Software

TechRepublic covers the latest trends in software development and implementation.

  • Webcasts // Apr 2014

    On-demand Webcast: Three Reasons Your Competitors Are Adopting Cloud

    Adoption of the cloud is accelerating as businesses face a growing body of facts and figures that show the cloud can meet data security, privacy, and compliance requirements; reduce costs; and allow consolidation of data backup and recovery needs. With this mounting evidence, the cloud train is leaving the station....

    Provided By EVault

  • Webcasts // Apr 2014

    The Collaboration System that Brings Teams Together

    Sharing knowledge, developing ideas, making better decisions – these move agencies and teams in the right direction. With Christie Brio, you can simultaneously contribute rich multimedia content from multiple wireless sources and engage easily with colleagues – in the same room or around the world, in real-time. Learn about Christie...

    Provided By AVI-SPL

  • Webcasts // Mar 2014

    On-demand Webcast - Virtualizing Exchange: Protection made easy

    Have you held off virtualizing Exchange? If so, what Rick Vanover from Veeam has to show you may be enough to convince you to change! Join this webinar to see how you can successfully virtualize and protect Exchange while giving benefits you never thought possible. You will see...

    Provided By Veeam Software

  • Webcasts // Mar 2014

    Forrester: Better Outcomes, Faster Results – A Path to Continuous Delivery

    Conditioned by experiences with mobile and cloud-based software, customers are demanding faster responsiveness to their needs. Winning or losing customers now depends on your ability to remove delivery barriers so you can produce high-quality applications on demand. The race for customers is on—are you prepared to win? Watch this...

    Provided By HP US

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Provided By Centrify

  • Webcasts // Feb 2014

    HP: Forrester Research: Application Management- Better Outcomes, Faster Results

    Conditioned by experiences with mobile and cloud-based software, customers are demanding faster responsiveness to their needs. Winning or losing customers now depends on your ability to remove delivery barriers so you can produce high-quality applications on demand. The race for customers is on—are you prepared to win? Join us...

    Provided By HP US

  • Webcasts // Feb 2014

    Forrester: Better Outcomes, Faster Results – A Path to Continuous Delivery

    Conditioned by experiences with mobile and cloud-based software, customers are demanding faster responsiveness to their needs. Winning or losing customers now depends on your ability to remove delivery barriers so you can produce high-quality applications on demand. The race for customers is on—are you prepared to win? Join us...

    Provided By HP US

  • Webcasts // Feb 2014

    Webcast: See into the Future of Managed File Transfer

    Join this webcast with experts from IBM to get a Managed File Transfer strategy update and learn about IBM’s vision for ensuring end-to-end visibility, universal connectivity and dynamic communities.

    Provided By IBM

  • Webcasts // Feb 2014

    On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

    Provided By Centrify

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    Cloud Webinar: Creating Outstanding Customer Experiences

    How do you ensure great customer service? Adaptable demand management? Quickest delivery times? Best customer experience? Sign up for our upcoming webinar now to find out how Made.com, Gondola Group (owners of Pizza Express, Zizzi, Ask), and fancy dress manufacturer and retailer, Smiffy’s tackle these questions with the support of...

    Provided By Adapt

  • Webcasts // Jan 2014

    Live Webcast - The Overnight Expert: Mastering the Art of Agile Learning

    Join us for this LIVE event! Tuesday, January 14th 11:00 AM PDT / 2:00 PM EDT Getting up to speed quickly is an imperative today. Whether you’re starting a new job or a new project, you’re expected to reach proficiency in record time. But becoming an overnight expert is...

    Provided By Citrix Online

  • Webcasts // Jan 2014

    On-demand Webcast: 5 Key Components to Improve Service & Maintenance Costs with a Standard Operating Environment (SOE)

    Enterprise IT organizations today require more flexible IT services, greater capacity, and tighter service-level agreements (SLAs). All while system management requirements are becoming more complex and associated compliance and audit overhead is increasing. It is more important than ever to increase IT operational efficiency by streamlining deployment and management of...

