Archive

Developing Apps using Java DB

by May 15, 2007

It’s a lightweight, zero-admin database, which is embeddable into any java desktop application with support for SQL and JDBC

Read More [shareaholic app="share_buttons" id="15671367"]

Ensuring Data Integrity in SANs

by May 14, 2007

With all organizational data moving into SANs, their security is becoming a growing concern. Here we look at a few technologies to make them more secure

Read More [shareaholic app="share_buttons" id="15671367"]

New Age Graphics Moving Closer to Photorealism

by May 14, 2007

What’s the first thing that comes to mind when we talk of rendering a character for a game or an animation movie? Creepy monsters or funnily moving computer generated images that struggle to match the vivaciousness of our real life heroes. With newer and more powerful graphics equipment, all this is changing as we move closer and closer to achieving an artist’s dream-photorealism

Read More [shareaholic app="share_buttons" id="15671367"]

OS Virtualization in its Simplest Way

by May 14, 2007

With Virtuozzo, you can boost your server’s utilization by creating multiple virtual machines on the server running same OS as the host OS using kernel-based virtualization

Read More [shareaholic app="share_buttons" id="15671367"]

Enterprise Linux goes Beyond Limits

by May 14, 2007

We’ll configure a very useful flavor of Linux called Stateless Linux in which the server uses just one OS image to remote boot diskless clients, virtual clients, or even regular thick clients

Read More [shareaholic app="share_buttons" id="15671367"]

SQL Server Integration Services

by May 14, 2007

In this part, we’ll take a look at Data Flows that do the actual data transformation, and what all you can do with them

Read More [shareaholic app="share_buttons" id="15671367"]

Set up a CD-based Firewall

by May 14, 2007

redWall is an open source CD-based firewall that provides protection against external attacks as well as anti-spam and IDS capabilities

Read More [shareaholic app="share_buttons" id="15671367"]

Online Forms with MOSS & InfoPath

by May 14, 2007

The new InfoPath works great with SharePoint to deliver online forms for gathering information. You do not even need to know any coding to be able to create and post your forms

Read More [shareaholic app="share_buttons" id="15671367"]

Load-balance your Applications Traffic

by May 14, 2007

Zeus Extensible Traffic Manager lets you manage your applications’ traffic, inspecting, transforming and routing requests as it load-balances them across the application infrastructure

Read More [shareaholic app="share_buttons" id="15671367"]

20 Minutes and your own UTM is Ready

by May 14, 2007

Build a fully featured unified threat management device that can work as a firewall, content/spam filter, IDS, anti virus or bandwidth manager-using Endian, an Open Source Linux distro

Read More [shareaholic app="share_buttons" id="15671367"]

20 Minutes and your own UTM is Ready

by May 14, 2007

Build a fully featured unified threat management device that can work as a firewall, content/spam filter, IDS, anti virus or bandwidth manager-using Endian, an Open Source Linux distro

Read More [shareaholic app="share_buttons" id="15671367"]

Mobility: Boon or Bane?

by May 14, 2007

With the concept of anytime, anywhere computing gaining ground, you need to know how to tilt it in your favor. Otherwise, it could even have negative implications. Here, we look at the key trends in mobility and the impact they can have on you

Read More [shareaholic app="share_buttons" id="15671367"]

Conquering the Challenges of Managing a Data Center

by May 14, 2007

Ensuring high availability is the biggest challenge faced by CIOs while managing their data center and about 50% of them have outsourced some of the monitoring and management to a third party. Here we explore these and other data center mgmt challenges in detail

Read More [shareaholic app="share_buttons" id="15671367"]

Healthcare: IT’s in the Blood

by May 14, 2007

It was in the 1980’s that the first computers, the then face of IT, were inducted at the biggest healthcare facilities in India. Since then, the use of IT had been confined to two streams- commerce-centric applications and R & D. But winds of change have brought a revolution with proactive healthcare taking charge to benefit both the industry as well as the consumer

Read More [shareaholic app="share_buttons" id="15671367"]

Preventing Identity Crisis Online

by May 14, 2007

The number of online frauds is rising, and the prime reason for that is identity theft. End users need to take more precautions, and organizations need to consider deploying identity management solutions. In this story, we cover the key trends, technologies, standards and solutions for identity management of both individuals and enterprises

Read More [shareaholic app="share_buttons" id="15671367"]