Software

TechRepublic covers the latest trends in software development and implementation.

  • Case Studies // Nov 2014

    An Integrated Approach to Optimising Print in a University

    King’s College London is among the top 6 universities in the UK and top 20 in the world. To improve its print service for students and staff, and save money, the College looked for a partner that could help it standardise on one model of printer, provide a proactive print...

    Sponsored By Samsung

  • White Papers // Oct 2014

    Market Trends: Desktop Virtualization

    The "year of desktop virtualization" has been touted for almost a decade. In practical terms, technology and service providers need to cater to its varying market characteristics, which represent an array of technologies best suited to particular needs across industry and geographic boundaries. Gartner's current research agenda for client computing...

    Sponsored By VMware

  • White Papers // Oct 2014

    Infographic: Horizon 6 Allows IT to Deliver Virtual or Remote Desktops and Applications Through a Single Platform to End Users

    Gone are the days of client/server computing where Windows ruled the day and end users were tasked to do their work from one device and one location. Today, end users are leveraging new types of devices for work, accessing Windows applications alongside non-Windows-based applications and are more mobile than ever....

    Sponsored By VMware

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Sep 2014

    Delivering Successful Software: The Importance of Precision, Validation, and Control

    Complexity is threatening to derail the software supply chain. The frantic pace of change, driven by mobile, cloud and the rise of the consumer, is forcing organizations into more fragmented ways of working. In this whitepaper, learn how to embrace the flexible processes required for modern software delivery, while underpinning...

    Sponsored By Micro Focus

  • White Papers // Sep 2014

    Testing Times for Ecommerce

    For development organizations to remain competitive, their developers and testers require an enterprise-class solution that delivers automated software application performance and load testing. In this whitepaper, learn how to deliver realistic, dependable performance tests across the latest technologies, including front and back-office systems, by simulating loads and network speeds for...

    Sponsored By Micro Focus

  • White Papers // Sep 2014

    Drowning in a Sea of Downtime - Infographic

    With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on...

    Sponsored By Micro Focus

  • eBooks // Sep 2014

    Blue Coat's Encrypted Traffic Management Interactive E-Guide

    According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to...

    Sponsored By Blue Coat Systems

  • eBooks // Sep 2014

    Stop Attacks Hiding Under the Cover of SSL Encryption

    Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.

    Sponsored By Blue Coat Systems

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Research // Sep 2014

    SANS Analyst White Paper: Finding Hidden Threats by Decrypting SSL

    This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

    Sponsored By Blue Coat Systems

  • White Papers // Sep 2014

    Blue Coat SSL Visibility

    To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.

    Sponsored By Blue Coat Systems

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // Jul 2014

    Migrating Blackberry Policies to MobileIron

    As the next generation of smartphones and tablets enters the market, employees want the freedom to choose their own devices and use apps that meet their needs. Analyst recommendations that organizations migrate off BlackBerry have forced IT departments to develop contingency plans for their existing mission-critical BlackBerry Enterprise Server (BES)...

    Sponsored By MobileIron

  • White Papers // Jul 2014

    Windows Phone 8.1 in the Enterprise

    When Windows Phone 8 was first launched, the majority of its platform innovations were focused on delivering a robust end-user experience. Strong support for Microsoft productivity tools made Windows Phone an attractive option for business users, but not all enterprises were ready to fully embrace the new platform. While it...

    Sponsored By MobileIron

  • Research // Sep 2014

    Security for the Mobile First Era

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.

    Sponsored By MobileIron

  • White Papers // Sep 2014

    Troubleshooting Fibre Channel Boot from SAN on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the implementation of stateless computing, which allows all the hardware...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    Failover Strategies on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years, becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the capacity for two totally redundant failover paths for every...

    Sponsored By Global Knowledge

  • White Papers // Oct 2014

    EMC InfoArchive: Data Sheet

    Information accumulation stretches capacity to the breaking point, with higher costs for servers, storage, application maintenance, database software, and operations. Keeping all information in its source application is neither cost-effective nor scalable. And backup is only a temporary measure; difficult to access and not a compliant solution.

    Sponsored By EMC

  • White Papers // May 2014

    The Complete Guide to Hosting

    This eGuide presents all the fundamental things you need to know about hosting and cloud computing, enabling you to review the more detailed technical documents you may read in the future such as service and product descriptions.

    Sponsored By Macquarie Telecom Australia

  • White Papers // Feb 2014

    NSA Series Data Sheet

    Now your organization can be both secure and productive without compromising network performance. The Dell™ SonicWALL™ Network Security Appliance (NSA) Series is the one of the most secure, highest performing next-generation firewall lines.

