ComputerWeekly.com Research Library

Powered by Bitpipe.com

Functional Languages Research

  • Does a proprietary solution automatically mean vendor lock-in?

    Sponsored by: TechTarget ComputerWeekly.com

    The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?

  • Data Center Monitoring Tools and Tips to Keep IT in the Know

    Sponsored by: Hewlett Packard Enterprise

    Data center admins have a seemingly never-ending to-do list when it comes to infrastructure monitoring. From server to equipment monitoring, it's a practice that's often difficult to juggle. Read on to view five tips to fine-tune your data center monitoring, including how to increase security and scalability.

  • DataSheet: Rational Quality Manager

    Sponsored by: IBM

    IBM Rational Quality Manager offers two views on the individual user’s dashboard: A work-item list that shows a tester what work has been assigned to him or her, and a team event log that updates automatically as activities occur/progress. Together these views help ensure that everyone is on the same page.

  • DCIM Software Evaluation Guide

    Sponsored by: Nlyte Software

    Before you invest in data center infrastructure management (DCIM) tools, you need to know your needs and how to analyze whether a prospective tool will meet them. In this e-guide you will learn how to evaluate and compare DCIM software platforms based on key considerations.

  • DCIM Tool Evaluation Guide

    Sponsored by: RunSmart

    Since the data center infrastructure management (DCIM) market seems nearly limitless, it is important to have an evaluation process to find the software platform that best meets your organization's unique needs. This e-guide discusses the six key evaluation areas necessary to finding the DCIM tool that works best for you.

  • Decision Maker's Cheat Sheet for Today's Hot Databases

    Sponsored by: NuoDB Inc

    This quick guide compares the capabilities of three of today's top database management systems – MySQL, MongoDB and NuoDB.

  • Defend Against Injection-based Attacks

    Sponsored by: Klocwork

    This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.

  • Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution

    Sponsored by: DellEMC and Intel®

    This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.

  • Dell Wyse Datacenter for Citrix Reference Architecture

    Sponsored by: Dell

    Learn how to deliver virtual desktops via XenDesktop 7.1 on Windows Server Hyper-V 2012 R2 or VMware vSphere 5.

  • Dell™ PowerVault™ MD3000i 5000 Mailbox Single Copy Cluster Microsoft® Exchange 2007 Storage Solution

    Sponsored by: DellEMC and Intel®

    This document provides information on Dell's PowerVault MD3000i Plus MD1000 storage solution for Microsoft Exchange Server 2007, based on Microsoft Exchange Solution Reviewed Program (ESRP) Storage program.

  • Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.

    Sponsored by: IBM Software Group

    When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.

  • Design Your App Modernization Strategy

    Sponsored by: Red Hat

    Once you determine that you need to modernize certain apps, the next step is figure out which method best fits your development, whether it's restructuring with PaaS or redesigning with APIs. In this e-guide, explore how to design an app modernization strategy that suits your business's architecture and cloud use.

  • Designing a Modern Enterprise Architecture

    Sponsored by: Metavine

    In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.

  • Designing Artificial Intelligence for Games (Part 1)

    Sponsored by: Intel Software Network

    This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors.

  • Designing Next Generation Test Systems

    Sponsored by: National Instruments

    This guide addresses challenges that pressure engineering teams to reduce the cost and time of testing, provides insight into how test managers and engineers are overcoming these challenges, and offers guidelines on building modular, software-defined...

  • Determining the Most Effective Endpont Management

    Sponsored by: IBM

    This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.

  • DeveloperWorks Weekly Newsletter

    Sponsored by: IBM

    Welcome to the developerWorks weekly newsletter, your connection to the latest and greatest developer resources on our site! You can customize your weekly newsletter to include only those topics that interest you.

  • DevOps, Low-Code, and the Democratization of App Development

    Sponsored by: Applause

    In this expert e-guide, learn about the debate about which parts – if any – of app development should be handled by LOB employees and IT professionals other than developers themselves. Enter the discussion and find out how DevOps and no-code/low-code tools are reshaping the way cloud and mobile apps are being built.

  • DevOps, PaaS help define a divergent digital transformation roadmap

    Sponsored by: TechTarget App Architecture

    Learn why an application modernization and digital transformation strategy can be a unique challenge to everyone, along with some common solutions.

  • Different Approaches to App Modernization and Development

    Sponsored by: Metavine

    In this expert e-guide, we examine the different approaches to app modernization, including how to leverage the third platform, redesign cloud-native apps, and couple modernization efforts with PaaS. Find out how each of these approaches makes integrating the cloud into your architecture and updating legacy apps an easier, more streamlined process.

  • Disaster Preparedness: Is there a hole in your disaster recovery plan?

    Sponsored by: Iron Mountain

    Access this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan.

  • Docmosis V2.0

    Sponsored by: Docmosis

    Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool.

  • Documentum Digital Asset Manager

    Sponsored by: EMC Corporation

    EMC Documentum Digital Asset Manager exposes a set of powerful transformations and enhanced content previews, enabling you to fully leverage the value of your digital assets.

  • Download Unitrends Enterprise Backup, Free for 30 days

    Sponsored by: Unitrends

    This download delivers Unitrends Enterprise Backup software, which is designed to ensure IT asset recovery from any location, at any time. This solution is available as a virtual appliance for Microsoft Hyper-V.

  • Driving Business Success with Software Reuse

    Sponsored by: IBM

    This white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.