Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Sep 2014

    Embedding Reports, Dashboards and Analytics: A Breakdown in 5 Steps

    Today’s SaaS providers or in-house development teams must perform a balancing act, delivering industry-leading functionality to a demanding market place while speeding time-to-market. To meet and exceed customer expectations, the application needs to provide the right data through interactive and rich visualizations, reports and dashboards to any device. This white...

    Sponsored By Actuate

  • White Papers // Jul 2014

    PCI Compliance and Mobile Devices

    The Payment Card Industry (PCI) Security Standards Council has released the Data Security Standards (DSS) version 3.0 outlining revised requirements for payment data security, effective January 1st, 2014. Merchants and Service Providers that store, process, or transmit customer payment card data must adhere to the revised outlined requirements. Additionally, the...

    Sponsored By MobileIron

  • White Papers // Oct 2014

    Best Practices for Selecting a Web Application Scanning (WAS) Solution

    This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands. Learn more...

    Sponsored By Qualys

  • White Papers // Jan 2014

    The 10 Things Your Next Firewall Must Do

    For enterprises looking at Next-Generation Firewall’s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    Mimecast Services for Microsoft Office 365

    This datasheet discusses the third party capabilities that Office 365 users should consider to add value to their platform. Mimecast provides a rich set of cloud services designed to meet the specific needs of O365 users and provides complementary services to eliminate business dependence on on-premises technologies. Check this out...

    Sponsored By Mimecast

  • White Papers // Sep 2014

    Announcing the New Intel Parallel Studio XE 2015 Cluster Edition

    Accelerate development and simplify debugging and tuning, and with this advanced, comprehensive tool suite. Boost application performance: Faster, more accurate compiling with explicit vectorization, OpenMP 4.0 and MPI-3 support, parallel direct sparse solver, and scaling up to 150k processes. Increase portability with latest standards: Enhanced support for MPI-3, MPICH...

    Sponsored By Intel Software

  • White Papers // Jul 2014

    Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure

    This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

    Sponsored By Global Knowledge

  • White Papers // Aug 2014

    2014 Gartner Critical Capabilities for Security Information and Event Management

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Dec 2014

    Open Source is Driving Innovation

    Competition is rapidly growing. Margins are getting slimmer. And the need for business efficiency is at a critical level. In today’s wold, companies are turning to open source technologies to make better and smarter business decisions, faster than ever before. See how IBM Linux Server solutions can help your company...

    Sponsored By IBM

  • White Papers // Oct 2014

    Exposing and Managing Enterprise Services with IBM API Management

    This IBM® Redbooks® publication provides insight into what application programming interfaces (APIs) are and why they are important. It also provides insight into how to use IBM API Management to create, subscribe, and connect to APIs, how to secure and test APIs, and how to gain business value from APIs....

    Sponsored By IBM

  • White Papers // Oct 2014

    Five Security considerations in the Mobile Age

    IBM® WebSphere® DataPower® appliances provide optimized, security-rich access to back-end services from mobile devices and desktops. Discover how to strengthen security in your mobile environment with DataPower. The paper covers five security considerations in the mobile age: Building and preparing for success. Planning for Bring Your Own Device (BYOD) policies,...

    Sponsored By IBM

  • eBooks // Jul 2014

    Beyond Software: Agile for Product Development

    Agile methods are increasingly popular in application, enterprise and embedded development. Yet the question remains: Do the 12 agile principles apply to more than just software? Find out how leading companies are beginning to exploit agile's iterative processes for far more than software.

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    IBM X-Force Threat Intelligence Quarterly - Q1 2014

    Understand more about the latest IT security threats. This report is an analysis of the security landscape, designed to help organizations better understand the latest security risks. Download this comprehensive report and learn how: Security incidents have been steadily rising in 2013. Cyber-criminals use malicious code...

    Sponsored By IBM

  • eBooks // Oct 2013

    Finding Success in the Cloud

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

    Sponsored By LabTech Software

  • eBooks // Oct 2013

    Set Your IT Business Up For Success: Achieving Client Satisfaction in the First 30 Days

    The key to achieving client satisfaction and building long-term client relationships is starting off on the right foot. It is important that the groundwork be laid in advance to ensure a smooth onboarding process, as this is the time when new clients are most critical of the work being performed....

    Sponsored By LabTech Software

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • White Papers // Jun 2014

    CA Technologies Automation Platform Enables Tesco to Reach Previously Unattainable Milestones

    Business: Global Fortune 50 retailer Tesco is the third largest merchant in the world; it operates over 3,700 stores internationally and is rapidly expanding its online presence, dominating markets as diverse as motor insurance, home electrical appliances and clothing. Challenge: Tesco needed to accelerate time-to-market, increase efficiency and reduce errors...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Department of Defence Australia secured by CA and BST Tech

    Business: BSTTech Consulting provides security and information processing solutions to a global customer base, specialising in the defence sector. Headquartered in Australia, it prides itself on being recognised as a thought-leader in security and information sharing. Challenge: When the Department of Defence (DoD) enlisted its help, BSTTech Consulting needed to...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    TechViews Podcast: The Security Reality in 2014

    IT security is a brave new world for enterprise companies. As threats increase in frequency and variation, IT security teams must also allow more access to corporate assets and data than ever before. New trends like BYOID challenge traditional security measures, but enable ease of use for consumers. Striking a...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    CA LISA Service Virtualization On-the-Go Demo

    Demonstration of CA LISA Service Virtualization capabilities, including how organizations can “Shift-Left” their SDLC, reduce infrastructure requirements, and reduce data/scenario management constraints all while improving application quality.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Accelerate Mobile App Initiatives with APIs

    Businesses are differentiating through mobile app initiatives. But what’s fueling the development and delivery of mobile app projects – APIs! CA delivers an API Management solution that accelerates development, optimizes performance and secures the mobile channel end-to-end.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Enabling and Protecting the Open Enterprise

    A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    How CA Technologies Safeguards Competitive Advantage with Proactive Cloud and Web Application Monitoring

    Find out how CA Application Performance Management Cloud Monitor enables the IT team to replicate customer transactions from over 60 global locations to identify potential problems thus ensuring a consistent user experience and quickly resolving any performance problems.

