Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Aug 2014

    Today's Biggest IT Risks : Defending Against Malware -A Holistic Approach

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Download this...

    Sponsored By IBM

  • White Papers // Aug 2014

    IBM X-Force Threat Intelligence Quarterly Report Q2 2014

    This quarterly report from the IBM X-Force research and development team looks at how application vulnerabilities, spam threats and incident response are evolving - based on the latest data and ongoing analysis. It also includes insights from the IBM Global Technology Services division.

    Sponsored By IBM

  • White Papers // Aug 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware? - Report

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Critical Capabilities for Security Information and Event Management

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for Security Intelligence & Event Management

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • White Papers // Apr 2014

    Protect people, processes and technology from web appliation threats

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect their businesses.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection - Integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • Webcasts // Nov 2014

    Free Webinar: Improve your software delivery processes with DevOps

    Collaborative development and continuous testing help a business idea evolve into a high quality software solution by applying lean principles, collaboration among stakeholders, and striking the optimal balance between quality and time to market. So in this session, we will share how establishing a solid development and testing strategy...

    Sponsored By IBM

  • White Papers // Sep 2014

    Announcing the New Intel VTune Amplifier XE 2015

    Intel VTune Amplifier XE 2015 is the premier performance profiler for C, C++, C#, Fortran, Assembly, and Java. Get the data to meet a wide variety of tuning needs and the tools to mine the data and assess next steps. Powerful analysis lets you sort, filter, and visualize results on...

    Sponsored By Intel Software

  • White Papers // Nov 2014

    Nexus at a Glance

    The Cisco ACI makes IT more agile by reducing application deployment time. It does this by providing a common programmable automation and management framework for network, application, security, and virtualization teams. Cisco ACI is built on a fabric foundation that combines hardware, software, and ASIC innovations into an integrated system....

    Sponsored By Cisco

  • White Papers // Nov 2014

    Overcoming Challenges in Accounts Payable Automation

    Accounts payable automation presents unique challenges. It is characterized by large volumes of data, arriving in different formats and media that must be securely received, accurately interpreted and entered into financial systems.

    Sponsored By Kofax

  • White Papers // Nov 2014

    The Top Seven Reasons to Automate Accounts Payable

    The accounts payable (AP) process is difficult to tame, yet well worth the effort. The reasons for investing in accounts payable automation are compelling, and in this paper we will make them clear.

    Sponsored By Kofax

  • White Papers // Nov 2014

    Kofax TotalAgility Accounts Payable Automation

    In a single software solution, Kofax TotalAgility Accounts Payable Automation delivers the three capabilities that AP departments agree are critical to better performance. Download now and learn about the best practice AP Workflow and effective ERP integration.

    Sponsored By Kofax

  • White Papers // Mar 2012

    Success in the cloud: Why workload matters

    This paper shares IBM's observations and recommendations with respect to workload affinity for cloud computing. It describes the quantitative and qualitative value that IBM has achieved with six common IT workloads that have transformed the way whole groups of IBM users do their jobs, enabling them to speed new development...

    Sponsored By IBM

  • White Papers // Nov 2014

    Banca Carige – Case Study

    This case study is exploring how Banca Carige Group decided to build an analytics environment and a new mobile banking service looking for round-the-clock availability and high security. Check this case study out and learn the advantages of IBM® zEnterprise® EC12, and how this solution helps in meeting the customer...

    Sponsored By IBM

  • Downloads // Mar 2007

    Convert an XML file into an Excel spreadsheet with this technique

    Developers often deal with information that is in no way user-friendly without really thinking about how a user would handle it. XML is a prime example --- most users don't know what to make of it. One way to present XML information to a user is by converting...

    Provided By Edmond Woychowsky

  • Resource Center // Oct 2012

    Cloud RFP Template

    Public, private, and hybrid just begin to describe the type of cloud you may be looking for, but what about selecting a cloud provider? What criteria should you look for regarding their ability to deliver consistent performance, reliability and security? To help you gain an understanding of a cloud vendor's...

    Provided By SAVVIS

  • Webcasts // Aug 2014

    On-demand Webcast: Solve Complex Revenue Management Challenges

    For business professionals today, revenue management is an increasingly complicated proposition. Accountants and administrators are now responsible for managing multiple revenue sources and models, which requires a different level of data and analysis, plus powerful tools to successfully manage the complexities of the market and business operations. So how...

    Provided By Intacct

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to...

    Provided By Druva Software

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Provided By Imperva

  • Book chapters // Jul 2007

    Hack online games

    Online games, including World of Warcraft, EverQuest, Second Life, and online poker have taken the computer world by storm. In this chapter download from Exploiting Online Games: Cheating Massively Distributed Systems, explore the kinds of attacks and hacking techniques to which online games are vulnerable. By better understanding these...

