Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // May 2014

    Making the Real-Time Enterprise a Reality

    Organizations are transforming not only their systems, cultures, and processes to take advantage of an increasing volume of data collected in the moment. They’re reinventing the enterprise not simply so they can react to business demands in real time but also to anticipate changes before they occur.

    Sponsored By SAP

  • White Papers // May 2014

    Real-Time Insights to Forge Deeper Relationships with Your Customers

    The next step in the evolution of SAP HANA is becoming the foundation for a new generation of real-time applications such as SAP Customer Engagement Intelligence. This application enables highly targeted marketing campaigns and fosters deeper relationships with customers, giving you a better understanding of their needs.

    Sponsored By SAP

  • White Papers // May 2014

    A Cohesive Approach to a Complex Market

    The mobile enterprise is becoming more complex with the consumerization of IT, the mobile app explosion and cloud computing. In this report, IDC covers key trends and what companies should look for in a partner that can help them manage it all.

    Sponsored By SAP

  • White Papers // Jul 2014

    Using Encryption and Access Control for HIPAA Compliance

    Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH.

    Sponsored By Vormetric

  • White Papers // Mar 2014

    Security in the Cloud for SAP HANA

    High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA,...

    Sponsored By Vormetric

  • White Papers // May 2014

    Nightmare on Delegation Street with Native AD Tools

    Delegating Active Directory (AD) permissions – and managing and reporting on those delegations – is a nightmare. If you’re using native tools, that is. With the right tools, the job is easy. Learn how to put your AD delegation nightmares to rest – forever.

    Sponsored By Dell Software

  • White Papers // May 2014

    Are You Spending More than You Realize on AD Management?

    Learn about the six key essential Active Directory (AD) management tasks, estimate the costs a company incurs each year in each category and explore how investing in the right tools can make managing AD easier and more cost-effective.

    Sponsored By Dell Software

  • White Papers // Jan 2014

    Analytic Databases for Big Data

    Organizations are contemplating a replacement of their analytic databases, data warehouses, and similar platforms to keep pace with new and intensifying requirements for advanced analytics in a "big data" world. As user organizations make such platform replacements -- or add additional platforms to their expanding data warehouse architectures -- they...

    Sponsored By SAP

  • White Papers // Jan 2014

    Enterprise Mobility for Dummies

    Enterprise mobility concerns employees at every level. As you plan for 2014, let this eBook show you how easy it can be to mobilize -- and transform -- your enterprise. From application development and deployment to management and security, any company can do it. This eBook is your guide to...

    Sponsored By SAP

  • White Papers // Aug 2013

    The Wild World of Malware: Keeping your Company Safe Inside

    As the level of cyber-crimes continues to grow, it’s important for IT to understand the latest types of malware and how they work. This is especially true for small- and medium-sized businesses that don’t have the resources to concentrate on network security. Find out how to protect your...

    Sponsored By Dell Software

  • White Papers // Jul 2014

    2014 Insider Threat Report

    The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with 537 IT and Security managers in major European enterprises around the question of insider threats. Insider threats have expanded from the traditional insiders to privileged users of systems and the compromise of internal...

    Sponsored By Vormetric

  • Videos // May 2014

    Video: Workday's Mobile Solutions for iPad

    As the workforce around the world becomes more mobile, enterprises are enabling their workers to stay informed and connected while on the go. Watch the video to discover how Workday I empowering today’s workforce with cloud-based mobile solutions that can be easily deployed on your iPad®.

    Sponsored By Workday

  • White Papers // Jan 2014

    IDC: Driving Business Optimization with End-to-End Performance Testing White Paper

    The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. The document defines an application performance testing framework, discusses a performance test evolution path and explores the relationship...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2014

    Securing the enterprise workspace: protect your organization while supporting mobility and BYOD

    Is your mobile workforce contributing to vulnerabilities that could lead to a security breach? This white paper explains how Dell Mobility Solutions for security can help protect your organization’s information, systems and networks while simplifying administration and supporting employees with forward-thinking mobility initiatives for a range of devices and operating...

    Sponsored By Dell Software

  • Videos // May 2014

    Customer Stories: Real Value from Real SaaS (not customer video)

    See how Workday's Enterprise Cloud has helped CareFusion, Flextronics, and TripAdvisor simplify global operations, provide unprecedented visibility into business information, and capitalize on speed and continuous innovation lifestyle of SaaS.

    Sponsored By Workday

  • Videos // May 2014

    Video: Stan Swete, Workday CTO, on Multi-tenancy

    In this video, Workday CTO Stan Swete, discusses the numerous benefits of multi-tenancy, one of the 10 critical requirements for cloud applications.

    Sponsored By Workday

  • White Papers // Jan 2014

    3 Ways to Save Software Costs Paper

    This paper discusses the potential for radically improving cost efficiency with a well thought-out Software Asset Management (SAM) strategy. It aims to improve understanding of the SAM discipline, including the challenges it poses as well as the tactical and strategic advantages it offers. Furthermore, it lays out a high-level plan...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jan 2014

    Rightsize Licenses - Service License Optimization White Paper

    This paper presents a new approach to rightsizing software licenses—an approach that empowers companies to get control of their software environment, achieve compliance with all vendors, and optimize license purchases to reduce costs and risks. Simply put, it discusses a new style of license management that fits the “new style...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jun 2014

    Improve Mobility and BYOD with Enterprise Mobility Management

    Learn how to support mobility business models while providing BYOD capabilities and a high level of security with Enterprise Mobility Management solutions from Dell Software. Watch this informative video.

