Functional Languages Research
-
Does a proprietary solution automatically mean vendor lock-in?
Sponsored by: TechTarget ComputerWeekly.comThe dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
-
Data Center Monitoring Tools and Tips to Keep IT in the Know
Sponsored by: Hewlett Packard EnterpriseData center admins have a seemingly never-ending to-do list when it comes to infrastructure monitoring. From server to equipment monitoring, it's a practice that's often difficult to juggle. Read on to view five tips to fine-tune your data center monitoring, including how to increase security and scalability.
-
DataSheet: Rational Quality Manager
Sponsored by: IBMIBM Rational Quality Manager offers two views on the individual user’s dashboard: A work-item list that shows a tester what work has been assigned to him or her, and a team event log that updates automatically as activities occur/progress. Together these views help ensure that everyone is on the same page.
-
DCIM Software Evaluation Guide
Sponsored by: Nlyte SoftwareBefore you invest in data center infrastructure management (DCIM) tools, you need to know your needs and how to analyze whether a prospective tool will meet them. In this e-guide you will learn how to evaluate and compare DCIM software platforms based on key considerations.
-
DCIM Tool Evaluation Guide
Sponsored by: RunSmartSince the data center infrastructure management (DCIM) market seems nearly limitless, it is important to have an evaluation process to find the software platform that best meets your organization's unique needs. This e-guide discusses the six key evaluation areas necessary to finding the DCIM tool that works best for you.
-
Decision Maker's Cheat Sheet for Today's Hot Databases
Sponsored by: NuoDB IncThis quick guide compares the capabilities of three of today's top database management systems – MySQL, MongoDB and NuoDB.
-
Defend Against Injection-based Attacks
Sponsored by: KlocworkThis paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
-
Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
Sponsored by: DellEMC and Intel®This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
-
Dell Wyse Datacenter for Citrix Reference Architecture
Sponsored by: DellLearn how to deliver virtual desktops via XenDesktop 7.1 on Windows Server Hyper-V 2012 R2 or VMware vSphere 5.
-
Dell PowerVault MD3000i 5000 Mailbox Single Copy Cluster Microsoft® Exchange 2007 Storage Solution
Sponsored by: DellEMC and Intel®This document provides information on Dell's PowerVault MD3000i Plus MD1000 storage solution for Microsoft Exchange Server 2007, based on Microsoft Exchange Solution Reviewed Program (ESRP) Storage program.
-
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
Sponsored by: IBM Software GroupWhen you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
-
Design Your App Modernization Strategy
Sponsored by: Red HatOnce you determine that you need to modernize certain apps, the next step is figure out which method best fits your development, whether it's restructuring with PaaS or redesigning with APIs. In this e-guide, explore how to design an app modernization strategy that suits your business's architecture and cloud use.
-
Designing a Modern Enterprise Architecture
Sponsored by: MetavineIn this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.
-
Designing Artificial Intelligence for Games (Part 1)
Sponsored by: Intel Software NetworkThis article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors.
-
Designing Next Generation Test Systems
Sponsored by: National InstrumentsThis guide addresses challenges that pressure engineering teams to reduce the cost and time of testing, provides insight into how test managers and engineers are overcoming these challenges, and offers guidelines on building modular, software-defined...
-
Determining the Most Effective Endpont Management
Sponsored by: IBMThis white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
-
DeveloperWorks Weekly Newsletter
Sponsored by: IBMWelcome to the developerWorks weekly newsletter, your connection to the latest and greatest developer resources on our site! You can customize your weekly newsletter to include only those topics that interest you.
-
DevOps, Low-Code, and the Democratization of App Development
Sponsored by: ApplauseIn this expert e-guide, learn about the debate about which parts – if any – of app development should be handled by LOB employees and IT professionals other than developers themselves. Enter the discussion and find out how DevOps and no-code/low-code tools are reshaping the way cloud and mobile apps are being built.
-
DevOps, PaaS help define a divergent digital transformation roadmap
Sponsored by: TechTarget App ArchitectureLearn why an application modernization and digital transformation strategy can be a unique challenge to everyone, along with some common solutions.
-
Different Approaches to App Modernization and Development
Sponsored by: MetavineIn this expert e-guide, we examine the different approaches to app modernization, including how to leverage the third platform, redesign cloud-native apps, and couple modernization efforts with PaaS. Find out how each of these approaches makes integrating the cloud into your architecture and updating legacy apps an easier, more streamlined process.
-
Disaster Preparedness: Is there a hole in your disaster recovery plan?
Sponsored by: Iron MountainAccess this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan.
-
Docmosis V2.0
Sponsored by: DocmosisGenerating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool.
-
Documentum Digital Asset Manager
Sponsored by: EMC CorporationEMC Documentum Digital Asset Manager exposes a set of powerful transformations and enhanced content previews, enabling you to fully leverage the value of your digital assets.
-
Download Unitrends Enterprise Backup, Free for 30 days
Sponsored by: UnitrendsThis download delivers Unitrends Enterprise Backup software, which is designed to ensure IT asset recovery from any location, at any time. This solution is available as a virtual appliance for Microsoft Hyper-V.
-
Driving Business Success with Software Reuse
Sponsored by: IBMThis white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.