Software

TechRepublic covers the latest trends in software development and implementation.

  • eBooks // Feb 2014

    Systems Engineering for Dummies

    This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products. If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for...

    Sponsored By IBM

  • White Papers // Feb 2014

    Next-Gen Security

    SSL decryption and inspection keeps attackers away from your data and out of your network. Choose security offerings that can mitigate the most risks. A good NGFW lets you block SSL-encrypted attacks as they happen.

    Sponsored By Dell Software

  • Podcasts // Feb 2014

    TechViews - Deconstructing DevOps

    The TechViews programs will help to cut through the noise of the market and bring you real insights from thought leaders across the industry. 15 minute podcast on DevOps - What is it? Why use it? Listen now.

    Sponsored By CA Technologies

  • Videos // Feb 2014

    Video: DNS Europe drives down the cost of high availability, fault tolerant cloud services for their customers

    Business: DNS Europe is a UK based cloud hosting business offering cloud application hosting and development, hybrid cloud integration, consulting and on-boarding. Challenge: Compete with larger hosting providers and public cloud providers by offering high availability & fault tolerance with a very high service credit policy. Solution: Offer public and...

    Sponsored By CA Technologies

  • White Papers // Feb 2014

    Making Sense of the Chaos: Measuring The Influence of Social Media

    Just as there are valuable marketing tools for monitoring social media and managing social marketing campaigns, there are also tools available to measure the effectiveness of those social campaigns. Read more for a better understanding of the true value of social marketing and the three pillars of social media.

    Sponsored By IBM

  • White Papers // Feb 2014

    Unchain Your Network with Application Intelligence and Control

    This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    NSA Series Data Sheet

    Now your organization can be both secure and productive without compromising network performance. The Dell™ SonicWALL™ Network Security Appliance (NSA) Series is the one of the most secure, highest performing next-generation firewall lines.

    Sponsored By Dell Software

  • White Papers // Jan 2014

    IDC: Driving Business Optimization with End-to-End Performance Testing White Paper

    The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. The document defines an application performance testing framework, discusses a performance test evolution path and explores the relationship...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jan 2014

    3 Ways to Save Software Costs Paper

    This paper discusses the potential for radically improving cost efficiency with a well thought-out Software Asset Management (SAM) strategy. It aims to improve understanding of the SAM discipline, including the challenges it poses as well as the tactical and strategic advantages it offers. Furthermore, it lays out a high-level plan...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jan 2014

    Rightsize Licenses - Service License Optimization White Paper

    This paper presents a new approach to rightsizing software licenses—an approach that empowers companies to get control of their software environment, achieve compliance with all vendors, and optimize license purchases to reduce costs and risks. Simply put, it discusses a new style of license management that fits the “new style...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jan 2014

    Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Sponsored By IBM

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets

    Surprise incidences of downtime in server rooms and remote wiring closets lead to sleepless nights for many IT managers. Most can recount horror stories about how bad luck, human error, or just simple incompetence brought their server rooms down. This paper analyzes several of these incidents and makes recommendations for...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Prefabricated Modular Data Centres

    Data centre systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerised, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    The 10 Things Your Next Firewall Must Do

    For enterprises looking at Next-Generation Firewall’s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

    Sponsored By Palo Alto Networks

  • White Papers // Jan 2014

    Sharing Mac Files on Windows Servers - A Technical Best Practices White Paper

    This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing the Acronis’ ExtremeZ-IP® solution for the first time.

    Sponsored By Acronis

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • White Papers // Jan 2014

    Analytic Databases for Big Data

    Organizations are contemplating a replacement of their analytic databases, data warehouses, and similar platforms to keep pace with new and intensifying requirements for advanced analytics in a "big data" world. As user organizations make such platform replacements -- or add additional platforms to their expanding data warehouse architectures -- they...

    Sponsored By SAP

  • White Papers // Jan 2014

    Enterprise Mobility for Dummies

    Enterprise mobility concerns employees at every level. As you plan for 2014, let this eBook show you how easy it can be to mobilize -- and transform -- your enterprise. From application development and deployment to management and security, any company can do it. This eBook is your guide to...