    Provided By Red Hat

  • Webcasts // Jan 2014

    Invasive Roots Of Anti-Cheat Software

    Some of the most sophisticated rootkit behaviors are implemented by today's anti-cheat gaming software, in a constantly evolving game of cat and mouse. Game hackers often look for flaws in a system or program's logic, seeking to exploit them for their own performance gains.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Contininuous Security Testing in a DevOps World

    In this webcast, the presenter explains about the BDD-security framework. Which is designed to solve some of these challenges by providing security teams and developers with the tools to: specify the security requirements in a human readable form, make those same requirements executable tests that can be run against a...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Vulnerability Discovery in Closed Source/Bytecode Encrypted PHP Applications

    Security audits of PHP applications are usually performed on a source code basis. However, sometimes vendors protect their source code by encrypting their applications with runtime (bytecode) encryptors. When these tools are used source code analysis is no longer possible and because these tools change how PHP works internally, several...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Objects as Software: The Coming Revolution

    Open source software is essentially based on sharing instructions. These coded instructions deal with very tedious things no human would ever want to attempt manually. The people have computers that understand these instructions and gleefully execute them much faster than any human possibly could.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Full-Disk-Encryption Crash-Course

    Full-Disk-Encryption (FDE) is an important aspect of data security and everyone should use an appropriate solution to protect their (especially mobile) systems and data. In this webcast, the presenter covers the technology behind Full-Disk-Encryption (FDE) software products.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Shameful Secrets of Proprietary Network Protocols

    There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Active Scan Augmenting Manual Testing with Attack Proxy Plugins

    In this webcast, the presenter will introduce ActiveScan++ and demonstrate how it can be used to easily identify complex vulnerabilities in real world applications. ActiveScan++ is an open source Python plugin that builds upon Burp Suite's basic active scanning functionality.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting New Actionable Insights by Analyzing Web Application Firewall Triggers

    ModSecurity web application firewall was first released more than a decade ago, available as open source software that gives the ability to protect web applications. Over the years ModSecurity has matured significantly, and is the most widely deployed WAF, protecting millions of websites. In this webcast, the presenter will show...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Application Security Training Make Developers Build Less Vulnerable Code?

    In this webcast, the presenter will shares the results of a yearlong survey of nearly 600 software developers that captures their knowledge of application security before and after formal training. The presenter also explains the results of a \"Retest\" of a subset of respondents, to identify how much security knowledge...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting a Handle on Mobile Security

    Mobile development is one of the largest growth areas in all of software. The last decade has seen an explosion of mobile devices, operating systems, development environments, libraries, toolkits and app stores. Organizations are racing to construct mobile applications that harness the power of the mobile paradigm.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hybrid Analysis Mapping Making Security and Development Tools Play Nice Together

    Developers want to write code and security testers want to break it and both groups have specialized tools supporting these goals. The problem is - security testers need to know more about application code to do better testing and developers need to be able to quickly address problems found by...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Running Your Own GSM Network

    In this webcast, the presenter will mark the first public release of a new GPL licensed free software project implementing the GSM fixed network, including the various minimal necessary functionality of BSC, MSC, HLR.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Implications of the Cross-Origin Resource Sharing

    In this webcast, the presenter will analyze the Cross-Origin Resource Sharing (CORS). This HTML5 feature allows websites to load resources from other domains, even from restricted environments, using the authentication tokens saved by the browser.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Continuous Security Testing in a Devops World

    In this webcast, the presenter will present an open source security testing framework that aims to address them through the use of Behavior Driven Development (BDD). BDD offers a communication bridge between security, development and testing so that security requirements can be defined in a natural language; and yet still...

