Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Apr 2013

    Algorithmics and IBM Platform Computing solution for financial markets

    This paper describes best practices on how to spread the computational demands of advanced risk analytics across a dynamic grid computing environment. With a more advanced and capable computing infrastructure, banks can move from reactively measuring risk to actively managing risk based on timely insights drawn from rigorous analysis, all...

    Provided By IBM

  • White Papers // Apr 2014

    Storage: Economics Remains Crucial

    IT managers and industry experts talk a lot about performance and capacity, but those are often only replacement terms for the real issue: economics. Storage decisions are only necessary because of economics -- otherwise all data would be stored in main memory. With the data avalanche always looming and growing,...

    Provided By IBM

  • White Papers // Sep 2013

    Transforming spreadsheets: planning, budgeting and forecasting for midsize companies

    A spreadsheet-based approach to performance management won't meet the challenges facing growing midsize businesses. You need confidence in the information you're using for critical decision-making. Read this white paper to see how IBM® Cognos® Express can transform spreadsheet-only processes to create flexible and timely plans, budgets and forecasts.

    Provided By IBM

  • White Papers // Feb 2014

    IBM Requirements management for smart products Resources

    If you are new to requirements management, or wish to improve your existing requirements management process, the resources in this e-Kit will provide you with useful guidance and advice. Learn what requirements management is and how it can help your organization improve quality, reduce costs and better meet customer needs...

    Provided By IBM

  • White Papers // Feb 2014

    Model-based systems engineering: Revolution or evolution?

    This whitepaper traces the evolution of Model Based Systems Engineering (MBSE), a structured and visual approach for collaborative systems design and development which facilitates early validation of requirements, architectural trade off analysis and mitigation of project risks.

    Provided By IBM

  • White Papers // Feb 2014

    Unit testing: the key to quality in smarter products

    Innovative and high-quality software is now not only a key driver for business success in many industries;it is also critical for building a smarter planet. Yet as companies race to meet tight deadlines, they often have to hack code and drop features. All the while, customer demands for faster delivery...

    Provided By IBM

  • eBooks // Feb 2014

    eGuide to Data Movement and Governance

    The purpose of this eGuide is to help you grasp the measures that can keep your organization on track to meet objectives and in line with regulations. What’s more, it’s your chance to become more effective in your job and build the confidence to bring valuable suggestions to your security...

    Provided By IBM

  • White Papers // May 2014

    Desktop Engineering: High Performance Cluster Computing Survey

    An executive summary of the results of a survey conducted by Desktop Engineering to gauge its audience’s familiarity with high performance cluster computing and its benefits.

    Provided By IBM

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Provided By Symantec

  • White Papers // Jun 2007

    Examples Of Microsoft Access Data-Entry Forms, Switchboards, And Dialog Boxes

    In Access, you can enter data directly into the tables in a database. However, you can make the process of entering and working with data much easier and more accurate if you use forms. You can create three types of forms in Access: Data-entry forms- you use data entry forms...

    Provided By Microsoft

  • White Papers // Feb 2014

    Forrester Study - Total Economic Impact of Google Apps

    For companies considering switching to Google Apps from a traditional, on-premise environment for messaging and collaboration, this Forrester Study shows that Google Apps can reduce IT costs while offering even greater gains in employee productivity. Download this quick synopsis to find out more.

    Provided By Google

  • Downloads // May 2014

    Simplify Desktop and Application Access Management – PowerTerm WebConnect

    With the current BYOD trend and the need to reduce IT workload, organizations need to empower users with secure, browser-based access to Windows Applications and Desktops from any device, anywhere - simply and cost-effectively. PowerTerm® WebConnect provides secure and mobile, managed access from office and remote locations to Windows...

    Provided By Ericom Software

  • Downloads // May 2014

    Enable BYOD, Lower IT Workload, Zero Client Installations – Simple!

    With the growing diversity of end-user devices and the need to reduce IT overhead, organizations need to empower users with secure, browser-based access to Windows Applications and Desktops from any device, anywhere - simply and cost-effectively. Ericom AccessNow™ enables browser-based access to Windows applications and desktops hosted on Terminal...

    Provided By Ericom Software

  • White Papers // Feb 2010

    Advanced Database Management System

    Advanced Database Management System is a core course for students who are trying to acquire the Master of Science in Information Technology. This paper provides information about the Database Management System that plays an important role in Information Technology. A range of features and benefits of Advanced Database Management Systems...