    Sponsored By SAP

  • Case Studies // Jan 2014

    MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

    Sponsored By F5

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • eBooks // Oct 2013

    Set Your IT Business Up For Success: Achieving Client Satisfaction in the First 30 Days

    The key to achieving client satisfaction and building long-term client relationships is starting off on the right foot. It is important that the groundwork be laid in advance to ensure a smooth onboarding process, as this is the time when new clients are most critical of the work being performed....

    Sponsored By LabTech Software

  • eBooks // Oct 2013

    Finding Success in the Cloud

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

    Sponsored By LabTech Software

  • White Papers // Aug 2013

    Making Smarter Mobile Access Decisions

    Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.

    Sponsored By Dell Software

  • White Papers // May 2013

    The Keys to the Kingdom: Limiting Active Directory Administrators

    Many organizations have come to rely heavily on the information stored directly within Active Directory (AD) with other applications using AD for authentication. However, the manual processes used to update Active Directory (AD) can leave organizations vulnerable, and lead to missing, inaccurate or inconsistent information. Learn how the technical considerations...

    Sponsored By Dell Software

  • White Papers // Apr 2013

    Algorithmics and IBM Platform Computing Solution for Financial Markets

    This paper describes best practices on how to spread the computational demands of advanced risk analytics across a dynamic grid computing environment. With a more advanced and capable computing infrastructure, banks can move from reactively measuring risk to actively managing risk based on timely insights drawn from rigorous analysis, all...

    Sponsored By IBM

  • White Papers // Mar 2012

    The Real SaaS Manifesto

    Due to the proliferation and incorrect use of the term, Software-as-a-Service (SaaS) has often been misunderstood by both software vendors and business people. This whitepaper will define the key terms every company should know, understand, and evaluate when considering a SaaS vendor for their business.

    Sponsored By Workday

  • Case Studies // Jan 2015

    Data-Tech Chooses Kaseya Over Major Competitor After Three Month Evaluation

    Data-Tech recently conducted an extensive, three month evaluation of two of the industry's most prominent providers of managed service tools - Kaseya and a major competitor - before making a final decision as to which company's offering would ultimately grant the clients the highest and most consistent level of service....

    Provided By Data-Tech

  • White Papers // Jan 2015

    Joint Ranging and Clock Parameter Estimation by Wireless Round Trip Time Measurements

    In this paper, the authors develop a new technique for estimating fine clock errors and range between two nodes simultaneously by two-way time-of-arrival measurements using impulse-radio ultra-wideband signals. Estimators for clock parameters and the range are proposed that are robust with respect to outliers. They are analyzed numerically and by...

    Provided By Cornell University

  • White Papers // Jan 2015

    Multi-Resource Energy-Efficient Routing in Cloud Data Centers with Networks-as-a-Service

    With the rapid development of software defined networking and network function virtualization, researchers have proposed a new cloud networking model called Network-as-a-Service (NaaS) which enables both in-network packet processing and application-specific network control. In this paper, the authors revisit the problem of achieving network energy efficiency in data centers and...

    Provided By Temple Skin Care

  • White Papers // Jan 2015

    A Direct Symbolic Execution of SQL Code for Testing of Data-Oriented Applications

    Symbolic execution is a technique which enables automatically generating test inputs (and outputs) exercising a set of execution paths within a program to be tested. If the paths cover a sufficient part of the code under test, the test data offer a representative view of the program's actual behavior, which...

    Provided By University of Nairobi

  • White Papers // Jan 2015

    Flash Storage for Dummies

    This eBook explores the many uses and benefits of flash storage technology in the enterprise. Check it out to discover and learn all you need to: Optimise storage performance Leverage server flash as storage cache Identify workloads well suited for all-flash storage Reduce the footprint of your storage infrastructure

    Provided By NetApp

  • White Papers // Jan 2015

    All Flash FAS Solution for VMware Horizon View

    Enabling the workforce to work remotely is convenient for employees, but not so convenient for IT. The decision to virtualise desktops requires planning from multiple aspects of IT including storage, applications, and infrastructure. How can IT professionals make sure all these aspects are in sync to allow employees to work...

