Software

With virtualization, mobile apps, and agile dev platforms, software increasingly defines business. Take advantage of our expert guidance for developing, managing, and monetizing software.

  • White Papers // Feb 2015

    The Tools for Continuous Delivery

    Organizations create, deliver and modify software to fill business needs. Those business needs are not static: They can change as suddenly as breaking news. Any organization using software to serve its customers — and really, that’s almost every company, nonprofit or institution — has to find a way to develop,...

    Sponsored By Puppet Labs

  • Downloads // Feb 2015

    Reduce Troubleshooting Time Up to 59% in Your Virtual Environment

    Know exactly where to look when there’s a problem. SolarWinds® Virtualization Manager shows your entire virtualization stack from VM to storage, highlighting performance bottlenecks along the way. Immediate view of normal, informational, warning, and critical alerts of your virtual infrastructure Detailed visibility into all virtualization layers showing live performance...

    Sponsored By SolarWinds

  • White Papers // Feb 2015

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey....

    Sponsored By Neustar

  • White Papers // Feb 2015

    Protecting Your APIs against Attack and Hijack

    The pressure is on to securely connect the enterprise to mobile apps, cloud platforms and developer networks through APIs. But it is a mistake to think you can secure APIs using the same methods and technology as before. APIs have an entirely unique risk profile that must be addressed....

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Five Simple Strategies for Securing APIs

    APIs might represent increased risk for the enterprise, but the potential benefits they bring to an organisation can overshadow any inherent dangers. Read this eBook to understand the 3 attack vectors or watch with APIs, and 5 simple strategies to secure your APIs.

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Choosing the Right API Management Solution for the Enterprise User

    This whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery. Read now to also discover the basic functional areas of API management, including: API lifecycle management Developer enablement and community building API monetisation

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    A How-to Guide to OAuth & API Security

    This informative whitepaper describes what OAuth is and how it fits into a complete API security solution. Read now to understand the complexity of implementing OAuth, and how you can make an OAuth implementation simple for your organisation.

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Top 5 Ways Cloud Solutions Power Business Agility

    The real power of cloud is its ability to allow businesses to “spend less time and money managing IT, and more time focused on their real priority - growth”. This has made the industry to embrace the chance and evolve the way they manage IT. This report talks about how...

    Sponsored By Infor

  • White Papers // Feb 2015

    Infor CloudSuite - Flexible and Proven Solutions for your Industry

    Infor CloudSuite offers a comprehensive portfolio of solutions designed to help support manufacturing, healthcare, the public sector, and more. Infor CloudSuite lets you put some of the most innovative business technologies available today to work for your business in ways that can help optimize value and minimize risk. Download this...

    Sponsored By Infor

  • White Papers // Jan 2015

    TSIA 2014 Remote Support Trends

    Based on information gathered in TSIA’s annual Global Technology Survey, this report will look at the trend of remote support services being adopted over many different industry types. Through the continued improvement of remote control, desktop sharing and web collaboration, companies are able to use these capabilities to increase productivity...

    Sponsored By LogMeIn Australia

  • White Papers // Jan 2015

    Selecting the Right Remote Support Solution Tool for your company

    This provides an overview of all the questions that need to be asked when looking at your company’s remote support technology. The report will discuss how to maintain flexibility, simplicity and lower costs while ensuring that your remote support solution allows your support agents to perform advance support tasks quickly...

    Sponsored By LogMeIn Australia

  • White Papers // Jan 2015

    A Guide to Selecting the Right Remote Support Solution Tool for your company

    This provides an overview of all the questions that need to be asked when looking at your company’s remote support technology. The report will discuss how to maintain flexibility, simplicity and lower costs while ensuring that your remote support solution allows your support agents to perform advance support tasks quickly...

    Sponsored By LogMeIn Australia

  • White Papers // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Sponsored By Symantec

  • White Papers // Jan 2015

    Resiliency Testing Best Practices - Report

    Every organization must put a plan in place for recover-ability after an outage, but testing your enterprise resilience without full business and IT validation is ineffective. Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of...

    Sponsored By IBM

  • White Papers // Nov 2014

    How to Measure the ROI of Cloud Data Protection

    This white paper helps managers demonstrate the profitability of reducing operational costs in server backup and recovery through investment in cloud server data protection (subscription), rather than traditional backup methods. Comparative cost categories used in calculating this ROI are summarized in a convenient checklist. These include capital costs of hardware...

    Sponsored By HP

  • White Papers // Oct 2014

    What CIOs need to know in order to capitalize on Hybrid Cloud

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility, the flexibility to use a variety of services, the scalability to keep pace with business volume, the efficiency...

