Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • Book chapters // Jul 2007

    Hack online games

    Online games, including World of Warcraft, EverQuest, Second Life, and online poker have taken the computer world by storm. In this chapter download from Exploiting Online Games: Cheating Massively Distributed Systems, explore the kinds of attacks and hacking techniques to which online games are vulnerable. By better understanding these...

    Provided By Addison Wesley Professional

  • White Papers // Mar 2014

    Tips to improve the mobile app experience over Wi-Fi

    As the growing number of people who are using their mobile device access apps at work through Wi-Fi networks, there is an increasing demand on the quality of Wi-Fi signals to improve users’ mobile app experience. This executive brief presents us with 5 tips for ensuring mobile apps run flawlessly....

    Provided By Aruba Networks

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Feb 2014

    Google Apps for Business - Simple, Proven, Transformative

    1-page overview of the benefits provided by Google Apps for Business. How Google Apps for Business helps users work better together while bringing you the benefits of pure cloud. Learn why 5 million businesses have gone to Google Apps for Business to lower costs and liberate IT. Download this quick...

    Provided By Google

  • White Papers // Jan 2014

    Sophisticated attacks WP

    We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you...

    Provided By IBM

  • White Papers // May 2014

    STAC Report: IBM BigInsights vs Apache Hadoop, using SWIM - How PC accelerates

    In an audited benchmark conducted by STAC®, the Securities Technology Analysis Center, InfoSphere BigInsights for Hadoop was found to deliver an approximate 4x performance gain on average over open source Hadoop running jobs derived from production workload traces. The result is consistent with an approximate eleven times advantage in raw...

    Provided By IBM

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to radically simplify your...

    Provided By Druva

  • White Papers // Jun 2014

    Rethink Ink

    If there’s one constant in the world of IT, it’s that the workplace is changing. More than ever, IT needs to meet the demands of a highly distributed workforce that requires access to content and services around the clock and around the globe. And when it’s time to print, people...

    Provided By HP US

  • White Papers // Jul 2014

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Provided By HP US

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Provided By IBM

  • White Papers // Oct 2009

    Software Security Test Data Generation Based on Genetic Algorithms

    Software security is an important quality. The software security testing is one of the most important kinds of the software testing. How to test the software security, and especially to automatically generate security test cases are major problems. An improved method of the test data generation based on Genetic Algorithm...

    Provided By Academy Publisher

  • Downloads // Mar 2007

    Use Microsoft Message Queuing in C# for inter-process communication

    Microsoft Message Queuing (MSMQ) is a way to send messages to a queue for later processing. The messages are sent to the queue by a "Producer" application, and retrieved from the queue by a "Consumer" application. These two applications can be on the same machine, across a network, or even...

    Provided By Zach Smith

  • White Papers // Jun 2007

    An Open Source Java Framework for Biometric Web Authentication Based on BioAPI

    One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The BioAPI Specification has defined an open system standard Application Program Interface (API) which allows software applications to communicate with a broad range of biometric technologies....

    Provided By Universidad de Vigo

  • White Papers // Feb 2014

    An IT Practitioner's Guide: Security best practices for file-based data movement

    Data security for file-based data movement is finally getting the attention it deserves. What was once a concern only in the financial services sector is now being treated seriously by all industries as they wake up to the liability and risk associated with the unsecured movement of files.

    Provided By IBM

  • White Papers // Feb 2014

    Research - Google Apps ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled “Cloud Business Email - Market Quadrant 2013”, the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati’s findings can be downloaded here. Download this quick...

    Provided By Google

  • White Papers // Jun 2012

    Implementation of Pitch Control of Wind Turbine Using Simulink (Matlab)

    In this paper, it is shown that how the variable speed wind turbine can be used to generate a fixed value of voltage at the output with the help of a pi controller and it is done by varying the pitch angle of the blades Pitch angle control is the...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Jun 2014

    Whitepaper: Datacom’s Multi-cloud Services

    Each cloud has its pros and cons: private can be too expensive, public often doesn’t fit organisations’ application requirements and hybrid can be too complicated. And each cloud services provider brings different challenges to the table, such as the inability to scale on demand, uncontrollable costs and unreliable security.Find out...

    Provided By EMC

  • White Papers // Jan 2014

    Comparing the TCO of Physical PCs, VDI, and Cloud-hosted Desktops as a Service (DaaS)

    Physical desktop computer infrastructures no longer make sense for the corporate world. Not only are they expensive, insecure and maintenance-heavy, they also cannot effectively support the changing business IT landscape. The ground¬swell of Windows 7 migration plans, expanding virtual workforce, growing popularity of mobile devices, and tighter IT budgets all...

    Provided By Desktone

  • Downloads // Jul 2005

    17 useful PHP array functions complete with examples

    This document outlines some of the more useful functions in the PHP array toolkit, and features detailed explanations and usage examples. Like arrays in other programming languages, PHP arrays allow you to store multiple values in a single variable and operate on them as a set. With...

    Provided By TechRepublic

  • White Papers // Jul 2014

    The business of social business.

    A new IBM Institute for Business Value study reveals how organizations can use social approaches to create meaningful business value.

    Provided By IBM

  • White Papers // Aug 2014

    The Total Ecocomic Impact of IBM PureApplication System

    IBM PureApplication System converges computer, storage, networking components, and software into a preconfigured and pretested system. This Forrester Whitepaper will help you to better understand the benefits, costs, and risks associated with the IBM PureApplication System.

