Uniface for High Productivity Mobile Development
Published: 13th February 2015 | By: David Norfolk
The prime use case for Mobile Development in Uniface is the addition of a mobile channel to existing Enterprise applications.
Application rationalisation, retirement and archiving: why and how?
Published: 13th January 2015 | By: Philip Howard
In this paper we discuss how to approach application rationalisation and retirement, and related best practices.
Financial Services Directives - Requirements for Data Technologies
Published: 13th January 2015 | By: Philip Howard and Bob McDowall
The focus in this paper is on EU directives for the financial sector and what their requirements are in terms of information management capabilities.
Ancelus
Published: 7th January 2015 | By: Philip Howard
Ancelus is an ACID compliant database with extreme performance characteristics, developed and marketed by Time Compression Strategies Corporation (TCSC).
Test Case Generation
Published: 11th December 2014 | By: Philip Howard
In this paper we compare and examine the different vendor products that are available in the market for this purpose.
The need for active response to advanced threats - passive remediation is insufficient
Published: 20th November 2014 | By: Fran Howarth
Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.
NuoDB Swifts Release 2.1
Published: 31st October 2014 | By: Philip Howard
NuoDB is a very interesting product, both from a conceptual and an architectural point of view.
Advanced threat protection and remediation
Published: 30th October 2014 | By: Fran Howarth
Attacks cannot be defeated with protective technologies alone, given today's technology and the sophistication of attackers, some attacks will always get through.
Defending against the rogue - unwanted users, devices and applications
Published: 28th October 2014 | By: Fran Howarth
Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.
IBM: enhanced 360° view
Published: 19th October 2014 | By: Philip Howard
This paper briefly considers relevant IBM technologies and solutions in the context of the requirements discussed