12%
11.10.2012
in accessing computational resources, provides APIs, sophisticated server-side tools, and graphical user interfaces to construct, execute, control, and manage long-running applications and workflows
12%
01.11.2012
development and testing.
According to the announcement, Splunk Enterprise 5 also includes features that let users capitalize on the full power of Splunk-Hadoop integration. Splunk Hadoop Connect provides bi
12%
15.11.2012
According to the announcement, FIPS (Federal Information Processing Standard) certification “provides confidence” to security-conscious organizations and regulated companies that data on smartphones
12%
29.11.2012
. It also provides a comparison against industry averages and offers suggestions for improving security practices. The results are given in the following areas: protection, responsiveness, organization
12%
25.01.2013
in teaching students how to develop and administer Apache Hadoop. These learning materials will be regularly updated by the Hortonworks team to provide new content and increasingly sophisticated tutorials
12%
15.02.2013
.
According to Gartner, enterprise app stores could help automate the procurement of enterprise software licenses. They could also provide greater control over the apps used by employees, more control over
12%
14.05.2013
, the recommended method for uncovering evidence of the attack is a search of shared memory. ESET's We Live Security blog describes the attack and provides a tool called dump_cdorked_config that checks the shared
12%
26.02.2013
, Switzerland, will present Big Data best practices and use cases and provide a forum to review and share the latest technology trends.
The arrival of a new Big Data conference organized by the creators
12%
13.03.2013
functionality in HyperWorks 12.0 emphasizes improved performance and usability. According to the announcement, these improvements are aimed at providing easy access to CAE technology – including a streamlined
12%
19.04.2013
are optimized to provide complete security visibility and threat management through a management console.
According to the announcement, this consolidation of security capabilities into a single management