    Sponsored By CA Technologies

  • Podcasts // Feb 2014

    TechViews - Deconstructing DevOps

    The TechViews programs will help to cut through the noise of the market and bring you real insights from thought leaders across the industry. 15 minute podcast on DevOps - What is it? Why use it? Listen now.

    Sponsored By CA Technologies

  • Videos // Feb 2014

    Video: DNS Europe drives down the cost of high availability, fault tolerant cloud services for their customers

    Business: DNS Europe is a UK based cloud hosting business offering cloud application hosting and development, hybrid cloud integration, consulting and on-boarding. Challenge: Compete with larger hosting providers and public cloud providers by offering high availability & fault tolerance with a very high service credit policy. Solution: Offer public and...

    Sponsored By CA Technologies

  • White Papers // May 2014

    Transform Your Future with Predictive Insight

    Learn how to take advantage of in-memory technology to reduce the time and cost of data processing and perform predictive analyses against vast data volumes. You can design complex models and visualize, discover, and share insights – and do it in real time by harnessing the power of SAP HANA...

    Sponsored By SAP

  • White Papers // Mar 2014

    Global Compliance for Data Security

    Driven on by relentless news about security breaches and data loss, law makers and regulators the world over are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on encryption, not only of portable equipment and...

    Sponsored By Vormetric

  • White Papers // May 2014

    Enterprise Must Look To Scale Mobility With a New Platform Approach

    Discover the benefits of a strategic approach to mobile with real-world examples and a blueprint for success.

    Sponsored By SAP

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • White Papers // May 2014

    Making the Real-Time Enterprise a Reality

    Organizations are transforming not only their systems, cultures, and processes to take advantage of an increasing volume of data collected in the moment. They’re reinventing the enterprise not simply so they can react to business demands in real time but also to anticipate changes before they occur.

    Sponsored By SAP

  • White Papers // May 2014

    Real-Time Insights to Forge Deeper Relationships with Your Customers

    The next step in the evolution of SAP HANA is becoming the foundation for a new generation of real-time applications such as SAP Customer Engagement Intelligence. This application enables highly targeted marketing campaigns and fosters deeper relationships with customers, giving you a better understanding of their needs.

    Sponsored By SAP

  • White Papers // May 2014

    A Cohesive Approach to a Complex Market

    The mobile enterprise is becoming more complex with the consumerization of IT, the mobile app explosion and cloud computing. In this report, IDC covers key trends and what companies should look for in a partner that can help them manage it all.

    Sponsored By SAP

  • White Papers // Jul 2014

    Using Encryption and Access Control for HIPAA Compliance

    Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH.

    Sponsored By Vormetric

  • White Papers // Mar 2014

    Security in the Cloud for SAP HANA

    High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA,...

    Sponsored By Vormetric

  • White Papers // Jan 2014

    Analytic Databases for Big Data

    Organizations are contemplating a replacement of their analytic databases, data warehouses, and similar platforms to keep pace with new and intensifying requirements for advanced analytics in a "big data" world. As user organizations make such platform replacements -- or add additional platforms to their expanding data warehouse architectures -- they...

    Sponsored By SAP

  • White Papers // Jan 2014

    Enterprise Mobility for Dummies

    Enterprise mobility concerns employees at every level. As you plan for 2014, let this eBook show you how easy it can be to mobilize -- and transform -- your enterprise. From application development and deployment to management and security, any company can do it. This eBook is your guide to...

    Sponsored By SAP

  • White Papers // Jul 2014

    2014 Insider Threat Report

    The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with 537 IT and Security managers in major European enterprises around the question of insider threats. Insider threats have expanded from the traditional insiders to privileged users of systems and the compromise of internal...

    Sponsored By Vormetric

  • Videos // May 2014

    Video: Workday's Mobile Solutions for iPad

    As the workforce around the world becomes more mobile, enterprises are enabling their workers to stay informed and connected while on the go. Watch the video to discover how Workday I empowering today’s workforce with cloud-based mobile solutions that can be easily deployed on your iPad®.

    Sponsored By Workday

  • White Papers // Jan 2014

    IDC: Driving Business Optimization with End-to-End Performance Testing White Paper

    The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. The document defines an application performance testing framework, discusses a performance test evolution path and explores the relationship...

    Sponsored By Hewlett-Packard (HP)

  • Videos // May 2014

    Customer Stories: Real Value from Real SaaS (not customer video)

    See how Workday's Enterprise Cloud has helped CareFusion, Flextronics, and TripAdvisor simplify global operations, provide unprecedented visibility into business information, and capitalize on speed and continuous innovation lifestyle of SaaS.

    Sponsored By Workday