'catch up' to Kubernetes, as well as automation strategies that can simplify the update process.

    Download

  • Data modeling: Top 10 considerations

    As organizations migrate data and applications to the cloud and other modern forms of infrastructure, they need data modeling solutions that can facilitate the overall modernization lifecycle. Read on to learn 10 key considerations when selecting a data modeling solution.

    Download

  • Document security in the modern age

    Read this e-book to examine the current state of play regarding security in the printing and document solutions market. It will highlight emerging trends, as well as the threats and opportunities they pose for companies.

    Download

  • A Security Assessment of Android Full-disk Encryption

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

    Download