    Provided By NetApp

  • White Papers // Jan 2015

    Infographic: Better Business in a Flash

    With the growing mobility of consumers, comes greater demand for businesses to provide better and smarter services. With NetApp’s multi-patented Flash storage technologies, you can be sure to always put your best business foot forward.

    Provided By NetApp

  • White Papers // Jan 2015

    Offering of New Approach for Agility of Organization Based on Model Driven

    High speed in changing of different technologies, change in demand of customers in organizations, and high competition of companies and institution make organizations to use different methods for rapid adaption with environmental changes in order to gain a larger share of the business market. It is inevitable to create organizations...

    Provided By Creative Commons

  • White Papers // Jan 2015

    Performance Analysis of New Conversion Tool from Relational Datasets to XML Datasets on Selected Websites

    Over the years internet has become essential part of extensive business applications to exchange or restructure large amounts of business information. Relational DataBase (RDB) is normally used for traditional data processing, where as eXtensible Markup Language documents (XML documents) are widely useful for performing online conversation in B2B applications. In...

    Provided By Creative Commons

  • White Papers // Jan 2015

    Android Based Wireless PC Controller

    The system deals with the interfacing of android mobile having version 2.2 and above with the PC using Wi-Fi. For this some steps like pairing, handshaking, port assigning and socket programming should be performed. Inter-Process Communication technique will be implemented for communication between two processes. The system will be such...

    Provided By Creative Commons

  • White Papers // Jan 2015

    Integration of Heterogeneous Databases Based on XML

    As companies grow bigger and bigger the need to integrate data stored across the various departments becomes crucial for the proper functioning of the company as a whole. In this paper, the authors start with a brief summary of the existing approaches commonly used in heterogeneous database integration followed by...

    Provided By Creative Commons

  • White Papers // Jan 2015

    Wireless Charging: An Overview

    Wireless charging also known as Inductive charging which consists two coils one is a transmitter coil another one is receiver coil. In present scenario existing communication network uses wireless nodes or devices for feasible and reliable communication. Charging these wireless devices the authors have prepared a review paper based on...

    Provided By Creative Commons

  • White Papers // Oct 2014

    Six Essential Elements of Web Application Security

    This whitepaper highlights the six key best practices that industry-leading organizations are using in their web application security efforts while reducing resource requirements and lowering the TCO. Read more...

    Sponsored By Qualys

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • Downloads // May 2014

    Find, Analyze & Resolve Your Toughest Performance Issues on SQL Server - FAST

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Sponsored By SolarWinds

  • Downloads // Apr 2014

    Easy-to-Use & Affordable Remote IT Administration & Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

    Sponsored By SolarWinds

  • White Papers // Sep 2014

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably - so it's easy to get confused about which type of protection is right for you. This Manager's Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

    Sponsored By Sophos

  • White Papers // Feb 2014

    Making Sense of the Chaos: Measuring The Influence of Social Media

    Just as there are valuable marketing tools for monitoring social media and managing social marketing campaigns, there are also tools available to measure the effectiveness of those social campaigns. Read more for a better understanding of the true value of social marketing and the three pillars of social media.

    Sponsored By IBM

  • White Papers // Nov 2014

    Overcoming Challenges in Accounts Payable Automation

    Accounts payable automation presents unique challenges. It is characterized by large volumes of data, arriving in different formats and media that must be securely received, accurately interpreted and entered into financial systems.

    Sponsored By Kofax

  • White Papers // Nov 2014

    The Top Seven Reasons to Automate Accounts Payable

    The accounts payable (AP) process is difficult to tame, yet well worth the effort. The reasons for investing in accounts payable automation are compelling, and in this paper we will make them clear.