    Sponsored By Dell Software

  • White Papers // May 2013

    The Keys to the Kingdom: Limiting Active Directory Administrators

    Many organizations have come to rely heavily on the information stored directly within Active Directory (AD) with other applications using AD for authentication. However, the manual processes used to update Active Directory (AD) can leave organizations vulnerable, and lead to missing, inaccurate or inconsistent information. Learn how the technical considerations...

    Sponsored By Dell Software

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • eBooks // Apr 2014

    Guarding the Castle

    This ebook details the sophisticated strategies and tools that today’s cybercriminals use to infiltrate your network, and how you can stop them.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Next-Gen Security

    SSL decryption and inspection keeps attackers away from your data and out of your network. Choose security offerings that can mitigate the most risks. A good NGFW lets you block SSL-encrypted attacks as they happen.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    The Migrate-Manage-Govern Strategy to Active Directory Transformation

    Active Directory (AD) environments today have become extremely complex and increasingly cumbersome to manage. This can lead to security and compliance challenges that impede the adoption of useful new technologies. Learn how the migration strategy outlined in this white paper can help you transform AD from an administrative burden into...

    Sponsored By Dell Software

  • White Papers // Aug 2014

    How SMBs Can Stop Malvertising

    Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Overcoming Exploits that Use Advanced Evasion Techniques and SSL Encryption

    To defend against today’s advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Making Smarter Mobile Access Decisions

    Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Unchain Your Network with Application Intelligence and Control

    This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.

    Sponsored By Dell Software

  • Case Studies // Sep 2014

    Global Insurance Company Tackles Fraud Detection On-Site With Hitachi Content Platform Software

    Is your enterprise looking for ways to reduce storage costs and delay capital expenditures (capex) with highly scalable public cloud computing services? Today’s top cloud services support enterprises with data encryption, tiering options and attractive, pay-as-you-go pricing. While public cloud services can cut storage costs, they are not cost-effective...

    Sponsored By Hitachi

  • White Papers // Oct 2014

    Six Essential Elements of Web Application Security

    This whitepaper highlights the six key best practices that industry-leading organizations are using in their web application security efforts while reducing resource requirements and lowering the TCO. Read more...

    Sponsored By Qualys

  • White Papers // Nov 2014

    Become a Social Business in the Cloud

    The era of social business is here. Across industries, business leaders are driving initiatives that strategically integrate social collaboration tools with business processes. These leaders recognize that social tools — such as online communities and meetings, file sharing, profiles, instant messaging, and activity management — allow people to apply relevant...

    Sponsored By IBM

  • White Papers // Nov 2014

    IDC 2014 report: Improving Collaboration by Adding Social Capabilities to Email

    Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. This Technology Spotlight explores the changing dynamics in the way organizations collaborate and the impact of...

    Sponsored By IBM

  • White Papers // May 2014

    EMC’s Flash Strategy

    Beyond the hardware, a key part of EMC’s differentiation and strategy (and likely a glimpse at the future in our newly software-defined world) is software. This is not only the caching algorithms and management protocols for all the hardware mentioned above, but also EMC Fully Automated Storage Tiering (FAST) that...

    Sponsored By EMC

  • White Papers // Nov 2014

    Forrester Report: Software Must Enrich Your Brand

    Whether you realise it or not, software has become core to your business success. A perfect technology storm of mobile apps, connected products, social connections, data analytics, and cloud computing continually raises customer expectations for quality in every industry. Customers expect to interact with your products, services, and company —...

    Sponsored By CA Technologies

  • White Papers // Nov 2014

    Research Report - DevOps: The Worst-Kept Secret to Winning in the Application Economy

    DevOps is a best practice for any enterprise trying to succeed in the application economy and successful practitioners report an increase in the availability of new software, higher quality apps and better collaboration. Download this report now to see the full results of this study and find out how to...

    Sponsored By CA Technologies

  • White Papers // Apr 2013

    Algorithmics and IBM Platform Computing Solution for Financial Markets

    This paper describes best practices on how to spread the computational demands of advanced risk analytics across a dynamic grid computing environment. With a more advanced and capable computing infrastructure, banks can move from reactively measuring risk to actively managing risk based on timely insights drawn from rigorous analysis, all...

    Sponsored By IBM

  • White Papers // Aug 2014

    Security intelligence Report: The smart way to keep the cloud safe - Download

    Many of the same characteristics that make cloud computing attractive can also make it challenging to secure. An integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide visibility and control to help better secure cloud environments.

    Sponsored By IBM

  • White Papers // Aug 2014

    Reducing the Cost and Complexity of Endpoint Management - Report

    Discover how midsized organizations can improve endpoint security, patch compliance and lifecycle management on a limited budget.

    Sponsored By IBM