Software

TechRepublic covers the latest trends in software development and implementation.

  • Videos // Mar 2014

    Enterprise Mobility: A New Way to Work

    Your workforce expects anytime access to information and an intuitive, user-friendly interface. And they want that information from wherever they are. When it comes to mobile, Workday's approach is pretty straightforward: Make it simple, fast, and accessible. Watch this video to discover Workday's unique and innovative approach to mobile.

    Sponsored By Workday

  • White Papers // Nov 2013

    An Overview of Samsung KNOX Active Directory and Group Policy Features

    Samsung KNOX is a set of business focused enhancements to the Android mobile environment for selected Samsung mobile devices. One of the most important new enterprise features provided with KNOX is the ability for KNOX devices to be joined, secured and managed by a Microsoft Active Directory infrastructure. An important...

    Sponsored By Centrify

  • Podcasts // Sep 2013

    Implementing Single Sign-On for Office 365: Why must it be so complex?

    Learn more from Microsoft expert Randy Franklin Smith. View the webinar now!

    Sponsored By Centrify

  • White Papers // Apr 2013

    Office 365 Single Sign-On: High Availability without High Complexity

    For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, it simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk can actually increase and productivity suffer. Learn why SSO for...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Enterprise Identity Where You Want It

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Sponsored By Centrify

  • Downloads // Apr 2014

    SolarWinds Server & Application Monitor (SAM) Offers Easy Exchange Mailbox Management with NEW AppInsight™ for Exchange!

    SolarWinds Server & Application Monitor provides extensive capabilities to monitor and fix your servers and applications, including custom application monitoring. With AppInsight for Exchange, SAM provides expert alerts and advice along with comprehensive visibility to proactively pinpoint Exchange performance issues. Find & fix problems with Microsoft® Exchange & other...

    Sponsored By SolarWinds

  • White Papers // Aug 2010

    Using Microsoft's Free Tools to Image and Deploy Windows 7

    Microsoft provides freely available and quite powerful tools that can help you image and deploy Windows 7. This white paper explores those components and their processes used during these deployments. It considers and explains every step of a Lite Touch installation, while also detailing the benefits of ImageX, the WIM...

    Provided By Global Knowledge

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • White Papers // Jan 2010

    DirectAccess: The New VPN

    Windows 7 and Windows Server 2008 R2 have a new built-in architecture designed to create a Virtual Private Network (VPN) connection. This new technology is known as DirectAccess (DA) and is forecasted to replace traditional VPN connections for most of your remote access needs. DA can be installed as a...

    Provided By Global Knowledge

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • Presentations // Nov 2013

    The Gartner Magic Quadrant for Data Warehouse Database Management Systems

    The 2012 Gartner's Magic Quadrant for Data Warehouse Database Management Systems provides insight into the market for relational database management systems (DBMSs) used as platforms for data warehouses specifically. In this report, Gartner places IBM in the Leaders Quadrant. The Magic Quadrant compares 14 vendors and evaluates IBM's PureData System...

    Provided By IBM

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Apr 2012

    Windows 8 Reality

    Windows 8 is a Tablet OS first and foremost. Microsoft is designing Windows 8 to run on any type of form-factor, but its roots will be the slate or tablet style of interface. Personally, I know it will be hard for me to adapt at first, but it is time...

    Provided By Global Knowledge

  • White Papers // Feb 2014

    Infographic: The 4 Phases of a Cyber Attack

    How cyber criminals are targeting SMBs, understanding the way an attack behaves will help you stay safe from cyber crime. Download this infographic now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Jan 2014

    Surviving the technical security crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Provided By IBM

  • White Papers // Oct 2013

    Mitigating DDoS Attacks with F5 Technology

    Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains...

    Provided By F5 Networks

  • White Papers // Oct 2013

    That Dreaded Day: Active Directory Disasters & Solutions for Preventing Them

    While Active Directory's built-in features will keep it running after some failures, there are others from which it cannot bounce back. This paper presents five AD disaster case studies and how they might have been prevented or repaired faster with proper planning and tools. Read the White Paper.

    Provided By Dell Software

  • White Papers // Jan 2011

    Introduction to Negotiation: A Primer for "Getting to Yes"

    Negotiation is a dialogue intended to resolve disputes, to produce an agreement on courses of action, to bargain for individual or collective advantage, or to craft outcomes to satisfy various interests. It is the primary method of alternative dispute resolution. This white paper focuses primarily on the negotiation process, different...

    Provided By Global Knowledge

  • White Papers // Oct 2010

    WLAN Channel Access: How WiFi Networks Talk and How You Can Make Them Talk More Clearly

    Stations and APs that share a wireless channel can rely on two carrier sense mechanisms to identify when a channel is busy. In crowded WiFi environments, like the one created at the unveiling of the iPhone? 4 to the press, these two carriers are crucial for ensuring network function. This...

    Provided By Global Knowledge

  • White Papers // Oct 2010

    To Know MED-V In Windows 7

    This white paper introduces MED-V (Microsoft Enterprise Desktop Virtualization), Microsoft's enterprise-oriented tool for delivering legacy applications in virtual machines running on clients across your business network. The author discusses topics such as whether you need MED-V and how to get it, requirements, core features, and implementing and managing MED-V.