    Provided By National Open University of Nigeria

  • White Papers // Jan 2009

    Design of an Efficient QoS Architecture (DEQA) for Mobile Ad Hoc Networks

    With the increasing widespread use of wireless technologies, Quality of Service (QoS) provisioning in ad hoc networks remains a challenging task. Good scalability of the QoS architecture is necessary, as the size of the ad hoc networks is huge. In this paper authors propose a Design of an Efficient QoS...

    Provided By JNTU College of Engineering

  • White Papers // Sep 2010

    Refinement of Web Usage Data Clustering From K-Means with Genetic Algorithm

    Web usage mining involves application of data mining techniques to discover usage patterns from the web data. Clustering is one of the important functions in web usage mining. Recent attempts have adapted the K-means clustering algorithm as well as genetic algorithms based on rough sets to find interval sets of...

    Provided By EuroJournals

  • White Papers // Apr 2010

    Load Balancing in the Cloud: Tools, Tips, and Techniques

    Load Balancing is a method to distribute workload across one or more servers, network interfaces, hard drives, or other computing resources. Typical datacenter implementations rely on large, powerful (And expensive) computing hardware and network infrastructure, which are subject to the usual risks associated with any physical device, including hardware failure,...

    Provided By RightScale

  • White Papers // Aug 2012

    Reliable and Secured Data Transmission in Wireless Body Area Networks (WBAN)

    In Wireless Body Area Networks (WBAN), the malicious user can unfold the patient information such as vital sign and patient ID using security attacks like wormhole and spoofing attacks. Also reliability becomes a difficult task due to the power and mobility issues which may cause frequent changes in network topology....

    Provided By EuroJournals

  • White Papers // May 2014

    Advanced Malware Protection Buyer's Guide

    Today’s constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the tools that fight them in the...

    Provided By Sourcefire, Inc.

  • eBooks // Aug 2013

    Content Marketing: Optimizing the Online Customer Experience

    Companies of all sizes have come to realize that content marketing via the web is critical to their success. The real challenge now is not only figuring out how to manage all the content required, but also dynamically getting the right content in front of the right customers at the...

    Provided By Acquia

  • White Papers // May 2011

    Rule Based Programming With Drools

    Imperative programming languages (such as Java) are the most widespread programming languages recently. Besides being quite easy to get familiar with them, they are also perfectly suitable for business software development. Although the productivity of imperative languages is much acclaimed, some problems are much easier to solve in a logical...

    Provided By International Journal of Computer Science and Information Technologies

  • Case Studies // Feb 2014

    University of Maryland Case Study

    To enhance IT services for faculty and staff across the United States, University of Maryland University College (UMUC) needed to replace out-of-lifecycle desktop hardware and software quickly and efficiently, and with minimal risk of downtime to staff services. Read this case study to learn how UMUC leveraged new technology and...

    Provided By Dell & Microsoft

  • White Papers // Jan 2013

    Your IT Environment for Today and Tomorrow: What You Need to Know about the New Windows

    Windows 8.1 is ready to give your business the tools you need to meet your workers' changing IT needs in a way that's reliable, productive and secure. Designed to respond equally well to touch as it does to a keyboard and mouse, read this paper to learn more about how...

    Provided By Dell & Microsoft

  • White Papers // Oct 2008

    Soft-Decision Decoding of Reed-Solomon Codes Using Successive Error-and-Ersure Decoding

    The authors propose a soft-decision decoding algorithm of Reed-Solomon (RS) codes using successive error-and-erasure decoding. Extensive simulations are conducted to show the possible performance gain of the proposed method. They derive a formula for performance estimation based on ordered statistics of symbol reliability, which matches well with the results of...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Using DaaS to Create the Ideal Desktop User Experience Without a PC

    With the ubiquity of end-user computing long established, organizations now are grappling with a tough dilemma: Users want enterprise-class performance and availability, but they demand the flexibility to use familiar devices and applications—anywhere, and at any time. Download this whitepaper to learn why Desktops as a service (DaaS) can be...

    Provided By Desktone

  • White Papers // May 2014

    HP Takes World Record in Virtualization Performance for 4 Processors, 2 Nodes

    The new HP ProLiant DL560 Gen8 offers the ideal 4-processor dense form factor without compromising on performance as proved by the VMmark 2.1.1 world record benchmark result of 18.27 @18 tiles. Utilizing fewer disks drives than competitors, the ProLiant DL560 Gen8 offers customers enormous savings on power and rack real...