    Sponsored By EMC

  • White Papers // Oct 2014

    Best Practices for Selecting a Web Application Scanning (WAS) Solution

    This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands. Learn more...

    Sponsored By Qualys

  • eBooks // Oct 2014

    Web Application Security for Dummies

    This book simply explains all about web application security. After reading this book you'll know how to use a web application security scanner to quickly find vulnerabilities and remediate them for stronger security. Learn more...

    Sponsored By Qualys

  • White Papers // Oct 2014

    Six Essential Elements of Web Application Security

    This whitepaper highlights the six key best practices that industry-leading organizations are using in their web application security efforts while reducing resource requirements and lowering the TCO. Read more...

    Sponsored By Qualys

  • Downloads // Sep 2014

    Code faster. Create faster code.

    Intel VTune Amplifier XE 2015 is the premier performance profiler for C, C++, C#, Fortran, Assembly, and Java. Collect rich performance data to tune for hotspots, threading, locks and waits, DirectX, bandwidth, and more. Gain fast insight into performance bottlenecks. Automate regression tests. Intel VTune Amplifier XE 2015...

    Sponsored By Intel Software

  • White Papers // Aug 2014

    Infographic: The Power of The Cloud

    Large enterprises today require greater flexibility and increased innovation from their IT function to compete on a global scale - yet technology consumption is changing and IT budgets are anything but growing. It’s time for a new approach. Review the infographic below to learn how and why European IT...

    Sponsored By Workday

  • White Papers // Aug 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware? - Report

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Aug 2014

    Frost & Sullivan awards IBM 2014 Customer Value Leadership Award for Mobile Identity and Access Management Solution

    This Frost & Sullivan best practices research paper details why IBM have been provided their 2014 Customer Value Leadership in the Mobile Identity and Access Management because of IBM's outstanding performance.

    Sponsored By IBM

  • White Papers // May 2014

    EMC’s Flash Strategy

    Beyond the hardware, a key part of EMC’s differentiation and strategy (and likely a glimpse at the future in our newly software-defined world) is software. This is not only the caching algorithms and management protocols for all the hardware mentioned above, but also EMC Fully Automated Storage Tiering (FAST) that...

    Sponsored By EMC

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Oct 2013

    Streamlining Global Operations: A New Approach to Two-Tier ERP

    As well as simplifying and speeding financial consolidation for the CFO, a cloud-based two-tier ERP system delivers more complete, up-to-the-minute information to the CEO and everyone else in the executive suite. Much more than simply a platform for improved financial consolidation and governance, it provides a foundation for a modern,...

    Sponsored By NetSuite

  • White Papers // Jan 2013

    Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. This report presents our results and findings...

    Sponsored By Webroot Software

  • White Papers // Sep 2015

    Downtime Costs How Much? Calculating the Business Value of Disaster Recovery

    As an IT professional, you will experience a system failure, outage, or complete site disaster. It’s inevitable, and your organisation probably already has some sort of disaster recovery (DR) plan in place. Most days, you probably don’t even think about DR. You focus on projects that streamline processes, decrease costs...

    Provided By Dell and Intel

  • White Papers // Aug 2015

    Select the Right Security Solution for Protecting Enterprise Endpoints

    Selecting a solution to protect endpoints is more important than ever. Not only can a successful cyber attack be expensive, it can ripple through the enterprise. This guide shows what to look for to gain preemptive protection wherever systems are, without impacting user productivity.

    Provided By IBM

  • White Papers // Aug 2015

    451 Research DevOps Study: IT Ops Can Thrive in a DevOps World

    Does IT still have buying power in the world of DevOps? The answer is a solid ‘yes,’ based on our findings across 11 different categories of IT. The IT organisation is also heavily involved in most assessment and specification activity. Read more and learn how to procure new tools much...

    Provided By Hewlett-Packard (HP)

  • White Papers // Aug 2015

    On the Road to the New Style of Business

    This CIO Quick Pulse research shows that infrastructure modernisation is helping businesses build an IT culture optimised for rapid, continuous innovation. It also examines how enterprises can generate this type of innovation - and barriers that prevent it (cost and lack of IT resources) and how deploying DevOps (where IT...

    Provided By Hewlett-Packard (HP)

  • White Papers // Aug 2015

    2015 Research Report: Profiling Infrastructure Leaders

    This report uncovers where the priorities for tomorrow’s infrastructure lie, and what gaps exist between firms that are successfully transforming traditional IT functions and those that have yet to begin. Your infrastructure must be ready to support the demands of an increasingly digital business that benefits from cloud, Big Data,...