    Sponsored By Kofax

  • White Papers // Nov 2014

    Kofax TotalAgility Accounts Payable Automation

    In a single software solution, Kofax TotalAgility Accounts Payable Automation delivers the three capabilities that AP departments agree are critical to better performance. Download now and learn about the best practice AP Workflow and effective ERP integration.

    Sponsored By Kofax

  • White Papers // Jul 2014

    See the Big Picture in Big Data - Create 100% Better Products

    Knowing how customers use the products and services you provide helps you improve what you offer, which helps you retain more customers, and attract new ones. This vital knowledge requires the analysis of traditional business data, machine data, and human information. HP is the sponsor of this material. By...

    Sponsored By HP US

  • Analyst Briefings // Jun 2014

    Chartis Risk 100

    Chartis Research launched The Risk Enabled Enterprise report in May. This report contains Survey results.

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Cost of Data Breach Study, From Ponemon Institute, Sponsored by IBM

    IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out...

    Sponsored By IBM

  • White Papers // Jan 2014

    Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Sponsored By IBM

  • White Papers // Jan 2015

    Raise your Google Ranking with Symantec

    Google is becoming more sophisticated and ultimately more humanlike with every new release. Search Engine Optimization (SEO) techniques should be balanced with good user experience if they’re to form part of your business’ long term search strategy. This guide from Symantec will give you all the tips on how to...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Sponsored By Symantec

  • Downloads // Sep 2014

    Code faster. Create faster code.

    Intel VTune Amplifier XE 2015 is the premier performance profiler for C, C++, C#, Fortran, Assembly, and Java. Get the data to meet a wide variety of tuning needs and the tools to mine the data and assess next steps. Powerful analysis lets you sort, filter, and visualize results on...

    Sponsored By Intel Software

  • Downloads // Sep 2014

    Intel® Parallel Studio - Accelerate application performance, scalability, and reliability

    Accelerate development and simplify debugging and tuning, and with this advanced, comprehensive tool suite. Boost application performance: Faster, more accurate compiling with explicit vectorization, OpenMP 4.0 and MPI-3 support, parallel direct sparse solver, and scaling up to 150k processes. Increase portability with latest standards: Enhanced support for MPI-3, MPICH...

    Sponsored By Intel Software

  • White Papers // Jan 2015

    CITO Research: Enterprise Mobility Management Big Bang Theory

    How can IT keep up with the ever-expanding universe of mobility? Enter Enterprise Mobility Management (EMM), which encompasses all aspects of mobility that IT must secure and manage. Download this white paper to learn: How the demand for mobile security has changed What organizations of all sizes must do to...

    Sponsored By MaaS360 by IBM

  • White Papers // Jan 2015

    Mobile Device Management Policy Best Practices

    Do You Know the Policies to Protect Enterprise Mobility? Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves. This...

    Sponsored By MaaS360 by IBM

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Sponsored By Symantec

  • White Papers // Jul 2014

    5 Reasons why Customers Deploy a Flash Strategy on EMC

    Customer are increasingly virtualizing their environment to maximise capacity and reduce costs. This EMC report provides details of a solution with unprecedented overall performance, optimizing for transactional performance and capacity effeciency with no tradeoffs. Read More.

    Sponsored By EMC

  • White Papers // Jan 2015

    The State Of Business Technology Resiliency 2014-2015

    The demand for always-on, always-available services has never been stronger. But flat budgets for business continuity and disaster recovery (BC/DR) may be making it difficult for you to meet these high standards. Forrester Research, in a joint survey with Disaster Recovery Journal, has identified several current trends in business resiliency....

    Sponsored By IBM

  • White Papers // Jan 2015

    TSIA 2014 Report: The State of Support Services

    Looking back at 2014 and the major changes in support services, TSIA identifies what they see as the ‘New World for B4B’. With companies around the world making changes to the way they are structured and how they operate. What new capabilities will be added to the arsenal of support...

