13%
14.08.2013
that it will be sponsoring the Parallella University Program (PUP), which will provide hardware and other assistance to participating universities and institutions.
The Parallella board will come with Adapteva’s Epiphany
13%
04.10.2012
Access Management Service provides a centralized configuration system for defining users and their groups, allowing users to share application profiles with other specified individuals and/or groups
13%
22.03.2012
. Qloudstat integrates with cloud storage providers and content delivery networks currently supporting AWS S3, AWS CloudFront, Google Cloud Storage, and Rackspace CloudFiles (Akamai CDN). Pricing is based
13%
11.10.2012
in accessing computational resources, provides APIs, sophisticated server-side tools, and graphical user interfaces to construct, execute, control, and manage long-running applications and workflows
13%
01.11.2012
development and testing.
According to the announcement, Splunk Enterprise 5 also includes features that let users capitalize on the full power of Splunk-Hadoop integration. Splunk Hadoop Connect provides bi
13%
15.11.2012
According to the announcement, FIPS (Federal Information Processing Standard) certification “provides confidence” to security-conscious organizations and regulated companies that data on smartphones
13%
29.11.2012
. It also provides a comparison against industry averages and offers suggestions for improving security practices. The results are given in the following areas: protection, responsiveness, organization
13%
25.01.2013
in teaching students how to develop and administer Apache Hadoop. These learning materials will be regularly updated by the Hortonworks team to provide new content and increasingly sophisticated tutorials
13%
15.02.2013
.
According to Gartner, enterprise app stores could help automate the procurement of enterprise software licenses. They could also provide greater control over the apps used by employees, more control over
13%
14.05.2013
, the recommended method for uncovering evidence of the attack is a search of shared memory. ESET's We Live Security blog describes the attack and provides a tool called dump_cdorked_config that checks the shared