    Provided By Addison Wesley Professional

  • White Papers // Mar 2014

    Tips to improve the mobile app experience over Wi-Fi

    As the growing number of people who are using their mobile device access apps at work through Wi-Fi networks, there is an increasing demand on the quality of Wi-Fi signals to improve users’ mobile app experience. This executive brief presents us with 5 tips for ensuring mobile apps run flawlessly....

    Provided By Aruba Networks

  • White Papers // Feb 2014

    Google Apps for Business - Simple, Proven, Transformative

    1-page overview of the benefits provided by Google Apps for Business. How Google Apps for Business helps users work better together while bringing you the benefits of pure cloud. Learn why 5 million businesses have gone to Google Apps for Business to lower costs and liberate IT. Download this quick...

    Provided By Google

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva

  • White Papers // Sep 2014

    Executive Guide to Big Data and Apache Hadoop

    This special edition ebook, from the author of Hadoop for Dummies, contains everything you need to know to get started with Big Data and Hadoop. It also recommends how to evaluate Hadoop’s platform offerings so you can meet your business objectives. Download this ebook to learn critical big data...

    Provided By MapR

  • White Papers // May 2014

    STAC Report: IBM BigInsights vs Apache Hadoop, using SWIM - How PC accelerates

    In an audited benchmark conducted by STAC®, the Securities Technology Analysis Center, InfoSphere BigInsights for Hadoop was found to deliver an approximate 4x performance gain on average over open source Hadoop running jobs derived from production workload traces. The result is consistent with an approximate eleven times advantage in raw...

    Provided By IBM

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to radically simplify your...

    Provided By Druva

  • White Papers // Jun 2014

    Rethink Ink

    If there’s one constant in the world of IT, it’s that the workplace is changing. More than ever, IT needs to meet the demands of a highly distributed workforce that requires access to content and services around the clock and around the globe. And when it’s time to print, people...

    Provided By HP US

  • White Papers // Jul 2014

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Provided By HP US

  • White Papers // Oct 2009

    Software Security Test Data Generation Based on Genetic Algorithms

    Software security is an important quality. The software security testing is one of the most important kinds of the software testing. How to test the software security, and especially to automatically generate security test cases are major problems. An improved method of the test data generation based on Genetic Algorithm...

    Provided By Academy Publisher

  • Downloads // Mar 2007

    Use Microsoft Message Queuing in C# for inter-process communication

    Microsoft Message Queuing (MSMQ) is a way to send messages to a queue for later processing. The messages are sent to the queue by a "Producer" application, and retrieved from the queue by a "Consumer" application. These two applications can be on the same machine, across a network, or even...

    Provided By Zach Smith

  • White Papers // Jun 2007

    An Open Source Java Framework for Biometric Web Authentication Based on BioAPI

    One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The BioAPI Specification has defined an open system standard Application Program Interface (API) which allows software applications to communicate with a broad range of biometric technologies....

    Provided By Universidad de Vigo

  • White Papers // Feb 2014

    An IT Practitioner's Guide: Security best practices for file-based data movement

    Data security for file-based data movement is finally getting the attention it deserves. What was once a concern only in the financial services sector is now being treated seriously by all industries as they wake up to the liability and risk associated with the unsecured movement of files.

    Provided By IBM

  • White Papers // Feb 2014

    Research - Google Apps ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled “Cloud Business Email - Market Quadrant 2013”, the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati’s findings can be downloaded here. Download this quick...

    Provided By Google

  • White Papers // Jun 2012

    Implementation of Pitch Control of Wind Turbine Using Simulink (Matlab)

    In this paper, it is shown that how the variable speed wind turbine can be used to generate a fixed value of voltage at the output with the help of a pi controller and it is done by varying the pitch angle of the blades Pitch angle control is the...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Jun 2014

    Whitepaper: Datacom’s Multi-cloud Services

    Each cloud has its pros and cons: private can be too expensive, public often doesn’t fit organisations’ application requirements and hybrid can be too complicated. And each cloud services provider brings different challenges to the table, such as the inability to scale on demand, uncontrollable costs and unreliable security.Find out...

    Provided By EMC

  • White Papers // Jan 2014

    Comparing the TCO of Physical PCs, VDI, and Cloud-hosted Desktops as a Service (DaaS)

    Physical desktop computer infrastructures no longer make sense for the corporate world. Not only are they expensive, insecure and maintenance-heavy, they also cannot effectively support the changing business IT landscape. The ground¬swell of Windows 7 migration plans, expanding virtual workforce, growing popularity of mobile devices, and tighter IT budgets all...

    Provided By Desktone

  • Downloads // Jul 2005

    17 useful PHP array functions complete with examples

    This document outlines some of the more useful functions in the PHP array toolkit, and features detailed explanations and usage examples. Like arrays in other programming languages, PHP arrays allow you to store multiple values in a single variable and operate on them as a set. With...

    Provided By TechRepublic