    Provided By Hewlett-Packard (HP)

  • White Papers // Aug 2015

    Applying Case based Reasoning in Agile Software Development

    There is a common misconception among developers who follow agile development methods that following formal processes and modeling are unnecessarily and perceived as a waste of effort. The initial intension of agile was not an anti-methodology movement but rather a balance between processes and production. Nevertheless, the main challenges facing...

    Provided By Journal of Theoretical and Applied Information Technology

  • Webcasts // Aug 2015

    Secure Software Development

    Developing software is hard, and there are lots of different facets to consider. In this webcast, the presenter will explain about how to think about security during the software development lifecycle, hopefully making software more secure.

    Provided By SecurityTube.net

  • White Papers // Aug 2015

    Mining of Best Technique of Requirement for Software Development: Comparison of Ten Techniques for Gathering Requirements

    Each and every organization is rapidly taking a turn from manual to automatic computing. For this customized software is developed by the software companies. Before development software companies require their requirements. Requirement may span a wide range of statements and statement can be imprecise, incomplete and inconsistent. If requirement is...

    Provided By IRD India

  • Webcasts // Aug 2015

    Authorization With Oauth 2.0

    OAuth 2.0 is an open standard for authorization and is becoming the de facto standard to integrate with social media like Facebook and Twitter. It allows users to share private resources between sites without having to hand out their credentials. In this webcast, the presenters will describe how OAuth works...

    Provided By SecurityTube.net

  • White Papers // Jun 2015

    Workday: Innovation in Financial Management

    Businesses today have an alternative to legacy ERP. Workday is leading the charge with revolutionary innovation that can give businesses a real competitive edge by modelling the way that businesses operate and providing the flexibility to fit your unique business requirements today, and, perhaps more importantly, as they change over...

    Sponsored By Workday

  • White Papers // Aug 2015

    Transform the Workspace with Cisco Catalyst Multigigabit Ethernet Switches

    Wi-Fi is about to get a reboot. New 802.11ac Wave 2 products will make it possible to deliver LAN-like multigigabit speeds over the wireless network for the first time, enabling previously unimagined scale and flexibility in the enterprise workspace. But how will businesses capitalize on this new capacity when most...

    Sponsored By Cisco Systems

  • White Papers // Aug 2015

    WiFi Evolution Drives the Need for Multigigabit Networks

    Historically, the speed of a wired connection at the access edge has always been faster than that of a wireless connection. This means workers had to choose between the performance of wired connectivity and the convenience of a wireless connection. Consequently, workers often had to modify the way they worked—first,...

    Sponsored By Cisco Systems

  • White Papers // Aug 2015

    The Total Economic Impact™ Of Cisco TrustSec

    In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec...

    Sponsored By Cisco Systems

  • White Papers // Aug 2015

    Cisco Energy Management Suite

    Imagine being able to see, measure, and manage the energy usage of all the devices in your IT network. How much could you save, for example, if every server, router, switch, laptop, monitor, IP phone, wireless access point, and printer in the enterprise automatically powered up and down based on...

    Sponsored By Cisco Systems

  • White Papers // Aug 2015

    1GE Edge Switch Study Cisco Catalyst 2960X-48LPD-L

    Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test...

    Sponsored By Cisco Systems

  • White Papers // Aug 2015

    Comparative Analysis: Cisco Catalyst 4500E

    Miercom was engaged to conduct a comparative testing of two high-capacity L2 and L3 network switches: the popular Cisco Catalyst 4500E, and a comparably configured, competitive switch, the FastIron SX 1600, from Brocade Communications Systems. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that...

    Sponsored By Cisco Systems

  • White Papers // Aug 2015

    Cisco Catalyst 3650 Test Results and Business Outcomes

    It’s the difference between raw data, and information. The Miercom Business Decision Series combines the results of our hands-on testing, with insight on how particular features can positively impact the business bottom line. This report details some of the clear business advantages that the Cisco Catalyst 3650 Series delivers.

    Sponsored By Cisco Systems

  • White Papers // Jun 2015

    Elevate the Branch-Office Experience with an Application-Centric Platform

    Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity. Why are these services needed? What impact do they have on the network, IT staff, and service provider? What is the best way to boost the branch-office network...