    Provided By IBM

  • Downloads // Jan 2008

    How do I... Transfer data from a Word form to an Access database?

    Although Access forms are powerful interface objects, your users might not be familiar with them. However, your users may be very familiar with Word forms. Susan Sales Harkins shows you how to use a Word form to collect data and then transfer that data to an Access table. The technique...

    Provided By Susan Harkins

  • Downloads // Dec 2010

    10+ of my favorite Windows API functions to use in Office applications

    When a VBA solution falls short of your needs, there's probably a Windows API function that can handle the job. Susan Harkins lists 10 handy APIs and explains how you can put them to work.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • White Papers // Jun 2007

    A Step-by-Step Guide to Starting Up SaaS Operations

    Faced with intensifying competition, as well as a desire for more stable revenue streams, software companies are increasingly turning to the Software as a Service (SaaS) delivery model. Software companies are facing the complex issues involved with building the service delivery capabilities necessary to support SaaS offerings. Building an...

    Provided By OpSource

  • Downloads // Feb 2009

    10 iptables rules to help secure your Linux box

    Mastering iptables could take a while, but if you have a few rules to cover the basic security needs, you'll be well on your way to protecting your Linux system. Jack Wallen explains some key rules to get you started. This download is also available as an entry...

    Provided By Jack Wallen

  • White Papers // Mar 2014

    Design security policies for #GenMobile

    This executive brief explains how Aruba’s ClearPass Access Management System™ makes it possible for IT to go beyond authentication and to protect enterprise data while providing an all-wireless workplace. With Aruba Network, enterprises can provide secure access to apps, printers and other network services, no matter where they are or...

    Provided By Aruba Networks

  • Downloads // Jun 2012

    Get more from Windows debugging and tracing tools

    This chapter from Inside Windows Debugging provides an overview of Windows evolution and architecture, the developer interface, and Microsoft debugging tools. Title: Inside Windows Debugging ISBN: 978-0-7356-6278-0 Published: May 2012 Author: Tarik Soulami Chapter: "Software Development in Windows" Published by Microsoft Press

    Provided By Microsoft Press

  • Downloads // Nov 2006

    Use C# and the .NET Framework to develop your own plugin architecture

    Many dynamic applications allow third parties to create plugins that extend the functionality of the application. In the past creating an architecture that would allow plugins was difficult, which caused many developers to develop workarounds to solve business needs. Zach Smith explains how developers can leverage the .NET...

    Provided By Zach Smith

  • Downloads // Mar 2007

    Manage WinForm controls using the Anchor and Dock properties

    Many beginning WinForms developers have trouble keeping the controls on their forms uniform and organized. Often the controls look fine at design time, but when the form is resized at runtime the controls either lose their positions or don't compensate for the resized form. To alleviate this problem,...

    Provided By Zach Smith

  • Downloads // Jan 2008

    How do I... Modify Word documents using C#?

    Accessing Word components from C# isn't quite as straight-forward as many other features of C# and the .NET Framework. With that said -- it's not rocket science either. You simply need to know what to reference and how to use the components. Zach Smith lays out exactly what you need...

    Provided By Zach Smith

  • White Papers // Jan 2009

    LINQ to SQL Model Is Easily Synchronized With Your Live Database

    LINQ To SQL is one of the most promising technologies that appeared lately in .NET programming. Since it became available developers using .Net have no need to mix code with SQL commands within the application to access database objects. Now developers can access data in databases using programming language they...

    Provided By Perpetuum Software

  • Downloads // Aug 2011

    Five tips for lightning-fast formatting in Word

    No matter what kind of document you're working on, it will probably need some formatting. These shortcuts will help you zip through those tasks so you can concentrate on the content.This download is also available as an entry in our Five Tips blog.

    Provided By Jody Gilbert

  • Downloads // Oct 2010

    10 ways to make your pictures pop in Word 2010

    You don't have to be a design professional to produce stylish documents. Word 2010 offers built-in tools that make it easy to enhance your graphics with special effects and formatting.This download is also available as an entry in our 10 Things blog.

    Provided By Katherine Murray

  • Downloads // Jul 2010

    10 ways Backstage view helps streamline tasks in Office 2010

    Office 2010 offers an improved, more logical interface for performing common file tasks. Here's a look at where various familiar features are located in Backstage view, along with a few brand new items.This download is also available as an entry in our 10 Things blog.

    Provided By Katherine Murray

  • White Papers // Jun 2014

    Osterman Report: Office 365 for the Enterprise

    Osterman Research outlines how third parties are required to strengthen security, compliance and control.

    Provided By Mimecast

  • White Papers // Jun 2014

    The Importance of Continuity in Office 365

    Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?

    Provided By Mimecast

  • White Papers // Jan 2012

    A Software Application for University Students Results Processing

    The end-of-course grades assigned by lecturers are intended to convey the level of achievement of each student in the class. These grades are used to make a multitude of decisions. Unless a sufficiently accurate and efficient method is used for the grading, the grades are apt to convey misinformation and...

    Provided By Journal of Theoretical and Applied Information Technology

  • Downloads // Jun 2007

    How do I... fill Word form fields with Access data?

    Filling a Word form with Access data can be useful when you need to use Word's formatting features to present that data in just the right way. Fortunately, the process is simple, whether sharing one record or thousands. Access expert Susan Harkins walks through this technique and provides the VBA...

    Provided By Susan Harkins