    Provided By Global Knowledge

  • Book chapters // Jul 2007

    Hack online games

    Online games, including World of Warcraft, EverQuest, Second Life, and online poker have taken the computer world by storm. In this chapter download from Exploiting Online Games: Cheating Massively Distributed Systems, explore the kinds of attacks and hacking techniques to which online games are vulnerable. By better understanding these...

    Provided By Addison Wesley Professional

  • Analyst Briefings // Nov 2013

    Analytics Trends 2013: The IT Perspective by Aberdeen Group

    The results of Aberdeen Group's 2013 Business Analytics surveys examine the shifting challenges IT professionals face as they harness an ever-deepening pool of data for analysis. It will also explore current trends in IT's role in successful BI solutions.

    Provided By IBM

  • White Papers // Aug 2013

    The 12 Essential Tasks of Active Directory Domain Services

    Did you know there are 12 major tasks in Active Directory (AD) Domain Services management? Delegation of these tasks is key to keeping your AD environment performing a peak levels. But which ones require more time and effort? Which increase workload to the breaking point? And is there a better...

    Provided By Dell

  • White Papers // Apr 2013

    Active Directory Recovery: Be More Prepared

    Active Directory's Recycle Bin won't restore improperly changed attributes, nor recover external objects. To ensure AD integrity, you'll need to plan for multiple scenarios and include broader recovery capabilities. Read the White Paper!

    Provided By Dell Software

  • White Papers // Feb 2013

    Key Considerations for Increasing Windows System Performance

    Rather than rely on the Windows built-in defrag tool to address performance problems “after-the-fact” on laptops and workstations, IT departments can now address the problem proactively to eliminate performance-robbing fragmentation from ever occurring. One simple fix will put a stop to pesky helpdesk performance issues and ensure you never defrag...

    Provided By Condusiv Technologies

  • Podcasts // Jan 2014

    Stepping Into the Cloud: A Practical Guide to Launching a Successful Cloud Strategy

    Frost & Sullivan’s video “Stepping into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy” offers practical guidance for migrating your company to the cloud -- at your own pace and on your own schedule. Take the first step today.

    Provided By IBM

  • White Papers // Jan 2014

    Stepping Into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy

    The cloud decision may be the easy part. For most businesses, the benefits promised by cloud computing - including agility, process optimization, speed to market, and cost reduction - warrant a closer look, if not a test drive. At least at the decision-table, curiosity and hope in the potential for...

    Provided By IBM

  • White Papers // Dec 2013

    Whitepaper: Security and Speed

    The problem of security implications for performance is growing as the number of devices or procedures deployed between the user and applications continues to grow. Download this whitepaper to learn more about how the right security mechanisms and approaches can minimize performance degradation.

    Provided By F5 Networks

  • White Papers // Apr 2012

    Gartner Magic Quadrant for Operations Support Systems

    With IBM's Service Assurance and Fulfillment solution CSPs are able to integrate business processes with service delivery systems, modernize legacy and proprietary systems, and focus on fast return on investment. And in the first ever Magic Quadrant for Operations Support Systems (OSS), Gartner has declared IBM the "leader" in the...

    Provided By IBM

  • White Papers // Jun 2007

    Examples Of Microsoft Access Data-Entry Forms, Switchboards, And Dialog Boxes

    In Access, you can enter data directly into the tables in a database. However, you can make the process of entering and working with data much easier and more accurate if you use forms. You can create three types of forms in Access: Data-entry forms- you use data entry forms...

    Provided By Microsoft

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    Vulnerability Assessment

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply...

    Provided By Symantec

  • Webcasts // Oct 2013

    On-demand Webcast - Creating the Extensible Data Center with Hybrid Clouds

    Can your current infrastructure meet the rapid surges in demand often caused by business changes, seasonality or just plain growth? For many, the very nature of IT is evolving as users demand faster provisioning, better scalability and more options to handle an ever-growing list of new applications and services that...

    Provided By VMware

  • White Papers // Nov 2013

    How to create a Holistic Data Governance Strategy

    The goal of data governance is not just to clarify who "owns" data but also to optimize its value. The data itself is merely the means to the desired end of improved business performance. This paper is intended to help data governance evangelists in both business and IT generate the...

    Provided By Informatica

  • White Papers // Sep 2013

    Transaction-Centric vs. Infrastructure-Centric APM

    Should your organization take a transaction-centric or infrastructure-centric approach to application performance management? Download this report from TRAC Research to examine the major differences between the two approaches, the pros and cons of both in difference use cases, and finally which technology better fits your organization.

    Provided By Dell Software

  • White Papers // Jan 2011

    Microsoft and the Cloud: Five Essential Things To Know

    Many of the world's leading companies are making significant investments in cloud computing, and cloud computing continues to evolve. Essentially, cloud computing is a "pay for use" model similar to a utility company. Over time, Microsoft has steadily increased its investments in the cloud as well as partnered with major...

    Provided By Global Knowledge

  • White Papers // Jan 2011

    12 Advantages of Agile Software Development

    Organizations can find significant value in adopting Agile methodologies and techniques. Agile practices can help ensure you meet customers and deliver to their expectations, deliver products on time, and create a motivated environment that is able to quickly adapt to change. This white paper explores 12 benefits of Agile development...

    Provided By Global Knowledge