Software

TechRepublic covers the latest trends in software development and implementation.

  • Videos // May 2014

    Customer Stories: Real Value from Real SaaS (not customer video)

    See how Workday's Enterprise Cloud has helped CareFusion, Flextronics, and TripAdvisor simplify global operations, provide unprecedented visibility into business information, and capitalize on speed and continuous innovation lifestyle of SaaS.

    Sponsored By Workday

  • Videos // May 2014

    Video: Stan Swete, Workday CTO, on Multi-tenancy

    In this video, Workday CTO Stan Swete, discusses the numerous benefits of multi-tenancy, one of the 10 critical requirements for cloud applications.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • White Papers // May 2014

    Whitepaper: Workday: A Whole New Approach to the HRMS Marketplace

    Josh Bersin, principal analyst at Bersin and Associates, talked with three of Workday’s customers and is now convinced that there are transformational benefits to adopting its unique and powerful approach to human resource management systems (HRMS). This whitepaper summarizes the discussion and highlights the benefits of Workday for other organizations....

    Sponsored By Workday

  • White Papers // May 2014

    Whitepaper: 10 Critical Requirements

    Growing interest in cloud computing has prompted almost every enterprise software vendor to claim it's "in the cloud." However, in the industry's rush to fulfill demand, some vendors may skip requirements that are essential. Read this whitepaper to learn the 10 critical requirements of any successful cloud application.

    Sponsored By Workday

  • White Papers // May 2014

    Whitepaper: Global at the Core

    Global business can’t be served by legacy applications. That’s why Workday designed SaaS solutions that are global at the core. This whitepaper explains how Workday has built modern, global enterprise application solutions that effectively transform enterprise business by providing superior information, agility, control, and economics.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • White Papers // May 2014

    Accurately assessing economic capital with IBM Algorithmics and IBM Platform Computing

    To more accurately assess capital requirements under Solvency 2, a leading European based insurance firm needed a high performance risk environment with support for complex simulations on demand. Learn why this firm turned to IBM for its solution.

    Sponsored By IBM

  • Downloads // May 2014

    Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

    Sponsored By SolarWinds

  • White Papers // May 2014

    What's Behind a Cyberattack?

    IBM Security QRadar Incident Forensics provides a next-generation approach to security incident forensics that supports network security, insider threat analysis - including fraud and abuse - and the documentation of incident-related evidence.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Apr 2014

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • White Papers // Apr 2014

    Forrester Report: Measuring Mobile Apps

    Developers need to improve their mobile measurement savvy. Many application development professionals have little to no skills in collecting real-time and operational metrics; that’s usually been the province of infrastructure and operations pros. But such thinking is both antiquated and dangerous. As requirements elicitation shifts from long textual requirements documents...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2014

    Uniform Server Management for Hybrid Environments

    With a broad array of multivendor, cloud and non-cloud platforms and devices to support, managing today’s server infrastructures has grown increasingly complicated. Check this out and learn how you can manage server infrastructures efficiently.

    Sponsored By IBM

  • White Papers // Apr 2014

    Security Services Reference Guide

    From a communications equipment manufacturer optimizing investments with a security scan to a mutual insurance company reducing spam and threats with hosted web and email services, IBM security consultants have helped many companies evaluate their existing security practices against their business requirements and objectives. Read these customer references to learn...

    Sponsored By IBM

  • Downloads // Apr 2014

    Easy-to-Use & Affordable Remote IT Administration & Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

    Sponsored By SolarWinds

  • White Papers // Mar 2014

    Global Compliance for Data Security

    Driven on by relentless news about security breaches and data loss, law makers and regulators the world over are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on encryption, not only of portable equipment and...

    Sponsored By Vormetric

  • Videos // Mar 2014

    Product Preview: Operational Intelligence Through Actionable Analytics

    In this product preview, you will learn how simple it is for managers to get the right data, analyze the information, and respond immediately to what they’ve learned. With Workday built-in actionable analytics, all users can get relevant information to help improve the overall operational intelligence throughout the organization.

