Software

TechRepublic covers the latest trends in software development and implementation.

  • Podcasts // Feb 2009

    Overview of Microsoft Project Server 2010 for IT Professionals

    In this podcast, speakers provide an overview of Microsoft Project Server 2010 features, requirements, and deployment considerations that IT professionals need to know about the product. Topics they discuss include: system requirements, deployment scenarios, installation procedures, upgrade options, and administration and operations enhancements that help IT professionals.

    Provided By Microsoft

  • Podcasts // Feb 2009

    Client-Side Virtualization

    In this podcast, the speaker discusses the three client-related virtualization technologies - application virtualization, desktop virtualization, and virtualization - and explains when it is appropriate to use each technology. The speaker also introduces the three scenarios one use to explain application, desktop, and virtualization later in the podcast series.

    Provided By Microsoft

  • Podcasts // Feb 2009

    BenkoTips Live & on Demand: Using ASP.NET Application Services

    Microsoft ASP.NET includes powerful and flexible application services that provide support for things like membership (User Name / Password Credential Storage), role management, and navigation right out of the box. In this podcast, one will learn how to extend these services and consume them from a variety of clients. The...

    Provided By Microsoft

  • Podcasts // Feb 2009

    Process-Driven Collaboration With Windows SharePoint Services 3.0 and Outlook 2007

    This podcast speaks about how one can connect workspaces, calendars, and tasks with Microsoft Office Outlook 2007 to better manage the projects through Windows SharePoint Services version 3.0. It also speaks about workflows facilitate process management communication, such as obtaining approval for an expense report.

    Provided By Microsoft

  • Podcasts // Jan 2009

    Thinking Bigger About Business Intelligence

    This podcast will help to learn more about the Microsoft vision for Business Intelligence (BI) and how BI can benefit the organization. Microsoft is committed to BI and driving more value, more functionality, and manageability to support the organization's need for pervasive business intelligence.

    Provided By Microsoft

  • Podcasts // Jan 2009

    Windows Server 2008 File and Storage Solutions

    Windows Server 2008 contains many changes to core file services components that increase availability, scalability, and performance. Some of these components are new others have been significantly enhanced. In this podcast, the speaker covers some of the main file and storage features in Windows Server 2008, including Server Message Block...

    Provided By Microsoft

  • Podcasts // Jan 2009

    Virtualization in a Nutshell

    In this podcast, the speaker speaks about the virtualization world, laying the ground work for the other podcasts in this series. The speaker covers both the Microsoft products and solutions available to create a virtualization environment in the organization and the third-party virtualization options. The speaker also answer the question:...

    Provided By Microsoft

  • Podcasts // Jan 2009

    How Microsoft IT Uses Design Patterns to Deliver Agile Business Intelligence Solutions for Microsoft Executives

    This podcast will explain how to use and extend Microsoft SQL Server and Analysis Services to simplify the storage of KPI and metrics into an Analysis Services catalog that can support intuitive UI agnostic content creation.

    Provided By Microsoft

  • Podcasts // Jan 2009

    TechNet Radio: New Features in Partitioning and Indexes for SQL Server 2008

    In this podcast the speaker covers some of the new features in partitioning and indexes for Microsoft SQL Server 2008, including partition-aligned indexed views, filtered indexes, and filtered stats.

    Provided By Microsoft

  • Podcasts // Dec 2008

    Best Practices for Sizing Server Workloads With Microsoft Hyper-V and Intel Xeon Processor Families

    Server virtualization has been widely used in the past to consolidate development and test server workloads, but recent advances in virtualization technologies now support effective virtualization of production server workloads as well. By using a structured approach, one can optimize performance and scalability for a variety of production server workloads....

    Provided By Microsoft

  • Podcasts // Sep 2014

    From the Ground Up

    In this podcast, the speaker will explain about the continuation of that proof and is aimed at developers to help them detect security vulnerabilities using live source-sink analysis. It is dependent on the code coverage and not aimed to be used in a production environment.

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Ground Truths of a Rugged DevOps Practitioner

    In this podcast, the speaker will explain about the rugged DevOps practitioner. DevOps is an emerging set of principles, methods and practices for communication, collaboration and integration between software development (application/software engineering) and IT operations (system administration/infrastructure) professionals.

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    The DevOps of Everything

    Although the movement started out as a problem statement to solve developer and operations collaboration, it quickly moved into other disciplines such as security, networking and storage. In this podcast, the speaker will take a look at the DevOps affect on things like converged infrastructure, software defined networking, software defined...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Where the Security Rubber Meets the DevOps Road

    DevOps is a natural evolution of agile, lean, continuous integration and other patterns common amongst high performers and continuous process improvement. As someone who has helped dozens of organizations get started with DevOps patterns and tool chains, in this podcast, the speaker will explain where people get started - and...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Use After Free Exploitation

    Use after free vulnerabilities is the cause of a large number of web browser and client-side compromises. Software bugs residing on the heap can be difficult to detect through standard debugging and QA. In this podcast, the speaker will first define the use after free vulnerability class, and then dive...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    IEEE Computer Society's Center for Secure Design: Helping You Design More Secure Software

    The IEEE computer society's CSD (Center for Secure Design) was formed in 2014 with the goal of identifying common design flaws and creating tools or design patterns so architects and developers can avoid introducing those design flaws into software. The CSD aims to create artifacts to aid in the analysis...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Building Your Application Security Data Hub: The Imperative for Structured Vulnerability Information

    One of the reasons application security is so challenging to address is that it spans multiple teams within an organization. Development teams build software, security testing teams find vulnerabilities, security operations staff manage applications in production and IT audit organizations make sure that the resulting software meets compliance and governance...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Warning Ahead: Security Storms are Brewing in Your JavaScript

    JavaScript controls the peoples' lives - they use it to zoom in and out of a map, to automatically schedule doctor appointments and to play online games. But have they ever properly considered the security state of this scripting language? Before dismissing the (in) security posture of JavaScript on the...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Hacking the Oracle Application Framework: A Case Study in Deep-Dive Pen Testing

    The Oracle Application Framework (OAF) is the base of dozens of Oracle's web-based business applications (the e-business suite) and is used by many other organizations to develop their own in-house applications. Last year, the speaker published a major vulnerability (CVE-2013-xxxx) in the framework that allowed inspect inspection of run-time data.

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Stop Chasing Vulnerabilities - Introducing Continuous Application Security

    For too long, application security has been \"Experts-only\" and practiced one-app-at-a-time. But modern software development, both technology and process, is mostly incompatible with this old approach and legacy appsec tools. Software development has been transformed by practices like continuous integration and continuous integration, and the time has come to bring...

    Provided By SecurityTube.net