    Sponsored By Dell Software

  • Videos // Jun 2014

    Match Mobility Needs to Your Workforce with Enterprise Mobility Management

    Watch this short video to find out how to tailor your organization's mobility needs to end users, line-of-business owners and IT decision makers with Enterprise Mobility Management solutions from Dell Software.

    Sponsored By Dell Software

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • White Papers // May 2014

    Whitepaper: 10 Critical Requirements

    Growing interest in cloud computing has prompted almost every enterprise software vendor to claim it's "in the cloud." However, in the industry's rush to fulfill demand, some vendors may skip requirements that are essential. Read this whitepaper to learn the 10 critical requirements of any successful cloud application.

    Sponsored By Workday

  • White Papers // Jul 2014

    Top 5 Things Every Developer Should Know

    C sharp has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects

    Sponsored By Coverity

  • White Papers // Apr 2014

    Forrester Report: Measuring Mobile Apps

    Developers need to improve their mobile measurement savvy. Many application development professionals have little to no skills in collecting real-time and operational metrics; that’s usually been the province of infrastructure and operations pros. But such thinking is both antiquated and dangerous. As requirements elicitation shifts from long textual requirements documents...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Jul 2014

    Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

    Sponsored By Coverity

  • White Papers // Jan 2014

    How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets

    Surprise incidences of downtime in server rooms and remote wiring closets lead to sleepless nights for many IT managers. Most can recount horror stories about how bad luck, human error, or just simple incompetence brought their server rooms down. This paper analyzes several of these incidents and makes recommendations for...

    Sponsored By APC by Schneider Electric

  • White Papers // May 2014

    HP ProLiant m300 Server Cartridge and Microsoft IIS 8

    This document describes in detail the workloads executed by the HP team, the results obtained, and the lessons learned as part of the workload characterization effort with MS IIS 8 webserver. The goal of the workload characterization and the solution-oriented white paper is to compare and contrast the performance of...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Sponsored By Druva Software

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Sponsored By Druva Software

  • Downloads // Oct 2013

    Intel® Composer XE 2013

    Now it’s simpler to recompile for greater improvements by using pre-optimized, pre-threaded performance libraries. This performance-oriented developer tool includes Intel C++ and Fortran compilers, and threading and math, multimedia, and signal processing performance libraries. It’s compatible with leading development environments and compilers on Windows, Linux, and Mac OS X and...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® VTune ™ Amplifier XE 2013

    Advanced performance and thread profiler for C, C++, C#, Fortran, Java, and MPI developers. New pre-sets deliver easier ‟point and shoot” profiling set-up. A threading timeline, data filtering, frame analysis, and source display make it easier to tune your application for today’s and tomorrow’s processors. Powerful bandwidth and memory access...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Advisor XE 2013

    This breakthrough threading prototyping tool simplifies data-driven threading design for C, C++, C#, and Fortran application architects. Quickly prototype multiple threading designs and compare the projected performance scaling and synchronization issues. Evaluate design alternatives before investing in implementation and without disrupting product development and release cycles. Select the design with...

    Sponsored By Intel Software

  • White Papers // Mar 2014

    Advanced Malware Protection: Buying Criteria

    In this advanced Malware Protection Buyer's Criteria, we'll identify the key questions you should ask your advanced malware protection vendor, and we'll describe how Sourcefire combines big data analytics, collective security intelligence and enforcement across networks, endpoints, virtual systems and mobile devices, as well as unique Retrospective Security to combat...

    Sponsored By Sourcefire, Inc.

  • eBooks // Jul 2014

    10 Things Your Next Firewall Must Do (eBook)

    Effectively stopping advanced threats requires a new approach to security. Find out the 10 must-haves for security products today. Download your booklet now! In this free booklet, you'll find insightful and practical advices on: The why and how of next-generation security 10 critical functions your network...

    Sponsored By Palo Alto Networks

  • Case Studies // Mar 2014

    SANS: Calculating Total Cost of Ownership on Intrusion Prevention Technology

    Intrusion prevention technology stops adverse events in real-time, sparing organisations from the disruption and loss that might otherwise have occurred. With advanced correlation and automation, there are many areas in which IPSs can save organisations time and money. This paper, while not scientific, attempts to calculate the value of...

    Sponsored By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Buyer's Criteria for Next-Generation Network Security

    This Next-Generation Network Security Buyer's Criteria will provide an in-depth explanation of the factors that drive organisations to look at next-generation solutions. It offers an analysis of the key capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need...

    Sponsored By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Addressing the Malware Challenge - Strategies at Work: An IANS Custom Report

    We all know malware is a problem, but what's really being done about it? - IANS answers this question with in-depth research on how 100 large global organisations are combating sophisticated security threats. In general, the report provides insights on how malware is changing, what the implications for defence are...

    Sponsored By Sourcefire, Inc.