    Sponsored By Cisco Systems

  • White Papers // Jun 2015

    TechWiseTV: Smarter Routers for the Intelligent WAN

    As demands for “right here, right now” information sharing continue to rise, today's organizations are taking a hard look at their branch and remote locations, where performance and service enablement have always been a primary indicator of company wide productivity. In this episode, the TechWiseTV team takes a dive deep...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Cisco and Akamai Elevate the Customer Digital Experience

    The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution....

    Sponsored By Cisco Systems

  • White Papers // Aug 2015

    6 Tips for better Sales Performance Dashboards

    You don’t want to wait until the end of the quarter to discover that you’ve failed. You want to make sure that you and your sales teams are performing well and making the best decisions possible; yet dashboards are still one of the most important and often overlooked sales tools...

    Sponsored By Tableau Software

  • White Papers // Aug 2015

    The Must Do's of Marketing Dashboards

    Gone are the days of go-with-your-gut style marketing tactics. And so it seems gone are the marketing efforts with the ability to simply and quickly differentiate ROI across multiple channels. As big data in business continues to be a big deal, many agencies and marketing teams still struggle to combine...

    Sponsored By Tableau Software

  • White Papers // Jul 2015

    Data Governance for Self-Service Analytics

    Almost any organization will say they make decisions based on data, or that they want to. Scratch the surface with a few questions about the quality of that data and confidence vanishes. Move on to discuss data security and see how quickly the subject changes. Data is clearly a key...

    Sponsored By Tableau Software

  • White Papers // Jul 2015

    Making Flow Happen: How to Build Dashboards That Persuade, Inform and Engage

    In data visualization, flow is crucial. Your audience should smoothly absorb and use the information in a dashboard without distractions. Lack of flow means lack of communication, which means failure. So how do you create flow for an audience? Download this resource today and learn the main steps to facilitate...

    Sponsored By Tableau Software

  • White Papers // Jul 2015

    How a Data-Driven Culture Improves Organizational Performance

    This IDC research white paper discusses the analytics culture within Asia/Pacific organizations and compares and contrasts organizations that realize higher positive outcomes from their analytics solutions with their peers. We explore why analytics use is important, how to foster analytics use, and why meeting the analytics needs of the business...

    Sponsored By Tableau Software

  • White Papers // Sep 2015

    2015 Magic Quadrant for Security Information and Event Management

    Gartner, Inc. has positioned IBM Security Systems as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM Security is positioned as a leader, the strenghts of IBM QRadar for SIEM...

    Sponsored By IBM

  • White Papers // Sep 2015

    Stepping up The Battle Against Advanced Threat - Report

    Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.

    Sponsored By IBM

  • White Papers // Sep 2015

    Success that scales: Delivering Security Intelligence for Organisations of all Sizes

    Like kids in a candy store, cybercriminals can’t wait to get their hands on your company's confidential information. You need security tools that detect the latest threats before they can cause damage. This paper explains how a security intelligence platform can offer you immediate protection and help you scale for...

    Sponsored By IBM

  • White Papers // Aug 2015

    Protecting corporate credentials against today’s threats - Report

    This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.

    Sponsored By IBM

  • White Papers // Aug 2015

    Select the Right Security Solution for Protecting Enterprise Endpoints - Overview

    Selecting a solution to protect endpoints is more important than ever. Not only can a successful cyber attack be expensive, it can ripple through the enterprise. This guide shows what to look for to gain preemptive protection wherever systems are, without impacting user productivity.

    Sponsored By IBM

  • White Papers // Sep 2015

    451 Research Report: IT Ops Can Thrive in a DevOps World

    Does IT still have buying power in the world of DevOps? The answer is a solid ‘yes,’ based on our findings across 11 different categories of IT. The IT organisation is also heavily involved in most assessment and specification activity. Read more and learn how to procure new tools much...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Aug 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware? - Report

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Sep 2015

    What is the Future of Work in Australia?

    This infographic analyses the changing face of the Australian working life. Work has shifted from a place you go to, to a thing you do. According to research from elance over 3.7 million Australians are now freelancing in some capacity, which is roughly 30% of the Australian workforce. Find out...

    Sponsored By Macquarie Telecom Australia

  • White Papers // Aug 2015

    Dell: Strategies For Successfully Managing Privileged Accounts ( German )

    Security, management and governance of the accounts of superusers ( so-called privileged accounts) is one of the most important aspects of a program for the identity and Access Management (IAM). Read more...