    Sponsored By Workday

  • White Papers // Mar 2014

    Managing Security Risks and Vulnerabilities​

    With integrated security intelligence solutions from IBM, organizations can use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection - Integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Mar 2014

    Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks.

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.

    Sponsored By IBM

  • White Papers // Mar 2014

    Combat the Latest Security Attacks with Global Threat Intelligence

    The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.

    Sponsored By IBM

  • White Papers // Mar 2014

    Securosis Report: Security Management 2.5: Replacing Your SIEM Yet?

    In this report, analyst Securosis, go into detail on the changing organizations needs and requirements in a SIEM solution, including malware detection, and discuss the evolutionary changes to meet these demands.

    Sponsored By IBM

  • White Papers // Mar 2014

    Leverage Security Intelligence for Government Agencies

    IBM QRadar Security Intelligence Platform combines robust log management, security information and event management (SIEM) and risk management capabilities to help government organizations detect advanced cyber threats, exceed compliance mandates and prevent malicious insider activities.

    Sponsored By IBM

  • White Papers // Mar 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking Down Silos of Protection: An Integrated Approach to Managing Application Security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Mar 2014

    Protect people, processes and technology from web Application Threats

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect the business.

    Sponsored By IBM

  • White Papers // Mar 2014

    Security in the Cloud for SAP HANA

    High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA,...

    Sponsored By Vormetric

  • White Papers // Feb 2014

    Applying Agile Principles to the Development of Smarter Products

    Agile development has become a cornerstone of most software development organizations. Marked by iterative processes that deliver incremental value over time, agile development has enabled organizations to manage software complexity more effectively and to improve quality and time to market compared with previous development processes.

    Sponsored By IBM

  • eBooks // Feb 2014

    Systems Engineering for Dummies

    This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products. If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for...

    Sponsored By IBM

  • Podcasts // Feb 2014

    TechViews - Deconstructing DevOps

    The TechViews programs will help to cut through the noise of the market and bring you real insights from thought leaders across the industry. 15 minute podcast on DevOps - What is it? Why use it? Listen now.

    Sponsored By CA Technologies

  • Videos // Feb 2014

    Video: DNS Europe drives down the cost of high availability, fault tolerant cloud services for their customers

    Business: DNS Europe is a UK based cloud hosting business offering cloud application hosting and development, hybrid cloud integration, consulting and on-boarding. Challenge: Compete with larger hosting providers and public cloud providers by offering high availability & fault tolerance with a very high service credit policy. Solution: Offer public and...

    Sponsored By CA Technologies

  • White Papers // Feb 2014

    Making Sense of the Chaos: Measuring The Influence of Social Media

    Just as there are valuable marketing tools for monitoring social media and managing social marketing campaigns, there are also tools available to measure the effectiveness of those social campaigns. Read more for a better understanding of the true value of social marketing and the three pillars of social media.

    Sponsored By IBM

  • White Papers // Feb 2014

    NSS Labs 2013 Network IPS Comparative Analysis

    Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

    Sponsored By IBM

  • White Papers // Feb 2014

    Leverage Security Intelligence to Protect Sensitive Healthcare Data

    IBM solutions deliver the end-to-end systems visibility necessary to give healthcare organizations the true security intelligence they need - with the ease of use and labor-saving automation that makes security intelligence a powerful and achievable tool for protecting information.

    Sponsored By IBM

  • White Papers // Feb 2014

    EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager

    This EMA report explores the values of the newest product of the QRadar platform, IBM Security QRadar Vulnerability Manager, the need for better integrated security architecture expressed by enterprises worldwide, and example use cases that highlight the value of the IBM approach. Download this analyst report to discover how...

    Sponsored By IBM

  • White Papers // Jan 2014

    IDC: Driving Business Optimization with End-to-End Performance Testing White Paper

    The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. The document defines an application performance testing framework, discusses a performance test evolution path and explores the relationship...

    Sponsored By Hewlett-Packard (HP)