Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // May 2014

    Real-Time Business Demo Tool

    Our interactive Real-Time Business Demo Tool demonstrates the new user experience of the SAP Business Suite software, powered by the SAP HANA platform, which delivers instant insight to all lines of business.

    Sponsored By SAP

  • White Papers // May 2014

    Solutions as individual as you and your workplace: Fuji Xerox Australia

    A short video that shows how Fuji Xerox Australia can help the way you work and keep your business moving.

    Sponsored By Fuji Xerox

  • White Papers // May 2014

    HP ProLiant m300 Server Cartridge and Microsoft IIS 8

    This document describes in detail the workloads executed by the HP team, the results obtained, and the lessons learned as part of the workload characterization effort with MS IIS 8 webserver. The goal of the workload characterization and the solution-oriented white paper is to compare and contrast the performance of...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // May 2014

    Whitepaper: Global at the Core

    Global business can’t be served by legacy applications. That’s why Workday designed SaaS solutions that are global at the core. This whitepaper explains how Workday has built modern, global enterprise application solutions that effectively transform enterprise business by providing superior information, agility, control, and economics.

    Sponsored By Workday

  • Videos // May 2014

    Video: Workday's Mobile Solutions for iPad

    As the workforce around the world becomes more mobile, enterprises are enabling their workers to stay informed and connected while on the go. Watch the video to discover how Workday I empowering today’s workforce with cloud-based mobile solutions that can be easily deployed on your iPad®.

    Sponsored By Workday

  • Videos // May 2014

    Customer Stories: Real Value from Real SaaS (not customer video)

    See how Workday's Enterprise Cloud has helped CareFusion, Flextronics, and TripAdvisor simplify global operations, provide unprecedented visibility into business information, and capitalize on speed and continuous innovation lifestyle of SaaS.

    Sponsored By Workday

  • Videos // May 2014

    Video: Stan Swete, Workday CTO, on Multi-tenancy

    In this video, Workday CTO Stan Swete, discusses the numerous benefits of multi-tenancy, one of the 10 critical requirements for cloud applications.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • White Papers // May 2014

    Whitepaper: 10 Critical Requirements

    Growing interest in cloud computing has prompted almost every enterprise software vendor to claim it's "in the cloud." However, in the industry's rush to fulfill demand, some vendors may skip requirements that are essential. Read this whitepaper to learn the 10 critical requirements of any successful cloud application.

    Sponsored By Workday

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to...

    Sponsored By Druva Software

  • Downloads // May 2014

    Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

    Sponsored By SolarWinds

  • White Papers // May 2014

    Nightmare on Delegation Street with Native AD Tools

    Delegating Active Directory (AD) permissions – and managing and reporting on those delegations – is a nightmare. If you’re using native tools, that is. With the right tools, the job is easy. Learn how to put your AD delegation nightmares to rest – forever.

    Sponsored By Dell Software

  • White Papers // May 2014

    Are You Spending More than You Realize on AD Management?

    Learn about the six key essential Active Directory (AD) management tasks, estimate the costs a company incurs each year in each category and explore how investing in the right tools can make managing AD easier and more cost-effective.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Protect people, processes and technology from web appliation threats

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect their businesses.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Windows Server 2012 – Are You Ready?

    Short: Planning a migration to Windows Server 2012 R2? Explore its new features and benefits – as well as some key considerations when moving from a legacy platform. Plus, learn how to prepare for your move, migrate content efficiently and effectively manage your new environment.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Take Control of Your PST Problem

    Migrating existing PST file data into Exchange or Office 365? Learn about the best practices for PST file migrations so you can simply, quickly and safely complete your move. This informative white paper also explores the native migration tools available, plus additional tools that help you effectively manage your environment...

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Mergers and Acquisitions: Impacts on Active Directory and Exchange Infrastructures

    In today’s fast-paced market, organizations are often undertake a merger or acquisition in order to remain competitive, and with this come a need for restructuring of the underlying infrastructures such as Active Directory and Exchange email systems.