    Sponsored By Dell Software

  • White Papers // Jul 2015

    IDC paper: The Business Value of UCS as a Platform

    IDC finds that leveraging data analytics in business decisions is becoming a top priority for an increasing number of companies. This in turn is placing new demands on IT organizations; the need is twofold: to manage new streams of unstructured data from sources such as social media and to speed...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    Cisco Paper: Enterprise Network Security Solutions

    Security analysts used to say it’s not a question of if you’ll be attacked but when. Today, the facts are even more alarming: we no longer need to wonder when your network will be targeted. Your business is under attack right now. According to the Cisco 2014 Annual Security Report,...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    ESG Paper: Cisco’s Intelligence Security Architecture

    Nowadays, all organisations face an unprecedented threat landscape, resulting in the recent wave of data breaches at organisations like Target, Home Depot, and JPMorgan Chase. Given this dangerous situation, CISOs must move beyond security controls for prevention alone and organisations must vigorously hunt down malicious cyber-activities by collecting and analysing...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    Cisco e-book: Tomorrow’s Ideas are Born in Today’s Collaborative Spaces

    Offices aren’t productivity factories anymore - they’re collaboration centres where individuals and groups can develop their best ideas. Cisco Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Download the report to learn how to create...

    Sponsored By Cisco Systems

  • Tools & Templates // Aug 2015

    Stop typing…and slash 40% of your computer time

    Imagine never typing again. Instead, you simply dictate to your computer. Every word appears on the screen like magic. Wouldn’t it make mistakes? Not with Dragon NaturallySpeaking Premium. “My reports take about 40% less time to write now,” said Adrian Jenkins, a Chartered Accountant. Because it instantly...

    Sponsored By Nuance

  • Downloads // Feb 2015

    Reduce Troubleshooting Time Up to 59% in Your Virtual Environment

    Know exactly where to look when there’s a problem. SolarWinds® Virtualization Manager shows your entire virtualization stack from VM to storage, highlighting performance bottlenecks along the way. Immediate view of normal, informational, warning, and critical alerts of your virtual infrastructure Detailed visibility into all virtualization layers showing live performance...

    Sponsored By SolarWinds

  • Downloads // Apr 2011

    Create a USB Flash Drive Windows Password Reset Disk

    In this edition of the Windows Desktop Report, Greg Shultz shows you how to create and use a Password Reset Disk in Windows 7 using a USB Flash Drive rather than a CD or floppy disk.

    Provided By Greg Shultz

  • Downloads // Apr 2012

    Cheat sheet: 100 Windows keyboard shortcuts

    Navigating Microsoft Windows 8 is going to require a bit of re-training. Why not get a head start with a cheat sheet of 100 keyboard shortcuts.

    Provided By Greg Shultz

  • Downloads // Mar 2007

    Convert an XML file into an Excel spreadsheet with this technique

    Developers often deal with information that is in no way user-friendly without really thinking about how a user would handle it. XML is a prime example --- most users don't know what to make of it. One way to present XML information to a user is by converting...

    Provided By Edmond Woychowsky

  • eBooks // Feb 2014

    Systems Engineering for Dummies

    This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products. If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for...

    Provided By IBM

  • Book chapters // Jul 2007

    Hack online games

    Online games, including World of Warcraft, EverQuest, Second Life, and online poker have taken the computer world by storm. In this chapter download from Exploiting Online Games: Cheating Massively Distributed Systems, explore the kinds of attacks and hacking techniques to which online games are vulnerable. By better understanding these...

    Provided By Addison Wesley Professional

  • Downloads // Oct 2007

    How do I... Use C# to upload and download files from an FTP server?

    Many third party components exist that enable developers to implement upload and download capabilities in their applications. With C# and the .NET Framework Microsoft has given developers this capability without the need to use third party components. Zach Smith demonstrates how to upload and download files from a FTP server...

    Provided By Zach Smith

  • Downloads // Oct 2008

    Quickly export Outlook e-mail items to Excel

    Exporting e-mail messages from Outlook to Excel is easier than you might think. This technique uses sample VBA code to automate the process, allowing you to specify exactly which fields to copy.This download is also available as an entry in our Microsoft Office blog.

    Provided By Susan Harkins

  • Downloads // Nov 2012

    ASP.NET developer interview cheat sheet

    This list of open-ended proficiency questions and answers will come in handy for hiring managers interviewing ASP.NET developer candidates -- and it will be a useful interview prep tool for the candidates themselves.

    Provided By Tony Patton

  • Resource Center // Oct 2012

    Cloud RFP Template

    Public, private, and hybrid just begin to describe the type of cloud you may be looking for, but what about selecting a cloud provider? What criteria should you look for regarding their ability to deliver consistent performance, reliability and security? To help you gain an understanding of a cloud vendor's...

    Provided By SAVVIS