    Sponsored By LogMeIn

  • White Papers // Jan 2015

    Selecting the Right Remote Support Solution Tool for your company

    This provides an overview of all the questions that need to be asked when looking at your companies help desk. How to maintain flexibility, simplicity, lower costs while ensuring that your remote support solution allows your support agents to perform advance support task quickly and across multiple platforms and devices....

    Sponsored By LogMeIn

  • White Papers // Jan 2015

    Putting Mobile First: Best Practices of Mobile Technology Leaders - Japanese

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

    Sponsored By IBM

  • White Papers // Jan 2015

    IT Mobile Worksyle Innovation - Japanese

    Download this resource and learn how the Mobile IT environment have change in the last years.

    Sponsored By IBM

  • Downloads // Mar 2007

    Convert an XML file into an Excel spreadsheet with this technique

    Developers often deal with information that is in no way user-friendly without really thinking about how a user would handle it. XML is a prime example --- most users don't know what to make of it. One way to present XML information to a user is by converting...

    Provided By Edmond Woychowsky

  • Resource Center // Oct 2012

    Cloud RFP Template

    Public, private, and hybrid just begin to describe the type of cloud you may be looking for, but what about selecting a cloud provider? What criteria should you look for regarding their ability to deliver consistent performance, reliability and security? To help you gain an understanding of a cloud vendor's...

    Provided By SAVVIS

  • Webcasts // Aug 2014

    On-demand Webcast: Solve Complex Revenue Management Challenges

    For business professionals today, revenue management is an increasingly complicated proposition. Accountants and administrators are now responsible for managing multiple revenue sources and models, which requires a different level of data and analysis, plus powerful tools to successfully manage the complexities of the market and business operations. So how...

    Provided By Intacct

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to...

    Provided By Druva Software

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Provided By Imperva

  • Book chapters // Jul 2007

    Hack online games

    Online games, including World of Warcraft, EverQuest, Second Life, and online poker have taken the computer world by storm. In this chapter download from Exploiting Online Games: Cheating Massively Distributed Systems, explore the kinds of attacks and hacking techniques to which online games are vulnerable. By better understanding these...

    Provided By Addison Wesley Professional

  • White Papers // Mar 2014

    Tips to improve the mobile app experience over Wi-Fi

    As the growing number of people who are using their mobile device access apps at work through Wi-Fi networks, there is an increasing demand on the quality of Wi-Fi signals to improve users’ mobile app experience. This executive brief presents us with 5 tips for ensuring mobile apps run flawlessly....

    Provided By Aruba Networks

  • White Papers // Feb 2014

    Google Apps for Business - Simple, Proven, Transformative

    1-page overview of the benefits provided by Google Apps for Business. How Google Apps for Business helps users work better together while bringing you the benefits of pure cloud. Learn why 5 million businesses have gone to Google Apps for Business to lower costs and liberate IT. Download this quick...

    Provided By Google

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva

  • White Papers // Sep 2014

    Executive Guide to Big Data and Apache Hadoop

    This special edition ebook, from the author of Hadoop for Dummies, contains everything you need to know to get started with Big Data and Hadoop. It also recommends how to evaluate Hadoop’s platform offerings so you can meet your business objectives. Download this ebook to learn critical big data...

    Provided By MapR

  • White Papers // Aug 2014

    Interactive Infographic: A Personal Training Guide for Your Journey to the Cloud - India

    Is your IT infrastructure healthy or is it struggling to meet the intensifying demands placed on it by today's evolving business environment?, are emerging trends in cloud computing, big data, mobility, and security making your IT organisation leaner, smarter and more agile, or is it making it obsolete, unresponsive, and...

    Provided By NetApp

  • White Papers // May 2014

    STAC Report: IBM BigInsights vs Apache Hadoop, using SWIM - How PC accelerates

    In an audited benchmark conducted by STAC®, the Securities Technology Analysis Center, InfoSphere BigInsights for Hadoop was found to deliver an approximate 4x performance gain on average over open source Hadoop running jobs derived from production workload traces. The result is consistent with an approximate eleven times advantage in raw...

    Provided By IBM