    Sponsored By Dell Software

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Microsoft Active Directory

    Learn how using a combination of best practices and the right migration tools outlined in this white paper can help smooth the process of your organization migrating to Microsoft® Active Directory (AD).

    Sponsored By Dell Software

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Microsoft Exchange

    Whether you are transitioning from a legacy platform, consolidating multiple Exchange environments or upgrading to a more recent version of Exchange, learn how the tools and processes outlined in this webcast can help streamline your migration project.

    Sponsored By Dell Software

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Mergers and Acquisitions—Controlling Impacts on Active Directory and Exchange Infrastructures

    Learn how the strategies for consolidating Exchange and Active Directory outlined in this white paper can help you choose the right strategy for your organization, and how combining tools and processes can ensure a successful consolidation project.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // Apr 2014

    Forrester Report: Measuring Mobile Apps

    Developers need to improve their mobile measurement savvy. Many application development professionals have little to no skills in collecting real-time and operational metrics; that’s usually been the province of infrastructure and operations pros. But such thinking is both antiquated and dangerous. As requirements elicitation shifts from long textual requirements documents...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2014

    Stemming the storage management dilemma with a single solution

    This brief paper summarizes how IBM Integrated Managed Infrastructure (IMI) provides a single, comprehensive storage management solution capable of tackling rapidly escalating storage requirements.

    Sponsored By IBM

  • Downloads // Apr 2014

    Easy-to-Use & Affordable Remote IT Administration & Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

    Sponsored By SolarWinds

  • eBooks // Apr 2014

    Guarding the Castle

    This ebook details the sophisticated strategies and tools that today’s cybercriminals use to infiltrate your network, and how you can stop them.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    IBM: Surviving the Technical Security Skills Crisis

    As new threats emerge every day, the need for qualified security staff is growing - but there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Forrester Report: Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren't enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Sponsored By IBM

  • Case Studies // Apr 2014

    IBM Security Services Cyber: Security Intelligence Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Preparing your Network for the Mobile Onslaught

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices - which can ultimately lead to poor performance or an inflexible infrastructure. Find...

    Sponsored By IBM

  • White Papers // Apr 2014

    The Modern Office and You: 5 Ways to Capitalise on Cloud Opportunities

    Many technology providers are nervous about the Cloud and what it means for their business. Rather than look at the Cloud with fear, embrace it and take advantage of the opportunities it brings for new revenue. In this eBook, you’ll learn 5 ways to capitalize on the future of the...

    Sponsored By ConnectWise

  • White Papers // Apr 2014

    Securing the enterprise workspace: protect your organization while supporting mobility and BYOD

    Is your mobile workforce contributing to vulnerabilities that could lead to a security breach? This white paper explains how Dell Mobility Solutions for security can help protect your organization’s information, systems and networks while simplifying administration and supporting employees with forward-thinking mobility initiatives for a range of devices and operating...

    Sponsored By Dell Software

  • White Papers // Mar 2014

    Global Compliance for Data Security

    Driven on by relentless news about security breaches and data loss, law makers and regulators the world over are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on encryption, not only of portable equipment and...

    Sponsored By Vormetric

  • White Papers // Mar 2014

    Tolly Test Report: IBM Security Web Gateway Appliance

    The report summarizes the Tolly Group’s evaluation of the performance characteristics of the IBM Security Web Gateway AMP 5100 Appliance. It finds the IBM appliance to be 100% effective in blocking inline-preventable web threats and attacks, as well as being powerful and easy to use.

    Sponsored By IBM

  • White Papers // Mar 2014

    Managing User Identities and Access in the Cloud

    This document describes how IBM can help clients design, deploy and manage critical identity and access management controls within cloud environments. IBM is a trusted partner with the broad portfolio and comprehensive security strategy required to enable secure innovation.

    Sponsored By IBM