    Provided By SecurityTube.net

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Nov 2013

    Rave Reviews: How to Dazzle Decision Makers with Data

    Veteran Analyst Dr. Robin Bloor, who will explain why a proliferation of new data visualization options is fundamentally changing the way analytics deliver value in this on-demand webinar. He'll be briefed by IBM's Noah Iliinsky, who will discuss the new RAVE program, which gives end users access to an ever-growing...

    Provided By IBM

  • Webcasts // Nov 2013

    The On Demand Workforce: Accelerating Performance with Tablet Solutions

    We live in an "on demand" world where customers have instant access to critical information on every product and service they consider purchasing. This ubiquitous "awareness" creates a highly educated market that expects quality, simplicity and convenience at all times. To effectively meet the needs of this highly dynamic...

    Provided By Dell & Microsoft

  • Webcasts // Nov 2013

    Hands-on with ServiceNow: An In-Depth Demo

    We will show you the power of the ServiceNow single system of record through some easy-to-follow demonstrations. This webinar includes demonstrations of: Incident, Problem and Change Management Service Catalog & Self Service Performance Analytics

    Provided By ServiceNow

  • Webcasts // Oct 2013

    Webcast: Active Directory Forest Recovery: What You Don’t Know WILL Hurt You

    A complete Active Directory forest failure could be catastrophic to your business’ bottom line. This webcast explores case studies on actual forest disasters, and how Recovery Manager for Active Directory Forest Edition can save the day – and possibly your job. Watch the Webcast.

    Provided By Dell Software

  • Webcasts // Oct 2013

    Marienhospital Stuttgart finds the cure to escalating volumes of data

    The need To improve patient care, Marienhospital Stuttgart wanted to extend the use of modern medical equipment and provide a single source of patient data. Both aims necessitated more storage capacity.The solution Marienhospital Stuttgart deployed a virtualized storage solution based on IBM technology to meet escalating data storage requirements and...

    Provided By IBM

  • Webcasts // Oct 2013

    3 Steps to Automating Windows Migrations and Application Compatibility

    The most compelling IT task facing many organizations today is the need to migrate from Windows XP. This doesn’t need to be a complex and time consuming task – automation tools and best practices can dramatically simplify system deployments. Register today for this informative live event, where you’ll learn...

    Provided By Dell Kace

  • Webcasts // Sep 2013

    IBM's Approach to ERP Transformation and Vendor Selection

    Have you been thinking of implementing an ERP solution or upgrading your current legacy systems? Not sure where to start? Unsure of what should drive your ERP selection process? Please join us for the first episode of a webcast series discussing what mid-sized distribution and manufacturing companies should consider as...

    Provided By IBM

  • Webcasts // Sep 2013

    An Overview of VMware vCloud Suite

    VMware vCloud® suite delivers a complete, integrated cloud infrastructure that simplifies IT operations while also delivering the best SLAs for all applications. The suite delivers virtualized infrastructure services (storage, network, security and availability) with built-in intelligence to automate on-demand provisioning, placement, configuration and control based on application requirements and defined...

    Provided By VMware

  • Webcasts // Sep 2013

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Sep 2013

    Microsoft Active Directory Consolidation Challenges

    An Active Directory consolidation can be difficult if you don’t have a solid plan in place. In this archived webcast, learn about common Active Directory consolidation challenges, when to migrate and how the right combination of best practices and migration tools can smooth the process. Watch it today.

    Provided By Dell Software

  • Webcasts // Sep 2013

    Moving to Microsoft Exchange 2013?

    Are you ready to make the move to Exchange 2013 and enjoy its new, powerful features? In this archived webcast, see if your company is ready for this important migration and the steps to take for it to be a success. Watch it today.

    Provided By Dell Software

  • Webcasts // Sep 2013

    Windows Upgrade: Key Processes And Resources Revealed

    Despite the end of Windows XP support, many organizations still heavily rely on Windows XP with legacy applications, though a timely change is a very good thing! View this webinar by Dell and discover how you can: Accelerate your migration to modern Windows Automate the migration...

    Provided By Dell & Microsoft