    Provided By HP and Intel®

  • White Papers // Feb 2014

    Dramatic IT Innovation: The Converged Infrastructure

    As technology continues to touch more aspects of business, most IT leaders are finding themselves inundated by the many challenges associated by the Big 3: consolidation, virtualization, and the cloud. Read about what Jim Ganthier, VP of Marketing & Operations and the GM of the Mainstream business unit of HP's...

    Provided By HP & Intel® Xeon® Processor

  • White Papers // Mar 2014

    Top myths about supply chain optimization

    This briefing discusses the top myths about optimization that often keep companies from maximizing their returns. The difference between good and great optimization can be millions of dollars in savings, learn the facts here and start saving today.

    Provided By Quintiq

  • White Papers // Feb 2014

    Customer Management: What's Cheap vs. What Works

    Customer Relationship Manager (CRM) tools are a crucial part of a business's success. In this report, Act! investigates the choices small business must consider when evaluating CRM solutions that best meets business needs. Choices between what's cheap and what works. Download this report today to discover what the choices are...

    Provided By Swiftpage - Act

  • White Papers // Apr 2014

    Lessons from Successful Mobile Initiatives

    The best mobile applications are familiar, require no formal training, and make it easy to collaborate with colleagues. They aren’t crippled versions of web applications. Rather, they’re enhanced versions. They do things that can’t be done on a desktop like geo-tagging and auto-routing because they’re presence and location-aware. This paper...

    Provided By ServiceNow

  • Research // Mar 2014

    Magic Quadrant for Integrated Software Quality Suites

    Software testing is one of the key processes in the delivery of applications. The market has been steadily maturing to deliver improved user success, but technology changes such as agile practices, mobile computing and cloud platforms can disrupt vendor evaluation for testers and test managers, mainly driven by the shift...

    Provided By Access Testing

  • eBooks // Dec 2013

    Agile Portfolio Management eBook

    In order to compete in the 21st century, your company needs to move, pivot and innovate faster than your competitors. Think of the companies, the software and the brands that you admire. They innovate. They design and produce the most coveted new things. They invest in the idea that innovation...

    Provided By Rally Software

  • White Papers // Feb 2014

    The Business Value of IBM zEnterprise System Deployments

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Provided By IBM

  • White Papers // Jul 2014

    Why Choice and Control are Critical to a Successful Cloud Strategy

    It’s true that many businesses today are taking advantage of cloud technology. It’s also true that far more have yet to adopt it in any meaningful way. What’s missing for most organizations is an approach that enables them to leverage the benefits of the cloud—like agility, cost containment and speed...

    Provided By IBM

  • White Papers // Jan 2014

    Drivewyze eliminates costly IT infrastructure

    PreClear from Drivewyze is a new weigh-station bypass service that uses cellular and GPS technology to save truckers time, money, and fuel. Drivewyze recently partnered with IBM to migrate its production environment to an IBM SmartCloud Enterprise+ infrastructure. In this recently published case study, you can read about the challenges...

    Provided By IBM

  • Podcasts // Jan 2014

    Building A Successful Roadmap to Cloud

    To get the most from your cloud experience, you need a roadmap. Watch the video “Building a Successful Roadmap to the Cloud” to learn how a cloud roadmap can: Ensure that your cloud decisions work together to maximize the overall value to your business Give you greater...

    Provided By IBM

  • Podcasts // Jan 2014

    Stepping Into the Cloud: A Practical Guide to Launching a Successful Cloud Strategy

    Frost & Sullivan’s video “Stepping into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy” offers practical guidance for migrating your company to the cloud -- at your own pace and on your own schedule. Take the first step today.

    Provided By IBM

  • Downloads // Jan 2006

    Create Active Directory users and Exchange mailboxes from a CSV file with VBScript

    This VBScript will create Active Directory users and Exchange accounts from a CSV file. Creating users and Exchange accounts can be tedious, especially when user information already resides in your company's HR system. Instead of manually creating an Active Directory user and Exchange account, you can use a script...

    Provided By TechRepublic

  • Webcasts // Apr 2014

    On-demand Webcast: How to Simplify Deployment of Google Apps and Office 365

    Google Apps and Microsoft Office 365 each has its own vast ecosystem, from email to office applications to identity management. Google would prefer you live entirely in the Google environment, while Microsoft would prefer you live entirely in its Exchange/Office 365/Active Directory infrastructure. You are likely using a combination of...

    Provided By Centrify