Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Stepping Into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy

    The cloud decision may be the easy part. For most businesses, the benefits promised by cloud computing - including agility, process optimization, speed to market, and cost reduction - warrant a closer look, if not a test drive. At least at the decision-table, curiosity and hope in the potential for...

    Sponsored By IBM

  • White Papers // Jun 2014

    SDN: How It Will Affect You and Why You Should Care

    You may have heard about software-defined networking (SDN) and its cousin network functions virtualization (NFV). These emerging technologies are likely to revolutionize the IT industry as well as your job. This white paper introduces you to SDN and NFV, examines their impact on you as well as the industry, and...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Tips on Preparing for and Passing the VCP5-DCV Exam

    This paper is aimed at IT professionals who are interested in earning a VMware Certified Professional on Data Center Virtualization (VCP5-DCV) certification. It provides the benefits of having the certification, details for earning the certification, and tips for passing the exam.

    Sponsored By Global Knowledge

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Jun 2014

    Security eBook : Identity as the New Perimeter

    This eBook provides some insights on why traditional security approaches fall short in the face of new and emerging workplace trends. Download this report and learn how CA Technologies helped organisations improved security perimeter.

    Sponsored By CA Technologies

  • White Papers // Feb 2014

    SharePlex Connector for Hadoop Improving analytics with real- and near real-time data replication

    Learn how alternative methods for replicating changes from an Oracle database to a Hadoop® cluster can help you maintain real-time or a near real-time copies of the tables your organization needs to meet its data analytics requirements in this brief from Dell™.

    Sponsored By Dell Software

  • Downloads // Jul 2014

    Download a FREE Trial of IP Address Manager from SolarWinds®!

    Are you still using spreadsheets to manage your IP space? The growing size and complexity of networks makes it increasingly difficult to reliably manage IP space with only simple spreadsheets or homegrown tools. SolarWinds IP Address Manager can help. It allows you to: Automatically scan and accurately inventory...

    Sponsored By SolarWinds

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2014

    The business of social business.

    A new IBM Institute for Business Value study reveals how organizations can use social approaches to create meaningful business value.

    Sponsored By IBM

  • White Papers // Jul 2014

    Anticipate, engage and deliver exceptional web experiences.

    IBM Customer Experience Suite and IBM Intranet Experience Suite help organizations delight customers through a consistently exceptional web experience and empower employees with the social business tools they need to drive better business results. IBM Customer Experience Suite features rich, integrated capabilities for managing web content, real-time social communications, robust...

    Sponsored By IBM

  • White Papers // Jan 2014

    What Smart Businesses Know About DevOps

    Smart companies use DevOps to speed the rollout and quality of new apps and services to market. See the findings from a survey of 1300 global IT leaders in this snack-sized infographic including the real benefits a good DevOps strategy can bring to your business.

    Sponsored By CA Technologies

  • White Papers // May 2014

    Real-Time Business Demo Tool

    Our interactive Real-Time Business Demo Tool demonstrates the new user experience of the SAP Business Suite software, powered by the SAP HANA platform, which delivers instant insight to all lines of business.

    Sponsored By SAP

  • White Papers // Feb 2014

    RocketSpace case study

    In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Sponsored By Coverity

  • White Papers // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

    Sponsored By Coverity

  • Webcasts // Jul 2014

    5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

    Sponsored By Coverity

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Sponsored By Palo Alto Networks

  • White Papers // Jul 2014

    Evolution: Business Resiliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency...

    Sponsored By IBM

  • White Papers // Jul 2014

    Building the Mobile Enterprise - A checklist for putting mobile first in your organization

    Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper “Building the mobile enterprise: integrated, secure and productive” explains the difference and offers a checklist of eight key items to consider when planning your...

    Sponsored By IBM

  • White Papers // Jul 2014

    A Successful Roadmap to Cloud

    Watch the video “Building a Successful Roadmap to the Cloud” to learn how a cloud roadmap can: Ensure that your cloud decisions work together to maximize the overall value to your business Give you greater control over security, performance, and consistency of your cloud workloads Protect...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Preparing your Network for the Mobile Onslaught

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices - which can ultimately lead to poor performance or an inflexible infrastructure. Find...

    Sponsored By IBM

  • White Papers // Jul 2014

    PCI Compliance and Mobile Devices

    The Payment Card Industry (PCI) Security Standards Council has released the Data Security Standards (DSS) version 3.0 outlining revised requirements for payment data security, effective January 1st, 2014. Merchants and Service Providers that store, process, or transmit customer payment card data must adhere to the revised outlined requirements. Additionally, the...

    Sponsored By MobileIron

  • White Papers // Mar 2014

    Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks.

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.

    Sponsored By IBM

  • White Papers // Feb 2014

    NSS Labs 2013 Network IPS Comparative Analysis

    Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

    Sponsored By IBM

  • White Papers // Feb 2014

    Leverage Security Intelligence to Protect Sensitive Healthcare Data

    IBM solutions deliver the end-to-end systems visibility necessary to give healthcare organizations the true security intelligence they need - with the ease of use and labor-saving automation that makes security intelligence a powerful and achievable tool for protecting information.

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere Big Insights technologies helping organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution allows security analysts to extend their analysis well beyond typical security data using real-time...

    Sponsored By IBM

  • White Papers // Aug 2014

    How Emerging Trends are Affecting Contact Centre Operations

    This whitepaper takes an in-depth look into call centres and examines how they have changed, what has influenced them and what the next move for them is. Learn how to adapt to the new trends and ensure that your customers are provided with top-of-the-line communication.

    Sponsored By ShoreTel

  • White Papers // Jul 2012

    The Active Directory Management and Security You've Always Dreamed Of

    Businesses need more from their Windows security structure – including role-based access control, automated delegation of permissions, centralized permissions reporting, and data consistency rules. A lot has changed since the introduction of the Windows NT security structure in 1993, but finding the right solution can be a challenge. Learn...

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Unchain Your Network with Application Intelligence and Control

    This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware? - Report

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for Security Intelligence & Event Management

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • White Papers // Aug 2014

    Reducing the Cost and Complexity of Endpoint Management - Report

    Discover how midsized organizations can improve endpoint security, patch compliance and lifecycle management on a limited budget.

    Sponsored By IBM

  • White Papers // Oct 2013

    Success in the Cloud: How to find it?

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

    Sponsored By LabTech Software

  • Downloads // May 2014

    Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

    Sponsored By SolarWinds

  • White Papers // Jul 2014

    Big Data, Little Data, and Everything in Between - IBM SPSS Solutions Help You Bring Analytics to Everyone (Ziff Davis)

    Regardless of the type or scale of data your users need to harness and analyze, IBM SPSS Solutions offer a straightforward, visual solution that is easy to use on the front end and highly scalable on the back end.

    Sponsored By IBM

  • eBooks // Oct 2013

    Finding Success in the Cloud

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

    Sponsored By LabTech Software